提交 d102d9df 编写于 作者: M Matt Caswell

Implement write pipeline support in libssl

Use the new pipeline cipher capability to encrypt multiple records being
written out all in one go. Two new SSL/SSL_CTX parameters can be used to
control how this works: max_pipelines and split_send_fragment.

max_pipelines defines the maximum number of pipelines that can ever be used
in one go for a single connection. It must always be less than or equal to
SSL_MAX_PIPELINES (currently defined to be 32). By default only one
pipeline will be used (i.e. normal non-parallel operation).

split_send_fragment defines how data is split up into pipelines. The number
of pipelines used will be determined by the amount of data provided to the
SSL_write call divided by split_send_fragment. For example if
split_send_fragment is set to 2000 and max_pipelines is 4 then:
SSL_write called with 0-2000 bytes == 1 pipeline used
SSL_write called with 2001-4000 bytes == 2 pipelines used
SSL_write called with 4001-6000 bytes == 3 pipelines used
SSL_write_called with 6001+ bytes == 4 pipelines used

split_send_fragment must always be less than or equal to max_send_fragment.
By default it is set to be equal to max_send_fragment. This will mean that
the same number of records will always be created as would have been
created in the non-parallel case, although the data will be apportioned
differently. In the parallel case data will be spread equally between the
pipelines.
Reviewed-by: NTim Hudson <tjh@openssl.org>
上级 98ee7543
...@@ -181,6 +181,9 @@ extern "C" { ...@@ -181,6 +181,9 @@ extern "C" {
# define SSL_MAX_KEY_ARG_LENGTH 8 # define SSL_MAX_KEY_ARG_LENGTH 8
# define SSL_MAX_MASTER_KEY_LENGTH 48 # define SSL_MAX_MASTER_KEY_LENGTH 48
/* The maximum number of encrypt/decrypt pipelines we can support */
# define SSL_MAX_PIPELINES 32
/* text strings for the ciphers */ /* text strings for the ciphers */
/* These are used to specify which ciphers to use and not to use */ /* These are used to specify which ciphers to use and not to use */
...@@ -1233,6 +1236,8 @@ DECLARE_PEM_rw(SSL_SESSION, SSL_SESSION) ...@@ -1233,6 +1236,8 @@ DECLARE_PEM_rw(SSL_SESSION, SSL_SESSION)
# define SSL_CTRL_GET_EXTMS_SUPPORT 122 # define SSL_CTRL_GET_EXTMS_SUPPORT 122
# define SSL_CTRL_SET_MIN_PROTO_VERSION 123 # define SSL_CTRL_SET_MIN_PROTO_VERSION 123
# define SSL_CTRL_SET_MAX_PROTO_VERSION 124 # define SSL_CTRL_SET_MAX_PROTO_VERSION 124
# define SSL_CTRL_SET_SPLIT_SEND_FRAGMENT 125
# define SSL_CTRL_SET_MAX_PIPELINES 126
# define SSL_CERT_SET_FIRST 1 # define SSL_CERT_SET_FIRST 1
# define SSL_CERT_SET_NEXT 2 # define SSL_CERT_SET_NEXT 2
# define SSL_CERT_SET_SERVER 3 # define SSL_CERT_SET_SERVER 3
...@@ -1794,6 +1799,14 @@ __owur int SSL_get_ex_data_X509_STORE_CTX_idx(void); ...@@ -1794,6 +1799,14 @@ __owur int SSL_get_ex_data_X509_STORE_CTX_idx(void);
SSL_CTX_ctrl(ctx,SSL_CTRL_SET_MAX_SEND_FRAGMENT,m,NULL) SSL_CTX_ctrl(ctx,SSL_CTRL_SET_MAX_SEND_FRAGMENT,m,NULL)
# define SSL_set_max_send_fragment(ssl,m) \ # define SSL_set_max_send_fragment(ssl,m) \
SSL_ctrl(ssl,SSL_CTRL_SET_MAX_SEND_FRAGMENT,m,NULL) SSL_ctrl(ssl,SSL_CTRL_SET_MAX_SEND_FRAGMENT,m,NULL)
# define SSL_CTX_set_split_send_fragment(ctx,m) \
SSL_CTX_ctrl(ctx,SSL_CTRL_SET_SPLIT_SEND_FRAGMENT,m,NULL)
# define SSL_set_split_send_fragment(ssl,m) \
SSL_ctrl(ssl,SSL_CTRL_SET_SPLIT_SEND_FRAGMENT,m,NULL)
# define SSL_CTX_set_max_pipelines(ctx,m) \
SSL_CTX_ctrl(ctx,SSL_CTRL_SET_MAX_PIPELINES,m,NULL)
# define SSL_set_max_pipelines(ssl,m) \
SSL_ctrl(ssl,SSL_CTRL_SET_MAX_PIPELINES,m,NULL)
/* NB: the keylength is only applicable when is_export is true */ /* NB: the keylength is only applicable when is_export is true */
# ifndef OPENSSL_NO_DH # ifndef OPENSSL_NO_DH
...@@ -2193,6 +2206,7 @@ void ERR_load_SSL_strings(void); ...@@ -2193,6 +2206,7 @@ void ERR_load_SSL_strings(void);
# define SSL_F_TLS1_CHANGE_CIPHER_STATE 209 # define SSL_F_TLS1_CHANGE_CIPHER_STATE 209
# define SSL_F_TLS1_CHECK_DUPLICATE_EXTENSIONS 341 # define SSL_F_TLS1_CHECK_DUPLICATE_EXTENSIONS 341
# define SSL_F_TLS1_CHECK_SERVERHELLO_TLSEXT 274 # define SSL_F_TLS1_CHECK_SERVERHELLO_TLSEXT 274
# define SSL_F_TLS1_ENC 401
# define SSL_F_TLS1_EXPORT_KEYING_MATERIAL 314 # define SSL_F_TLS1_EXPORT_KEYING_MATERIAL 314
# define SSL_F_TLS1_GET_CURVELIST 338 # define SSL_F_TLS1_GET_CURVELIST 338
# define SSL_F_TLS1_PREPARE_CLIENTHELLO_TLSEXT 275 # define SSL_F_TLS1_PREPARE_CLIENTHELLO_TLSEXT 275
...@@ -2412,6 +2426,7 @@ void ERR_load_SSL_strings(void); ...@@ -2412,6 +2426,7 @@ void ERR_load_SSL_strings(void);
# define SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE 199 # define SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE 199
# define SSL_R_PEM_NAME_BAD_PREFIX 391 # define SSL_R_PEM_NAME_BAD_PREFIX 391
# define SSL_R_PEM_NAME_TOO_SHORT 392 # define SSL_R_PEM_NAME_TOO_SHORT 392
# define SSL_R_PIPELINE_FAILURE 406
# define SSL_R_PRE_MAC_LENGTH_TOO_LONG 205 # define SSL_R_PRE_MAC_LENGTH_TOO_LONG 205
# define SSL_R_PROTOCOL_IS_SHUTDOWN 207 # define SSL_R_PROTOCOL_IS_SHUTDOWN 207
# define SSL_R_PSK_IDENTITY_NOT_FOUND 223 # define SSL_R_PSK_IDENTITY_NOT_FOUND 223
......
...@@ -1039,7 +1039,7 @@ int do_dtls1_write(SSL *s, int type, const unsigned char *buf, ...@@ -1039,7 +1039,7 @@ int do_dtls1_write(SSL *s, int type, const unsigned char *buf,
SSL3_BUFFER *wb; SSL3_BUFFER *wb;
SSL_SESSION *sess; SSL_SESSION *sess;
wb = &s->rlayer.wbuf; wb = &s->rlayer.wbuf[0];
/* /*
* first check if there is a SSL3_BUFFER still being written out. This * first check if there is a SSL3_BUFFER still being written out. This
...@@ -1128,7 +1128,7 @@ int do_dtls1_write(SSL *s, int type, const unsigned char *buf, ...@@ -1128,7 +1128,7 @@ int do_dtls1_write(SSL *s, int type, const unsigned char *buf,
/* first we compress */ /* first we compress */
if (s->compress != NULL) { if (s->compress != NULL) {
if (!ssl3_do_compress(s)) { if (!ssl3_do_compress(s, wr)) {
SSLerr(SSL_F_DO_DTLS1_WRITE, SSL_R_COMPRESSION_FAILURE); SSLerr(SSL_F_DO_DTLS1_WRITE, SSL_R_COMPRESSION_FAILURE);
goto err; goto err;
} }
...@@ -1145,7 +1145,7 @@ int do_dtls1_write(SSL *s, int type, const unsigned char *buf, ...@@ -1145,7 +1145,7 @@ int do_dtls1_write(SSL *s, int type, const unsigned char *buf,
*/ */
if (mac_size != 0) { if (mac_size != 0) {
if (s->method->ssl3_enc->mac(s, if (s->method->ssl3_enc->mac(s, wr,
&(p[SSL3_RECORD_get_length(wr) + eivlen]), 1) < 0) &(p[SSL3_RECORD_get_length(wr) + eivlen]), 1) < 0)
goto err; goto err;
SSL3_RECORD_add_length(wr, mac_size); SSL3_RECORD_add_length(wr, mac_size);
...@@ -1158,7 +1158,7 @@ int do_dtls1_write(SSL *s, int type, const unsigned char *buf, ...@@ -1158,7 +1158,7 @@ int do_dtls1_write(SSL *s, int type, const unsigned char *buf,
if (eivlen) if (eivlen)
SSL3_RECORD_add_length(wr, eivlen); SSL3_RECORD_add_length(wr, eivlen);
if (s->method->ssl3_enc->enc(s, 1) < 1) if (s->method->ssl3_enc->enc(s, wr, 1, 1) < 1)
goto err; goto err;
/* record length after mac and block padding */ /* record length after mac and block padding */
......
...@@ -141,6 +141,8 @@ void RECORD_LAYER_init(RECORD_LAYER *rl, SSL *s) ...@@ -141,6 +141,8 @@ void RECORD_LAYER_init(RECORD_LAYER *rl, SSL *s)
void RECORD_LAYER_clear(RECORD_LAYER *rl) void RECORD_LAYER_clear(RECORD_LAYER *rl)
{ {
unsigned int pipes;
rl->rstate = SSL_ST_READ_HEADER; rl->rstate = SSL_ST_READ_HEADER;
/* Do I need to clear read_ahead? As far as I can tell read_ahead did not /* Do I need to clear read_ahead? As far as I can tell read_ahead did not
...@@ -161,7 +163,9 @@ void RECORD_LAYER_clear(RECORD_LAYER *rl) ...@@ -161,7 +163,9 @@ void RECORD_LAYER_clear(RECORD_LAYER *rl)
rl->wpend_buf = NULL; rl->wpend_buf = NULL;
SSL3_BUFFER_clear(&rl->rbuf); SSL3_BUFFER_clear(&rl->rbuf);
SSL3_BUFFER_clear(&rl->wbuf); for(pipes = 0; pipes < rl->numwpipes; pipes++)
SSL3_BUFFER_clear(&rl->wbuf[pipes]);
rl->numwpipes = 0;
SSL3_RECORD_clear(&rl->rrec); SSL3_RECORD_clear(&rl->rrec);
SSL3_RECORD_clear(&rl->wrec); SSL3_RECORD_clear(&rl->wrec);
...@@ -176,7 +180,7 @@ void RECORD_LAYER_release(RECORD_LAYER *rl) ...@@ -176,7 +180,7 @@ void RECORD_LAYER_release(RECORD_LAYER *rl)
{ {
if (SSL3_BUFFER_is_initialised(&rl->rbuf)) if (SSL3_BUFFER_is_initialised(&rl->rbuf))
ssl3_release_read_buffer(rl->s); ssl3_release_read_buffer(rl->s);
if (SSL3_BUFFER_is_initialised(&rl->wbuf)) if (rl->numwpipes > 0)
ssl3_release_write_buffer(rl->s); ssl3_release_write_buffer(rl->s);
SSL3_RECORD_release(&rl->rrec); SSL3_RECORD_release(&rl->rrec);
} }
...@@ -188,7 +192,8 @@ int RECORD_LAYER_read_pending(RECORD_LAYER *rl) ...@@ -188,7 +192,8 @@ int RECORD_LAYER_read_pending(RECORD_LAYER *rl)
int RECORD_LAYER_write_pending(RECORD_LAYER *rl) int RECORD_LAYER_write_pending(RECORD_LAYER *rl)
{ {
return SSL3_BUFFER_get_left(&rl->wbuf) != 0; return (rl->numwpipes > 0)
&& SSL3_BUFFER_get_left(&rl->wbuf[rl->numwpipes-1]) != 0;
} }
int RECORD_LAYER_set_data(RECORD_LAYER *rl, const unsigned char *buf, int len) int RECORD_LAYER_set_data(RECORD_LAYER *rl, const unsigned char *buf, int len)
...@@ -433,10 +438,10 @@ int ssl3_write_bytes(SSL *s, int type, const void *buf_, int len) ...@@ -433,10 +438,10 @@ int ssl3_write_bytes(SSL *s, int type, const void *buf_, int len)
int tot; int tot;
unsigned int n, nw; unsigned int n, nw;
#if !defined(OPENSSL_NO_MULTIBLOCK) && EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK #if !defined(OPENSSL_NO_MULTIBLOCK) && EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK
unsigned int max_send_fragment; unsigned int max_send_fragment, split_send_fragment, maxpipes;
unsigned int u_len = (unsigned int)len; unsigned int u_len = (unsigned int)len;
#endif #endif
SSL3_BUFFER *wb = &s->rlayer.wbuf; SSL3_BUFFER *wb = &s->rlayer.wbuf[0];
int i; int i;
if (len < 0) { if (len < 0) {
...@@ -622,13 +627,70 @@ int ssl3_write_bytes(SSL *s, int type, const void *buf_, int len) ...@@ -622,13 +627,70 @@ int ssl3_write_bytes(SSL *s, int type, const void *buf_, int len)
} }
n = (len - tot); n = (len - tot);
split_send_fragment = s->split_send_fragment;
/*
* If max_pipelines is 0 then this means "undefined" and we default to
* 1 pipeline. Similaraly if the cipher does not support pipelined
* processing then we also only use 1 pipeline, or if we're not using
* explicit IVs
*/
maxpipes = s->max_pipelines;
if (maxpipes > SSL_MAX_PIPELINES) {
/*
* We should have prevented this when we set max_pipelines so we
* shouldn't get here
*/
SSLerr(SSL_F_SSL3_WRITE_BYTES, ERR_R_INTERNAL_ERROR);
return -1;
}
if (maxpipes == 0
|| s->enc_write_ctx == NULL
|| !(EVP_CIPHER_flags(EVP_CIPHER_CTX_cipher(s->enc_write_ctx))
& EVP_CIPH_FLAG_PIPELINE)
|| !SSL_USE_EXPLICIT_IV(s))
maxpipes = 1;
if (s->max_send_fragment == 0 || split_send_fragment > s->max_send_fragment
|| split_send_fragment == 0) {
/*
* We should have prevented this when we set the split and max send
* fragments so we shouldn't get here
*/
SSLerr(SSL_F_SSL3_WRITE_BYTES, ERR_R_INTERNAL_ERROR);
return -1;
}
for (;;) { for (;;) {
if (n > s->max_send_fragment) unsigned int pipelens[SSL_MAX_PIPELINES], tmppipelen, remain;
nw = s->max_send_fragment; unsigned int numpipes, j;
if (n == 0)
numpipes = 1;
else else
nw = n; numpipes = ((n - 1) / split_send_fragment) + 1;
if (numpipes > maxpipes)
numpipes = maxpipes;
if (n / numpipes >= s->max_send_fragment) {
/*
* We have enough data to completely fill all available
* pipelines
*/
for (j = 0; j < numpipes; j++) {
pipelens[j] = s->max_send_fragment;
}
} else {
/* We can partially fill all available pipelines */
tmppipelen = n / numpipes;
remain = n % numpipes;
for (j = 0; j < numpipes; j++) {
pipelens[j] = tmppipelen;
if (j < remain)
pipelens[j]++;
}
}
i = do_ssl3_write(s, type, &(buf[tot]), nw, 0); i = do_ssl3_write(s, type, &(buf[tot]), pipelens, numpipes, 0);
if (i <= 0) { if (i <= 0) {
/* XXX should we ssl3_release_write_buffer if i<0? */ /* XXX should we ssl3_release_write_buffer if i<0? */
s->rlayer.wnum = tot; s->rlayer.wnum = tot;
...@@ -657,23 +719,28 @@ int ssl3_write_bytes(SSL *s, int type, const void *buf_, int len) ...@@ -657,23 +719,28 @@ int ssl3_write_bytes(SSL *s, int type, const void *buf_, int len)
} }
int do_ssl3_write(SSL *s, int type, const unsigned char *buf, int do_ssl3_write(SSL *s, int type, const unsigned char *buf,
unsigned int len, int create_empty_fragment) unsigned int *pipelens, unsigned int numpipes,
int create_empty_fragment)
{ {
unsigned char *p, *plen; unsigned char *outbuf[SSL_MAX_PIPELINES], *plen[SSL_MAX_PIPELINES];
SSL3_RECORD wr[SSL_MAX_PIPELINES];
int i, mac_size, clear = 0; int i, mac_size, clear = 0;
int prefix_len = 0; int prefix_len = 0;
int eivlen; int eivlen;
size_t align = 0; size_t align = 0;
SSL3_RECORD *wr; SSL3_BUFFER *wb;
SSL3_BUFFER *wb = &s->rlayer.wbuf;
SSL_SESSION *sess; SSL_SESSION *sess;
unsigned int totlen = 0;
unsigned int j;
for (j = 0; j < numpipes; j++)
totlen += pipelens[j];
/* /*
* first check if there is a SSL3_BUFFER still being written out. This * first check if there is a SSL3_BUFFER still being written out. This
* will happen with non blocking IO * will happen with non blocking IO
*/ */
if (SSL3_BUFFER_get_left(wb) != 0) if (RECORD_LAYER_write_pending(&s->rlayer))
return (ssl3_write_pending(s, type, buf, len)); return (ssl3_write_pending(s, type, buf, totlen));
/* If we have an alert to send, lets send it */ /* If we have an alert to send, lets send it */
if (s->s3->alert_dispatch) { if (s->s3->alert_dispatch) {
...@@ -683,14 +750,13 @@ int do_ssl3_write(SSL *s, int type, const unsigned char *buf, ...@@ -683,14 +750,13 @@ int do_ssl3_write(SSL *s, int type, const unsigned char *buf,
/* if it went, fall through and send more stuff */ /* if it went, fall through and send more stuff */
} }
if (!SSL3_BUFFER_is_initialised(wb)) if (s->rlayer.numwpipes < numpipes)
if (!ssl3_setup_write_buffer(s)) if (!ssl3_setup_write_buffer(s, numpipes))
return -1; return -1;
if (len == 0 && !create_empty_fragment) if (totlen == 0 && !create_empty_fragment)
return 0; return 0;
wr = &s->rlayer.wrec;
sess = s->session; sess = s->session;
if ((sess == NULL) || if ((sess == NULL) ||
...@@ -720,7 +786,9 @@ int do_ssl3_write(SSL *s, int type, const unsigned char *buf, ...@@ -720,7 +786,9 @@ int do_ssl3_write(SSL *s, int type, const unsigned char *buf,
* 'prefix_len' bytes are sent out later together with the actual * 'prefix_len' bytes are sent out later together with the actual
* payload) * payload)
*/ */
prefix_len = do_ssl3_write(s, type, buf, 0, 1); unsigned int tmppipelen = 0;
prefix_len = do_ssl3_write(s, type, buf, &tmppipelen, 1, 1);
if (prefix_len <= 0) if (prefix_len <= 0)
goto err; goto err;
...@@ -737,6 +805,7 @@ int do_ssl3_write(SSL *s, int type, const unsigned char *buf, ...@@ -737,6 +805,7 @@ int do_ssl3_write(SSL *s, int type, const unsigned char *buf,
} }
if (create_empty_fragment) { if (create_empty_fragment) {
wb = &s->rlayer.wbuf[0];
#if defined(SSL3_ALIGN_PAYLOAD) && SSL3_ALIGN_PAYLOAD!=0 #if defined(SSL3_ALIGN_PAYLOAD) && SSL3_ALIGN_PAYLOAD!=0
/* /*
* extra fragment would be couple of cipher blocks, which would be * extra fragment would be couple of cipher blocks, which would be
...@@ -746,38 +815,24 @@ int do_ssl3_write(SSL *s, int type, const unsigned char *buf, ...@@ -746,38 +815,24 @@ int do_ssl3_write(SSL *s, int type, const unsigned char *buf,
align = (size_t)SSL3_BUFFER_get_buf(wb) + 2 * SSL3_RT_HEADER_LENGTH; align = (size_t)SSL3_BUFFER_get_buf(wb) + 2 * SSL3_RT_HEADER_LENGTH;
align = (0-align) & (SSL3_ALIGN_PAYLOAD - 1); align = (0-align) & (SSL3_ALIGN_PAYLOAD - 1);
#endif #endif
p = SSL3_BUFFER_get_buf(wb) + align; outbuf[0] = SSL3_BUFFER_get_buf(wb) + align;
SSL3_BUFFER_set_offset(wb, align); SSL3_BUFFER_set_offset(wb, align);
} else if (prefix_len) { } else if (prefix_len) {
p = SSL3_BUFFER_get_buf(wb) + SSL3_BUFFER_get_offset(wb) + prefix_len; wb = &s->rlayer.wbuf[0];
outbuf[0] = SSL3_BUFFER_get_buf(wb) + SSL3_BUFFER_get_offset(wb)
+ prefix_len;
} else { } else {
for (j=0; j < numpipes; j++) {
wb = &s->rlayer.wbuf[j];
#if defined(SSL3_ALIGN_PAYLOAD) && SSL3_ALIGN_PAYLOAD!=0 #if defined(SSL3_ALIGN_PAYLOAD) && SSL3_ALIGN_PAYLOAD!=0
align = (size_t)SSL3_BUFFER_get_buf(wb) + SSL3_RT_HEADER_LENGTH; align = (size_t)SSL3_BUFFER_get_buf(wb) + SSL3_RT_HEADER_LENGTH;
align = (0-align) & (SSL3_ALIGN_PAYLOAD - 1); align = (-align) & (SSL3_ALIGN_PAYLOAD - 1);
#endif #endif
p = SSL3_BUFFER_get_buf(wb) + align; outbuf[j] = SSL3_BUFFER_get_buf(wb) + align;
SSL3_BUFFER_set_offset(wb, align); SSL3_BUFFER_set_offset(wb, align);
}
} }
/* write the header */
*(p++) = type & 0xff;
SSL3_RECORD_set_type(wr, type);
*(p++) = (s->version >> 8);
/*
* Some servers hang if iniatial client hello is larger than 256 bytes
* and record version number > TLS 1.0
*/
if (SSL_get_state(s) == TLS_ST_CW_CLNT_HELLO
&& !s->renegotiate && TLS1_get_version(s) > TLS1_VERSION)
*(p++) = 0x1;
else
*(p++) = s->version & 0xff;
/* field where we are to write out packet length */
plen = p;
p += 2;
/* Explicit IV length, block ciphers appropriate version flag */ /* Explicit IV length, block ciphers appropriate version flag */
if (s->enc_write_ctx && SSL_USE_EXPLICIT_IV(s)) { if (s->enc_write_ctx && SSL_USE_EXPLICIT_IV(s)) {
int mode = EVP_CIPHER_CTX_mode(s->enc_write_ctx); int mode = EVP_CIPHER_CTX_mode(s->enc_write_ctx);
...@@ -796,94 +851,132 @@ int do_ssl3_write(SSL *s, int type, const unsigned char *buf, ...@@ -796,94 +851,132 @@ int do_ssl3_write(SSL *s, int type, const unsigned char *buf,
} else } else
eivlen = 0; eivlen = 0;
/* lets setup the record stuff. */
SSL3_RECORD_set_data(wr, p + eivlen);
SSL3_RECORD_set_length(wr, (int)len);
SSL3_RECORD_set_input(wr, (unsigned char *)buf);
totlen = 0;
/* Clear our SSL3_RECORD structures */
memset(wr, 0, sizeof wr);
for (j=0; j < numpipes; j++) {
/* write the header */
*(outbuf[j]++) = type & 0xff;
SSL3_RECORD_set_type(&wr[j], type);
/* *(outbuf[j]++) = (s->version >> 8);
* we now 'read' from wr->input, wr->length bytes into wr->data /*
*/ * Some servers hang if iniatial client hello is larger than 256 bytes
* and record version number > TLS 1.0
*/
if (SSL_get_state(s) == TLS_ST_CW_CLNT_HELLO
&& !s->renegotiate && TLS1_get_version(s) > TLS1_VERSION)
*(outbuf[j]++) = 0x1;
else
*(outbuf[j]++) = s->version & 0xff;
/* first we compress */ /* field where we are to write out packet length */
if (s->compress != NULL) { plen[j] = outbuf[j];
if (!ssl3_do_compress(s)) { outbuf[j] += 2;
SSLerr(SSL_F_DO_SSL3_WRITE, SSL_R_COMPRESSION_FAILURE);
goto err;
}
} else {
memcpy(wr->data, wr->input, wr->length);
SSL3_RECORD_reset_input(wr);
}
/* /* lets setup the record stuff. */
* we should still have the output to wr->data and the input from SSL3_RECORD_set_data(&wr[j], outbuf[j] + eivlen);
* wr->input. Length should be wr->length. wr->data still points in the SSL3_RECORD_set_length(&wr[j], (int)pipelens[j]);
* wb->buf SSL3_RECORD_set_input(&wr[j], (unsigned char *)&buf[totlen]);
*/ totlen += pipelens[j];
if (!SSL_USE_ETM(s) && mac_size != 0) { /*
if (s->method->ssl3_enc->mac(s, &(p[wr->length + eivlen]), 1) < 0) * we now 'read' from wr->input, wr->length bytes into wr->data
goto err; */
SSL3_RECORD_add_length(wr, mac_size);
}
SSL3_RECORD_set_data(wr, p); /* first we compress */
SSL3_RECORD_reset_input(wr); if (s->compress != NULL) {
if (!ssl3_do_compress(s, &wr[j])) {
SSLerr(SSL_F_DO_SSL3_WRITE, SSL_R_COMPRESSION_FAILURE);
goto err;
}
} else {
memcpy(wr[j].data, wr[j].input, wr[j].length);
SSL3_RECORD_reset_input(&wr[j]);
}
if (eivlen) {
/* /*
* if (RAND_pseudo_bytes(p, eivlen) <= 0) goto err; * we should still have the output to wr->data and the input from
* wr->input. Length should be wr->length. wr->data still points in the
* wb->buf
*/ */
SSL3_RECORD_add_length(wr, eivlen);
}
if (s->method->ssl3_enc->enc(s, 1) < 1) if (!SSL_USE_ETM(s) && mac_size != 0) {
goto err; if (s->method->ssl3_enc->mac(s, &wr[j],
&(outbuf[j][wr[j].length + eivlen]), 1) < 0)
goto err;
SSL3_RECORD_add_length(&wr[j], mac_size);
}
if (SSL_USE_ETM(s) && mac_size != 0) {
if (s->method->ssl3_enc->mac(s, p + wr->length, 1) < 0) SSL3_RECORD_set_data(&wr[j], outbuf[j]);
goto err; SSL3_RECORD_reset_input(&wr[j]);
SSL3_RECORD_add_length(wr, mac_size);
if (eivlen) {
/*
* if (RAND_pseudo_bytes(p, eivlen) <= 0) goto err;
*/
SSL3_RECORD_add_length(&wr[j], eivlen);
}
} }
/* record length after mac and block padding */ if (s->method->ssl3_enc->enc(s, wr, numpipes, 1) < 1)
s2n(SSL3_RECORD_get_length(wr), plen); goto err;
if (s->msg_callback) for (j=0; j < numpipes; j++) {
s->msg_callback(1, 0, SSL3_RT_HEADER, plen - 5, 5, s, if (SSL_USE_ETM(s) && mac_size != 0) {
s->msg_callback_arg); if (s->method->ssl3_enc->mac(s, &wr[j],
outbuf[j] + wr[j].length, 1) < 0)
goto err;
SSL3_RECORD_add_length(&wr[j], mac_size);
}
/* /* record length after mac and block padding */
* we should now have wr->data pointing to the encrypted data, which is s2n(SSL3_RECORD_get_length(&wr[j]), plen[j]);
* wr->length long
*/ if (s->msg_callback)
SSL3_RECORD_set_type(wr, type); /* not needed but helps for debugging */ s->msg_callback(1, 0, SSL3_RT_HEADER, plen[j] - 5, 5, s,
SSL3_RECORD_add_length(wr, SSL3_RT_HEADER_LENGTH); s->msg_callback_arg);
if (create_empty_fragment) {
/* /*
* we are in a recursive call; just return the length, don't write * we should now have wr->data pointing to the encrypted data, which is
* out anything here * wr->length long
*/ */
return SSL3_RECORD_get_length(wr); SSL3_RECORD_set_type(&wr[j], type); /* not needed but helps for debugging */
SSL3_RECORD_add_length(&wr[j], SSL3_RT_HEADER_LENGTH);
if (create_empty_fragment) {
/*
* we are in a recursive call; just return the length, don't write
* out anything here
*/
if (j > 0) {
/* We should never be pipelining an empty fragment!! */
SSLerr(SSL_F_DO_SSL3_WRITE, ERR_R_INTERNAL_ERROR);
goto err;
}
return SSL3_RECORD_get_length(wr);
}
/* now let's set up wb */
SSL3_BUFFER_set_left(&s->rlayer.wbuf[j],
prefix_len + SSL3_RECORD_get_length(&wr[j]));
} }
/* now let's set up wb */
SSL3_BUFFER_set_left(wb, prefix_len + SSL3_RECORD_get_length(wr));
/* /*
* memorize arguments so that ssl3_write_pending can detect bad write * memorize arguments so that ssl3_write_pending can detect bad write
* retries later * retries later
*/ */
s->rlayer.wpend_tot = len; s->rlayer.wpend_tot = totlen;
s->rlayer.wpend_buf = buf; s->rlayer.wpend_buf = buf;
s->rlayer.wpend_type = type; s->rlayer.wpend_type = type;
s->rlayer.wpend_ret = len; s->rlayer.wpend_ret = totlen;
/* we now just need to write the buffer */ /* we now just need to write the buffer */
return ssl3_write_pending(s, type, buf, len); return ssl3_write_pending(s, type, buf, totlen);
err: err:
return -1; return -1;
} }
...@@ -893,7 +986,8 @@ int ssl3_write_pending(SSL *s, int type, const unsigned char *buf, ...@@ -893,7 +986,8 @@ int ssl3_write_pending(SSL *s, int type, const unsigned char *buf,
unsigned int len) unsigned int len)
{ {
int i; int i;
SSL3_BUFFER *wb = &s->rlayer.wbuf; SSL3_BUFFER *wb = s->rlayer.wbuf;
unsigned int currbuf = 0;
/* XXXX */ /* XXXX */
if ((s->rlayer.wpend_tot > (int)len) if ((s->rlayer.wpend_tot > (int)len)
...@@ -905,19 +999,28 @@ int ssl3_write_pending(SSL *s, int type, const unsigned char *buf, ...@@ -905,19 +999,28 @@ int ssl3_write_pending(SSL *s, int type, const unsigned char *buf,
} }
for (;;) { for (;;) {
/* Loop until we find a buffer we haven't written out yet */
if (SSL3_BUFFER_get_left(&wb[currbuf]) == 0
&& currbuf < s->rlayer.numwpipes - 1) {
currbuf++;
continue;
}
clear_sys_error(); clear_sys_error();
if (s->wbio != NULL) { if (s->wbio != NULL) {
s->rwstate = SSL_WRITING; s->rwstate = SSL_WRITING;
i = BIO_write(s->wbio, i = BIO_write(s->wbio,
(char *)&(SSL3_BUFFER_get_buf(wb)[SSL3_BUFFER_get_offset(wb)]), (char *)&(SSL3_BUFFER_get_buf(&wb[currbuf])[
(unsigned int)SSL3_BUFFER_get_left(wb)); SSL3_BUFFER_get_offset(&wb[currbuf])]),
(unsigned int)SSL3_BUFFER_get_left(&wb[currbuf]));
} else { } else {
SSLerr(SSL_F_SSL3_WRITE_PENDING, SSL_R_BIO_NOT_SET); SSLerr(SSL_F_SSL3_WRITE_PENDING, SSL_R_BIO_NOT_SET);
i = -1; i = -1;
} }
if (i == SSL3_BUFFER_get_left(wb)) { if (i == SSL3_BUFFER_get_left(&wb[currbuf])) {
SSL3_BUFFER_set_left(wb, 0); SSL3_BUFFER_set_left(&wb[currbuf], 0);
SSL3_BUFFER_add_offset(wb, i); SSL3_BUFFER_add_offset(&wb[currbuf], i);
if (currbuf + 1 < s->rlayer.numwpipes)
continue;
s->rwstate = SSL_NOTHING; s->rwstate = SSL_NOTHING;
return (s->rlayer.wpend_ret); return (s->rlayer.wpend_ret);
} else if (i <= 0) { } else if (i <= 0) {
...@@ -926,12 +1029,12 @@ int ssl3_write_pending(SSL *s, int type, const unsigned char *buf, ...@@ -926,12 +1029,12 @@ int ssl3_write_pending(SSL *s, int type, const unsigned char *buf,
* For DTLS, just drop it. That's kind of the whole point in * For DTLS, just drop it. That's kind of the whole point in
* using a datagram service * using a datagram service
*/ */
SSL3_BUFFER_set_left(wb, 0); SSL3_BUFFER_set_left(&wb[currbuf], 0);
} }
return (i); return (i);
} }
SSL3_BUFFER_add_offset(wb, i); SSL3_BUFFER_add_offset(&wb[currbuf], i);
SSL3_BUFFER_add_left(wb, -i); SSL3_BUFFER_add_left(&wb[currbuf], -i);
} }
} }
......
...@@ -252,10 +252,12 @@ typedef struct record_layer_st { ...@@ -252,10 +252,12 @@ typedef struct record_layer_st {
int read_ahead; int read_ahead;
/* where we are when reading */ /* where we are when reading */
int rstate; int rstate;
unsigned int numwpipes;
/* read IO goes into here */ /* read IO goes into here */
SSL3_BUFFER rbuf; SSL3_BUFFER rbuf;
/* write IO goes into here */ /* write IO goes into here */
SSL3_BUFFER wbuf; SSL3_BUFFER wbuf[SSL_MAX_PIPELINES];
/* each decoded record goes in here */ /* each decoded record goes in here */
SSL3_RECORD rrec; SSL3_RECORD rrec;
/* goes out from here */ /* goes out from here */
...@@ -326,16 +328,19 @@ unsigned int RECORD_LAYER_get_rrec_length(RECORD_LAYER *rl); ...@@ -326,16 +328,19 @@ unsigned int RECORD_LAYER_get_rrec_length(RECORD_LAYER *rl);
__owur int ssl3_pending(const SSL *s); __owur int ssl3_pending(const SSL *s);
__owur int ssl3_write_bytes(SSL *s, int type, const void *buf, int len); __owur int ssl3_write_bytes(SSL *s, int type, const void *buf, int len);
__owur int do_ssl3_write(SSL *s, int type, const unsigned char *buf, __owur int do_ssl3_write(SSL *s, int type, const unsigned char *buf,
unsigned int len, int create_empty_fragment); unsigned int *pipelens, unsigned int numpipes,
int create_empty_fragment);
__owur int ssl3_read_bytes(SSL *s, int type, int *recvd_type, __owur int ssl3_read_bytes(SSL *s, int type, int *recvd_type,
unsigned char *buf, int len, int peek); unsigned char *buf, int len, int peek);
__owur int ssl3_setup_buffers(SSL *s); __owur int ssl3_setup_buffers(SSL *s);
__owur int ssl3_enc(SSL *s, int send_data); __owur int ssl3_enc(SSL *s, SSL3_RECORD *inrecs, unsigned int numpipes,
__owur int n_ssl3_mac(SSL *ssl, unsigned char *md, int send_data); int send);
__owur int n_ssl3_mac(SSL *ssl, SSL3_RECORD *rec, unsigned char *md, int send);
__owur int ssl3_write_pending(SSL *s, int type, const unsigned char *buf, __owur int ssl3_write_pending(SSL *s, int type, const unsigned char *buf,
unsigned int len); unsigned int len);
__owur int tls1_enc(SSL *s, int snd); __owur int tls1_enc(SSL *s, SSL3_RECORD *recs, unsigned int numpipes,
__owur int tls1_mac(SSL *ssl, unsigned char *md, int snd); int send);
__owur int tls1_mac(SSL *ssl, SSL3_RECORD *rec, unsigned char *md, int send);
int DTLS_RECORD_LAYER_new(RECORD_LAYER *rl); int DTLS_RECORD_LAYER_new(RECORD_LAYER *rl);
void DTLS_RECORD_LAYER_free(RECORD_LAYER *rl); void DTLS_RECORD_LAYER_free(RECORD_LAYER *rl);
void DTLS_RECORD_LAYER_clear(RECORD_LAYER *rl); void DTLS_RECORD_LAYER_clear(RECORD_LAYER *rl);
......
...@@ -119,7 +119,7 @@ ...@@ -119,7 +119,7 @@
/* Functions/macros provided by the RECORD_LAYER component */ /* Functions/macros provided by the RECORD_LAYER component */
#define RECORD_LAYER_get_rbuf(rl) (&(rl)->rbuf) #define RECORD_LAYER_get_rbuf(rl) (&(rl)->rbuf)
#define RECORD_LAYER_get_wbuf(rl) (&(rl)->wbuf) #define RECORD_LAYER_get_wbuf(rl) ((rl)->wbuf)
#define RECORD_LAYER_get_rrec(rl) (&(rl)->rrec) #define RECORD_LAYER_get_rrec(rl) (&(rl)->rrec)
#define RECORD_LAYER_get_wrec(rl) (&(rl)->wrec) #define RECORD_LAYER_get_wrec(rl) (&(rl)->wrec)
#define RECORD_LAYER_set_packet(rl, p) ((rl)->packet = (p)) #define RECORD_LAYER_set_packet(rl, p) ((rl)->packet = (p))
...@@ -165,7 +165,7 @@ void SSL3_BUFFER_clear(SSL3_BUFFER *b); ...@@ -165,7 +165,7 @@ void SSL3_BUFFER_clear(SSL3_BUFFER *b);
void SSL3_BUFFER_set_data(SSL3_BUFFER *b, const unsigned char *d, int n); void SSL3_BUFFER_set_data(SSL3_BUFFER *b, const unsigned char *d, int n);
void SSL3_BUFFER_release(SSL3_BUFFER *b); void SSL3_BUFFER_release(SSL3_BUFFER *b);
__owur int ssl3_setup_read_buffer(SSL *s); __owur int ssl3_setup_read_buffer(SSL *s);
__owur int ssl3_setup_write_buffer(SSL *s); __owur int ssl3_setup_write_buffer(SSL *s, unsigned int numwpipes);
int ssl3_release_read_buffer(SSL *s); int ssl3_release_read_buffer(SSL *s);
int ssl3_release_write_buffer(SSL *s); int ssl3_release_write_buffer(SSL *s);
...@@ -194,7 +194,7 @@ void SSL3_RECORD_release(SSL3_RECORD *r); ...@@ -194,7 +194,7 @@ void SSL3_RECORD_release(SSL3_RECORD *r);
int SSL3_RECORD_setup(SSL3_RECORD *r); int SSL3_RECORD_setup(SSL3_RECORD *r);
void SSL3_RECORD_set_seq_num(SSL3_RECORD *r, const unsigned char *seq_num); void SSL3_RECORD_set_seq_num(SSL3_RECORD *r, const unsigned char *seq_num);
int ssl3_get_record(SSL *s); int ssl3_get_record(SSL *s);
__owur int ssl3_do_compress(SSL *ssl); __owur int ssl3_do_compress(SSL *ssl, SSL3_RECORD *wr);
__owur int ssl3_do_uncompress(SSL *ssl); __owur int ssl3_do_uncompress(SSL *ssl);
void ssl3_cbc_copy_mac(unsigned char *out, void ssl3_cbc_copy_mac(unsigned char *out,
const SSL3_RECORD *rec, unsigned md_size); const SSL3_RECORD *rec, unsigned md_size);
......
...@@ -176,13 +176,15 @@ int ssl3_setup_read_buffer(SSL *s) ...@@ -176,13 +176,15 @@ int ssl3_setup_read_buffer(SSL *s)
return 0; return 0;
} }
int ssl3_setup_write_buffer(SSL *s) int ssl3_setup_write_buffer(SSL *s, unsigned int numwpipes)
{ {
unsigned char *p; unsigned char *p;
size_t len, align = 0, headerlen; size_t len, align = 0, headerlen;
SSL3_BUFFER *wb; SSL3_BUFFER *wb;
unsigned int currpipe;
s->rlayer.numwpipes = numwpipes;
wb = RECORD_LAYER_get_wbuf(&s->rlayer);
if (SSL_IS_DTLS(s)) if (SSL_IS_DTLS(s))
headerlen = DTLS1_RT_HEADER_LENGTH + 1; headerlen = DTLS1_RT_HEADER_LENGTH + 1;
...@@ -193,20 +195,25 @@ int ssl3_setup_write_buffer(SSL *s) ...@@ -193,20 +195,25 @@ int ssl3_setup_write_buffer(SSL *s)
align = (-SSL3_RT_HEADER_LENGTH) & (SSL3_ALIGN_PAYLOAD - 1); align = (-SSL3_RT_HEADER_LENGTH) & (SSL3_ALIGN_PAYLOAD - 1);
#endif #endif
if (wb->buf == NULL) { len = s->max_send_fragment
len = s->max_send_fragment + SSL3_RT_SEND_MAX_ENCRYPTED_OVERHEAD + headerlen + align;
+ SSL3_RT_SEND_MAX_ENCRYPTED_OVERHEAD + headerlen + align;
#ifndef OPENSSL_NO_COMP #ifndef OPENSSL_NO_COMP
if (ssl_allow_compression(s)) if (ssl_allow_compression(s))
len += SSL3_RT_MAX_COMPRESSED_OVERHEAD; len += SSL3_RT_MAX_COMPRESSED_OVERHEAD;
#endif #endif
if (!(s->options & SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS)) if (!(s->options & SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS))
len += headerlen + align + SSL3_RT_SEND_MAX_ENCRYPTED_OVERHEAD; len += headerlen + align + SSL3_RT_SEND_MAX_ENCRYPTED_OVERHEAD;
if ((p = OPENSSL_malloc(len)) == NULL) wb = RECORD_LAYER_get_wbuf(&s->rlayer);
goto err; for (currpipe = 0; currpipe < numwpipes; currpipe++) {
wb->buf = p; if (wb[currpipe].buf == NULL) {
wb->len = len; if ((p = OPENSSL_malloc(len)) == NULL) {
s->rlayer.numwpipes = currpipe;
goto err;
}
wb[currpipe].buf = p;
wb[currpipe].len = len;
}
} }
return 1; return 1;
...@@ -220,7 +227,7 @@ int ssl3_setup_buffers(SSL *s) ...@@ -220,7 +227,7 @@ int ssl3_setup_buffers(SSL *s)
{ {
if (!ssl3_setup_read_buffer(s)) if (!ssl3_setup_read_buffer(s))
return 0; return 0;
if (!ssl3_setup_write_buffer(s)) if (!ssl3_setup_write_buffer(s, 1))
return 0; return 0;
return 1; return 1;
} }
...@@ -228,11 +235,17 @@ int ssl3_setup_buffers(SSL *s) ...@@ -228,11 +235,17 @@ int ssl3_setup_buffers(SSL *s)
int ssl3_release_write_buffer(SSL *s) int ssl3_release_write_buffer(SSL *s)
{ {
SSL3_BUFFER *wb; SSL3_BUFFER *wb;
unsigned int pipes;
wb = RECORD_LAYER_get_wbuf(&s->rlayer); pipes = s->rlayer.numwpipes;
while (pipes > 0) {
wb = &RECORD_LAYER_get_wbuf(&s->rlayer)[pipes - 1];
OPENSSL_free(wb->buf); OPENSSL_free(wb->buf);
wb->buf = NULL; wb->buf = NULL;
pipes--;
}
s->rlayer.numwpipes = 0;
return 1; return 1;
} }
......
...@@ -373,7 +373,7 @@ int ssl3_get_record(SSL *s) ...@@ -373,7 +373,7 @@ int ssl3_get_record(SSL *s)
} }
rr->length -= mac_size; rr->length -= mac_size;
mac = rr->data + rr->length; mac = rr->data + rr->length;
i = s->method->ssl3_enc->mac(s, md, 0 /* not send */ ); i = s->method->ssl3_enc->mac(s, rr, md, 0 /* not send */ );
if (i < 0 || CRYPTO_memcmp(md, mac, (size_t)mac_size) != 0) { if (i < 0 || CRYPTO_memcmp(md, mac, (size_t)mac_size) != 0) {
al = SSL_AD_BAD_RECORD_MAC; al = SSL_AD_BAD_RECORD_MAC;
SSLerr(SSL_F_SSL3_GET_RECORD, SSLerr(SSL_F_SSL3_GET_RECORD,
...@@ -382,7 +382,7 @@ int ssl3_get_record(SSL *s) ...@@ -382,7 +382,7 @@ int ssl3_get_record(SSL *s)
} }
} }
enc_err = s->method->ssl3_enc->enc(s, 0); enc_err = s->method->ssl3_enc->enc(s, rr, 1, 0);
/*- /*-
* enc_err is: * enc_err is:
* 0: (in non-constant time) if the record is publically invalid. * 0: (in non-constant time) if the record is publically invalid.
...@@ -449,7 +449,7 @@ int ssl3_get_record(SSL *s) ...@@ -449,7 +449,7 @@ int ssl3_get_record(SSL *s)
mac = &rr->data[rr->length]; mac = &rr->data[rr->length];
} }
i = s->method->ssl3_enc->mac(s, md, 0 /* not send */ ); i = s->method->ssl3_enc->mac(s, rr, md, 0 /* not send */ );
if (i < 0 || mac == NULL if (i < 0 || mac == NULL
|| CRYPTO_memcmp(md, mac, (size_t)mac_size) != 0) || CRYPTO_memcmp(md, mac, (size_t)mac_size) != 0)
enc_err = -1; enc_err = -1;
...@@ -542,13 +542,11 @@ int ssl3_do_uncompress(SSL *ssl) ...@@ -542,13 +542,11 @@ int ssl3_do_uncompress(SSL *ssl)
return (1); return (1);
} }
int ssl3_do_compress(SSL *ssl) int ssl3_do_compress(SSL *ssl, SSL3_RECORD *wr)
{ {
#ifndef OPENSSL_NO_COMP #ifndef OPENSSL_NO_COMP
int i; int i;
SSL3_RECORD *wr;
wr = RECORD_LAYER_get_wrec(&ssl->rlayer);
i = COMP_compress_block(ssl->compress, wr->data, i = COMP_compress_block(ssl->compress, wr->data,
SSL3_RT_MAX_COMPRESSED_LENGTH, SSL3_RT_MAX_COMPRESSED_LENGTH,
wr->input, (int)wr->length); wr->input, (int)wr->length);
...@@ -572,7 +570,7 @@ int ssl3_do_compress(SSL *ssl) ...@@ -572,7 +570,7 @@ int ssl3_do_compress(SSL *ssl)
* -1: if the record's padding is invalid or, if sending, an internal error * -1: if the record's padding is invalid or, if sending, an internal error
* occurred. * occurred.
*/ */
int ssl3_enc(SSL *s, int send) int ssl3_enc(SSL *s, SSL3_RECORD *inrecs, unsigned int numpipes, int send)
{ {
SSL3_RECORD *rec; SSL3_RECORD *rec;
EVP_CIPHER_CTX *ds; EVP_CIPHER_CTX *ds;
...@@ -580,16 +578,15 @@ int ssl3_enc(SSL *s, int send) ...@@ -580,16 +578,15 @@ int ssl3_enc(SSL *s, int send)
int bs, i, mac_size = 0; int bs, i, mac_size = 0;
const EVP_CIPHER *enc; const EVP_CIPHER *enc;
rec = inrecs;
if (send) { if (send) {
ds = s->enc_write_ctx; ds = s->enc_write_ctx;
rec = RECORD_LAYER_get_wrec(&s->rlayer);
if (s->enc_write_ctx == NULL) if (s->enc_write_ctx == NULL)
enc = NULL; enc = NULL;
else else
enc = EVP_CIPHER_CTX_cipher(s->enc_write_ctx); enc = EVP_CIPHER_CTX_cipher(s->enc_write_ctx);
} else { } else {
ds = s->enc_read_ctx; ds = s->enc_read_ctx;
rec = RECORD_LAYER_get_rrec(&s->rlayer);
if (s->enc_read_ctx == NULL) if (s->enc_read_ctx == NULL)
enc = NULL; enc = NULL;
else else
...@@ -646,13 +643,14 @@ int ssl3_enc(SSL *s, int send) ...@@ -646,13 +643,14 @@ int ssl3_enc(SSL *s, int send)
* -1: if the record's padding/AEAD-authenticator is invalid or, if sending, * -1: if the record's padding/AEAD-authenticator is invalid or, if sending,
* an internal error occurred. * an internal error occurred.
*/ */
int tls1_enc(SSL *s, int send) int tls1_enc(SSL *s, SSL3_RECORD *recs, unsigned int numpipes, int send)
{ {
SSL3_RECORD *rec;
EVP_CIPHER_CTX *ds; EVP_CIPHER_CTX *ds;
unsigned long l; size_t reclen[SSL_MAX_PIPELINES];
unsigned char buf[SSL_MAX_PIPELINES][EVP_AEAD_TLS1_AAD_LEN];
int bs, i, j, k, pad = 0, ret, mac_size = 0; int bs, i, j, k, pad = 0, ret, mac_size = 0;
const EVP_CIPHER *enc; const EVP_CIPHER *enc;
unsigned int ctr;
if (send) { if (send) {
if (EVP_MD_CTX_md(s->write_hash)) { if (EVP_MD_CTX_md(s->write_hash)) {
...@@ -660,7 +658,6 @@ int tls1_enc(SSL *s, int send) ...@@ -660,7 +658,6 @@ int tls1_enc(SSL *s, int send)
OPENSSL_assert(n >= 0); OPENSSL_assert(n >= 0);
} }
ds = s->enc_write_ctx; ds = s->enc_write_ctx;
rec = RECORD_LAYER_get_wrec(&s->rlayer);
if (s->enc_write_ctx == NULL) if (s->enc_write_ctx == NULL)
enc = NULL; enc = NULL;
else { else {
...@@ -673,14 +670,19 @@ int tls1_enc(SSL *s, int send) ...@@ -673,14 +670,19 @@ int tls1_enc(SSL *s, int send)
else else
ivlen = 0; ivlen = 0;
if (ivlen > 1) { if (ivlen > 1) {
if (rec->data != rec->input) for (ctr = 0; ctr < numpipes; ctr++) {
/* if (recs[ctr].data != recs[ctr].input) {
* we can't write into the input stream: Can this ever /*
* happen?? (steve) * we can't write into the input stream: Can this ever
*/ * happen?? (steve)
fprintf(stderr, "tls1_enc(): rec->data != rec->input\n"); */
else if (RAND_bytes(rec->input, ivlen) <= 0) SSLerr(SSL_F_TLS1_ENC, ERR_R_INTERNAL_ERROR);
return -1; return -1;
} else if (RAND_bytes(recs[ctr].input, ivlen) <= 0) {
SSLerr(SSL_F_TLS1_ENC, ERR_R_INTERNAL_ERROR);
return -1;
}
}
} }
} }
} else { } else {
...@@ -689,7 +691,6 @@ int tls1_enc(SSL *s, int send) ...@@ -689,7 +691,6 @@ int tls1_enc(SSL *s, int send)
OPENSSL_assert(n >= 0); OPENSSL_assert(n >= 0);
} }
ds = s->enc_read_ctx; ds = s->enc_read_ctx;
rec = RECORD_LAYER_get_rrec(&s->rlayer);
if (s->enc_read_ctx == NULL) if (s->enc_read_ctx == NULL)
enc = NULL; enc = NULL;
else else
...@@ -697,97 +698,146 @@ int tls1_enc(SSL *s, int send) ...@@ -697,97 +698,146 @@ int tls1_enc(SSL *s, int send)
} }
if ((s->session == NULL) || (ds == NULL) || (enc == NULL)) { if ((s->session == NULL) || (ds == NULL) || (enc == NULL)) {
memmove(rec->data, rec->input, rec->length); for (ctr = 0; ctr < numpipes; ctr++) {
rec->input = rec->data; memmove(recs[ctr].data, recs[ctr].input, recs[ctr].length);
recs[ctr].input = recs[ctr].data;
}
ret = 1; ret = 1;
} else { } else {
l = rec->length; bs = EVP_CIPHER_block_size(EVP_CIPHER_CTX_cipher(ds));
bs = EVP_CIPHER_CTX_block_size(ds);
if (numpipes > 1) {
if(!(EVP_CIPHER_flags(EVP_CIPHER_CTX_cipher(ds))
& EVP_CIPH_FLAG_PIPELINE)) {
/*
* We shouldn't have been called with pipeline data if the
* cipher doesn't support pipelining
*/
SSLerr(SSL_F_TLS1_ENC, SSL_R_PIPELINE_FAILURE);
return -1;
}
}
for (ctr = 0; ctr < numpipes; ctr++) {
reclen[ctr] = recs[ctr].length;
if (EVP_CIPHER_flags(EVP_CIPHER_CTX_cipher(ds))
& EVP_CIPH_FLAG_AEAD_CIPHER) {
unsigned char *seq;
seq = send ? RECORD_LAYER_get_write_sequence(&s->rlayer)
: RECORD_LAYER_get_read_sequence(&s->rlayer);
if (SSL_IS_DTLS(s)) {
/* DTLS does not support pipelining */
unsigned char dtlsseq[9], *p = dtlsseq;
s2n(send ? DTLS_RECORD_LAYER_get_w_epoch(&s->rlayer) :
DTLS_RECORD_LAYER_get_r_epoch(&s->rlayer), p);
memcpy(p, &seq[2], 6);
memcpy(buf[ctr], dtlsseq, 8);
} else {
memcpy(buf[ctr], seq, 8);
for (i = 7; i >= 0; i--) { /* increment */
++seq[i];
if (seq[i] != 0)
break;
}
}
if (EVP_CIPHER_flags(EVP_CIPHER_CTX_cipher(ds)) & EVP_CIPH_FLAG_AEAD_CIPHER) { buf[ctr][8] = recs[ctr].type;
unsigned char buf[EVP_AEAD_TLS1_AAD_LEN], *seq; buf[ctr][9] = (unsigned char)(s->version >> 8);
buf[ctr][10] = (unsigned char)(s->version);
seq = send ? RECORD_LAYER_get_write_sequence(&s->rlayer) buf[ctr][11] = recs[ctr].length >> 8;
: RECORD_LAYER_get_read_sequence(&s->rlayer); buf[ctr][12] = recs[ctr].length & 0xff;
pad = EVP_CIPHER_CTX_ctrl(ds, EVP_CTRL_AEAD_TLS1_AAD,
if (SSL_IS_DTLS(s)) { EVP_AEAD_TLS1_AAD_LEN, buf[ctr]);
unsigned char dtlsseq[9], *p = dtlsseq; if (pad <= 0)
return -1;
s2n(send ? DTLS_RECORD_LAYER_get_w_epoch(&s->rlayer) :
DTLS_RECORD_LAYER_get_r_epoch(&s->rlayer), p); if (send) {
memcpy(p, &seq[2], 6); reclen[ctr] += pad;
memcpy(buf, dtlsseq, 8); recs[ctr].length += pad;
} else {
memcpy(buf, seq, 8);
for (i = 7; i >= 0; i--) { /* increment */
++seq[i];
if (seq[i] != 0)
break;
} }
}
buf[8] = rec->type; } else if ((bs != 1) && send) {
buf[9] = (unsigned char)(s->version >> 8); i = bs - ((int)reclen[ctr] % bs);
buf[10] = (unsigned char)(s->version);
buf[11] = rec->length >> 8;
buf[12] = rec->length & 0xff;
pad = EVP_CIPHER_CTX_ctrl(ds, EVP_CTRL_AEAD_TLS1_AAD,
EVP_AEAD_TLS1_AAD_LEN, buf);
if (pad <= 0)
return -1;
if (send) {
l += pad;
rec->length += pad;
}
} else if ((bs != 1) && send) {
i = bs - ((int)l % bs);
/* Add weird padding of upto 256 bytes */ /* Add weird padding of upto 256 bytes */
/* we need to add 'i' padding bytes of value j */ /* we need to add 'i' padding bytes of value j */
j = i - 1; j = i - 1;
for (k = (int)l; k < (int)(l + i); k++) for (k = (int)reclen[ctr]; k < (int)(reclen[ctr] + i); k++)
rec->input[k] = j; recs[ctr].input[k] = j;
l += i; reclen[ctr] += i;
rec->length += i; recs[ctr].length += i;
}
if (!send) {
if (reclen[ctr] == 0 || reclen[ctr] % bs != 0)
return 0;
}
} }
if (numpipes > 1) {
unsigned char *data[SSL_MAX_PIPELINES];
if (!send) { /* Set the output buffers */
if (l == 0 || l % bs != 0) for(ctr = 0; ctr < numpipes; ctr++) {
return 0; data[ctr] = recs[ctr].data;
}
if (EVP_CIPHER_CTX_ctrl(ds, EVP_CTRL_SET_PIPELINE_OUTPUT_BUFS,
numpipes, data) <= 0) {
SSLerr(SSL_F_TLS1_ENC, SSL_R_PIPELINE_FAILURE);
}
/* Set the input buffers */
for(ctr = 0; ctr < numpipes; ctr++) {
data[ctr] = recs[ctr].input;
}
if (EVP_CIPHER_CTX_ctrl(ds, EVP_CTRL_SET_PIPELINE_INPUT_BUFS,
numpipes, data) <= 0
|| EVP_CIPHER_CTX_ctrl(ds, EVP_CTRL_SET_PIPELINE_INPUT_LENS,
numpipes, reclen) <= 0) {
SSLerr(SSL_F_TLS1_ENC, SSL_R_PIPELINE_FAILURE);
return -1;
}
} }
i = EVP_Cipher(ds, rec->data, rec->input, l); i = EVP_Cipher(ds, recs[0].data, recs[0].input, reclen[0]);
if ((EVP_CIPHER_flags(EVP_CIPHER_CTX_cipher(ds)) & EVP_CIPH_FLAG_CUSTOM_CIPHER) if ((EVP_CIPHER_flags(EVP_CIPHER_CTX_cipher(ds))
& EVP_CIPH_FLAG_CUSTOM_CIPHER)
? (i < 0) ? (i < 0)
: (i == 0)) : (i == 0))
return -1; /* AEAD can fail to verify MAC */ return -1; /* AEAD can fail to verify MAC */
if (send == 0) { if (send == 0) {
if (EVP_CIPHER_mode(enc) == EVP_CIPH_GCM_MODE) { if (EVP_CIPHER_mode(enc) == EVP_CIPH_GCM_MODE) {
rec->data += EVP_GCM_TLS_EXPLICIT_IV_LEN; for (ctr = 0; ctr < numpipes; ctr++) {
rec->input += EVP_GCM_TLS_EXPLICIT_IV_LEN; recs[ctr].data += EVP_GCM_TLS_EXPLICIT_IV_LEN;
rec->length -= EVP_GCM_TLS_EXPLICIT_IV_LEN; recs[ctr].input += EVP_GCM_TLS_EXPLICIT_IV_LEN;
recs[ctr].length -= EVP_GCM_TLS_EXPLICIT_IV_LEN;
}
} else if (EVP_CIPHER_mode(enc) == EVP_CIPH_CCM_MODE) { } else if (EVP_CIPHER_mode(enc) == EVP_CIPH_CCM_MODE) {
rec->data += EVP_CCM_TLS_EXPLICIT_IV_LEN; for (ctr = 0; ctr < numpipes; ctr++) {
rec->input += EVP_CCM_TLS_EXPLICIT_IV_LEN; recs[ctr].data += EVP_CCM_TLS_EXPLICIT_IV_LEN;
rec->length -= EVP_CCM_TLS_EXPLICIT_IV_LEN; recs[ctr].input += EVP_CCM_TLS_EXPLICIT_IV_LEN;
recs[ctr].length -= EVP_CCM_TLS_EXPLICIT_IV_LEN;
}
} }
} }
ret = 1; ret = 1;
if (!SSL_USE_ETM(s) && EVP_MD_CTX_md(s->read_hash) != NULL) if (!SSL_USE_ETM(s) && EVP_MD_CTX_md(s->read_hash) != NULL)
mac_size = EVP_MD_CTX_size(s->read_hash); mac_size = EVP_MD_CTX_size(s->read_hash);
if ((bs != 1) && !send) if ((bs != 1) && !send) {
ret = tls1_cbc_remove_padding(s, rec, bs, mac_size); /* TODO: We only support writing for pipelining at the moment */
ret = tls1_cbc_remove_padding(s, recs, bs, mac_size);
}
if (pad && !send) if (pad && !send)
rec->length -= pad; recs[0].length -= pad;
} }
return ret; return ret;
} }
int n_ssl3_mac(SSL *ssl, unsigned char *md, int send) int n_ssl3_mac(SSL *ssl, SSL3_RECORD *rec, unsigned char *md, int send)
{ {
SSL3_RECORD *rec;
unsigned char *mac_sec, *seq; unsigned char *mac_sec, *seq;
const EVP_MD_CTX *hash; const EVP_MD_CTX *hash;
unsigned char *p, rec_char; unsigned char *p, rec_char;
...@@ -796,12 +846,10 @@ int n_ssl3_mac(SSL *ssl, unsigned char *md, int send) ...@@ -796,12 +846,10 @@ int n_ssl3_mac(SSL *ssl, unsigned char *md, int send)
int t; int t;
if (send) { if (send) {
rec = RECORD_LAYER_get_wrec(&ssl->rlayer);
mac_sec = &(ssl->s3->write_mac_secret[0]); mac_sec = &(ssl->s3->write_mac_secret[0]);
seq = RECORD_LAYER_get_write_sequence(&ssl->rlayer); seq = RECORD_LAYER_get_write_sequence(&ssl->rlayer);
hash = ssl->write_hash; hash = ssl->write_hash;
} else { } else {
rec = RECORD_LAYER_get_rrec(&ssl->rlayer);
mac_sec = &(ssl->s3->read_mac_secret[0]); mac_sec = &(ssl->s3->read_mac_secret[0]);
seq = RECORD_LAYER_get_read_sequence(&ssl->rlayer); seq = RECORD_LAYER_get_read_sequence(&ssl->rlayer);
hash = ssl->read_hash; hash = ssl->read_hash;
...@@ -885,9 +933,8 @@ int n_ssl3_mac(SSL *ssl, unsigned char *md, int send) ...@@ -885,9 +933,8 @@ int n_ssl3_mac(SSL *ssl, unsigned char *md, int send)
return (md_size); return (md_size);
} }
int tls1_mac(SSL *ssl, unsigned char *md, int send) int tls1_mac(SSL *ssl, SSL3_RECORD *rec, unsigned char *md, int send)
{ {
SSL3_RECORD *rec;
unsigned char *seq; unsigned char *seq;
EVP_MD_CTX *hash; EVP_MD_CTX *hash;
size_t md_size; size_t md_size;
...@@ -899,11 +946,9 @@ int tls1_mac(SSL *ssl, unsigned char *md, int send) ...@@ -899,11 +946,9 @@ int tls1_mac(SSL *ssl, unsigned char *md, int send)
int t; int t;
if (send) { if (send) {
rec = RECORD_LAYER_get_wrec(&ssl->rlayer);
seq = RECORD_LAYER_get_write_sequence(&ssl->rlayer); seq = RECORD_LAYER_get_write_sequence(&ssl->rlayer);
hash = ssl->write_hash; hash = ssl->write_hash;
} else { } else {
rec = RECORD_LAYER_get_rrec(&ssl->rlayer);
seq = RECORD_LAYER_get_read_sequence(&ssl->rlayer); seq = RECORD_LAYER_get_read_sequence(&ssl->rlayer);
hash = ssl->read_hash; hash = ssl->read_hash;
} }
...@@ -1253,7 +1298,7 @@ int dtls1_process_record(SSL *s) ...@@ -1253,7 +1298,7 @@ int dtls1_process_record(SSL *s)
rr->data = rr->input; rr->data = rr->input;
rr->orig_len = rr->length; rr->orig_len = rr->length;
enc_err = s->method->ssl3_enc->enc(s, 0); enc_err = s->method->ssl3_enc->enc(s, rr, 1, 0);
/*- /*-
* enc_err is: * enc_err is:
* 0: (in non-constant time) if the record is publically invalid. * 0: (in non-constant time) if the record is publically invalid.
...@@ -1320,7 +1365,7 @@ int dtls1_process_record(SSL *s) ...@@ -1320,7 +1365,7 @@ int dtls1_process_record(SSL *s)
mac = &rr->data[rr->length]; mac = &rr->data[rr->length];
} }
i = s->method->ssl3_enc->mac(s, md, 0 /* not send */ ); i = s->method->ssl3_enc->mac(s, rr, md, 0 /* not send */ );
if (i < 0 || mac == NULL if (i < 0 || mac == NULL
|| CRYPTO_memcmp(md, mac, (size_t)mac_size) != 0) || CRYPTO_memcmp(md, mac, (size_t)mac_size) != 0)
enc_err = -1; enc_err = -1;
......
...@@ -192,10 +192,12 @@ int ssl3_send_alert(SSL *s, int level, int desc) ...@@ -192,10 +192,12 @@ int ssl3_send_alert(SSL *s, int level, int desc)
int ssl3_dispatch_alert(SSL *s) int ssl3_dispatch_alert(SSL *s)
{ {
int i, j; int i, j;
unsigned int alertlen;
void (*cb) (const SSL *ssl, int type, int val) = NULL; void (*cb) (const SSL *ssl, int type, int val) = NULL;
s->s3->alert_dispatch = 0; s->s3->alert_dispatch = 0;
i = do_ssl3_write(s, SSL3_RT_ALERT, &s->s3->send_alert[0], 2, 0); alertlen = 2;
i = do_ssl3_write(s, SSL3_RT_ALERT, &s->s3->send_alert[0], &alertlen, 1, 0);
if (i <= 0) { if (i <= 0) {
s->s3->alert_dispatch = 1; s->s3->alert_dispatch = 1;
} else { } else {
......
...@@ -290,6 +290,7 @@ static ERR_STRING_DATA SSL_str_functs[] = { ...@@ -290,6 +290,7 @@ static ERR_STRING_DATA SSL_str_functs[] = {
"tls1_check_duplicate_extensions"}, "tls1_check_duplicate_extensions"},
{ERR_FUNC(SSL_F_TLS1_CHECK_SERVERHELLO_TLSEXT), {ERR_FUNC(SSL_F_TLS1_CHECK_SERVERHELLO_TLSEXT),
"TLS1_CHECK_SERVERHELLO_TLSEXT"}, "TLS1_CHECK_SERVERHELLO_TLSEXT"},
{ERR_FUNC(SSL_F_TLS1_ENC), "tls1_enc"},
{ERR_FUNC(SSL_F_TLS1_EXPORT_KEYING_MATERIAL), {ERR_FUNC(SSL_F_TLS1_EXPORT_KEYING_MATERIAL),
"tls1_export_keying_material"}, "tls1_export_keying_material"},
{ERR_FUNC(SSL_F_TLS1_GET_CURVELIST), "tls1_get_curvelist"}, {ERR_FUNC(SSL_F_TLS1_GET_CURVELIST), "tls1_get_curvelist"},
...@@ -570,6 +571,7 @@ static ERR_STRING_DATA SSL_str_reasons[] = { ...@@ -570,6 +571,7 @@ static ERR_STRING_DATA SSL_str_reasons[] = {
"peer did not return a certificate"}, "peer did not return a certificate"},
{ERR_REASON(SSL_R_PEM_NAME_BAD_PREFIX), "pem name bad prefix"}, {ERR_REASON(SSL_R_PEM_NAME_BAD_PREFIX), "pem name bad prefix"},
{ERR_REASON(SSL_R_PEM_NAME_TOO_SHORT), "pem name too short"}, {ERR_REASON(SSL_R_PEM_NAME_TOO_SHORT), "pem name too short"},
{ERR_REASON(SSL_R_PIPELINE_FAILURE), "pipeline failure"},
{ERR_REASON(SSL_R_PRE_MAC_LENGTH_TOO_LONG), "pre mac length too long"}, {ERR_REASON(SSL_R_PRE_MAC_LENGTH_TOO_LONG), "pre mac length too long"},
{ERR_REASON(SSL_R_PROTOCOL_IS_SHUTDOWN), "protocol is shutdown"}, {ERR_REASON(SSL_R_PROTOCOL_IS_SHUTDOWN), "protocol is shutdown"},
{ERR_REASON(SSL_R_PSK_IDENTITY_NOT_FOUND), "psk identity not found"}, {ERR_REASON(SSL_R_PSK_IDENTITY_NOT_FOUND), "psk identity not found"},
......
...@@ -170,8 +170,8 @@ SSL3_ENC_METHOD ssl3_undef_enc_method = { ...@@ -170,8 +170,8 @@ SSL3_ENC_METHOD ssl3_undef_enc_method = {
* evil casts, but these functions are only called if there's a library * evil casts, but these functions are only called if there's a library
* bug * bug
*/ */
(int (*)(SSL *, int))ssl_undefined_function, (int (*)(SSL *, SSL3_RECORD *, unsigned int, int))ssl_undefined_function,
(int (*)(SSL *, unsigned char *, int))ssl_undefined_function, (int (*)(SSL *, SSL3_RECORD *, unsigned char *, int))ssl_undefined_function,
ssl_undefined_function, ssl_undefined_function,
(int (*)(SSL *, unsigned char *, unsigned char *, int)) (int (*)(SSL *, unsigned char *, unsigned char *, int))
ssl_undefined_function, ssl_undefined_function,
...@@ -670,6 +670,8 @@ SSL *SSL_new(SSL_CTX *ctx) ...@@ -670,6 +670,8 @@ SSL *SSL_new(SSL_CTX *ctx)
X509_VERIFY_PARAM_inherit(s->param, ctx->param); X509_VERIFY_PARAM_inherit(s->param, ctx->param);
s->quiet_shutdown = ctx->quiet_shutdown; s->quiet_shutdown = ctx->quiet_shutdown;
s->max_send_fragment = ctx->max_send_fragment; s->max_send_fragment = ctx->max_send_fragment;
s->split_send_fragment = ctx->split_send_fragment;
s->max_pipelines = ctx->max_pipelines;
CRYPTO_add(&ctx->references, 1, CRYPTO_LOCK_SSL_CTX); CRYPTO_add(&ctx->references, 1, CRYPTO_LOCK_SSL_CTX);
s->ctx = ctx; s->ctx = ctx;
...@@ -1680,7 +1682,18 @@ long SSL_ctrl(SSL *s, int cmd, long larg, void *parg) ...@@ -1680,7 +1682,18 @@ long SSL_ctrl(SSL *s, int cmd, long larg, void *parg)
if (larg < 512 || larg > SSL3_RT_MAX_PLAIN_LENGTH) if (larg < 512 || larg > SSL3_RT_MAX_PLAIN_LENGTH)
return 0; return 0;
s->max_send_fragment = larg; s->max_send_fragment = larg;
if (s->max_send_fragment < s->split_send_fragment)
s->split_send_fragment = s->max_send_fragment;
return 1;
case SSL_CTRL_SET_SPLIT_SEND_FRAGMENT:
if (larg > s->max_send_fragment || larg == 0)
return 0;
s->split_send_fragment = larg;
return 1; return 1;
case SSL_CTRL_SET_MAX_PIPELINES:
if (larg < 1 || larg > SSL_MAX_PIPELINES)
return 0;
s->max_pipelines = larg;
case SSL_CTRL_GET_RI_SUPPORT: case SSL_CTRL_GET_RI_SUPPORT:
if (s->s3) if (s->s3)
return s->s3->send_connection_binding; return s->s3->send_connection_binding;
...@@ -1820,7 +1833,18 @@ long SSL_CTX_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg) ...@@ -1820,7 +1833,18 @@ long SSL_CTX_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg)
if (larg < 512 || larg > SSL3_RT_MAX_PLAIN_LENGTH) if (larg < 512 || larg > SSL3_RT_MAX_PLAIN_LENGTH)
return 0; return 0;
ctx->max_send_fragment = larg; ctx->max_send_fragment = larg;
if (ctx->max_send_fragment < ctx->split_send_fragment)
ctx->split_send_fragment = ctx->split_send_fragment;
return 1; return 1;
case SSL_CTRL_SET_SPLIT_SEND_FRAGMENT:
if (larg > ctx->max_send_fragment || larg == 0)
return 0;
ctx->split_send_fragment = larg;
return 1;
case SSL_CTRL_SET_MAX_PIPELINES:
if (larg < 1 || larg > SSL_MAX_PIPELINES)
return 0;
ctx->max_pipelines = larg;
case SSL_CTRL_CERT_FLAGS: case SSL_CTRL_CERT_FLAGS:
return (ctx->cert->cert_flags |= larg); return (ctx->cert->cert_flags |= larg);
case SSL_CTRL_CLEAR_CERT_FLAGS: case SSL_CTRL_CLEAR_CERT_FLAGS:
...@@ -2370,6 +2394,7 @@ SSL_CTX *SSL_CTX_new(const SSL_METHOD *meth) ...@@ -2370,6 +2394,7 @@ SSL_CTX *SSL_CTX_new(const SSL_METHOD *meth)
ret->comp_methods = SSL_COMP_get_compression_methods(); ret->comp_methods = SSL_COMP_get_compression_methods();
ret->max_send_fragment = SSL3_RT_MAX_PLAIN_LENGTH; ret->max_send_fragment = SSL3_RT_MAX_PLAIN_LENGTH;
ret->split_send_fragment = SSL3_RT_MAX_PLAIN_LENGTH;
/* Setup RFC4507 ticket keys */ /* Setup RFC4507 ticket keys */
if ((RAND_bytes(ret->tlsext_tick_key_name, 16) <= 0) if ((RAND_bytes(ret->tlsext_tick_key_name, 16) <= 0)
......
...@@ -829,12 +829,20 @@ struct ssl_ctx_st { ...@@ -829,12 +829,20 @@ struct ssl_ctx_st {
void *ct_validation_callback_arg; void *ct_validation_callback_arg;
# endif # endif
/*
* If we're using more than one pipeline how should we divide the data
* up between the pipes?
*/
unsigned int split_send_fragment;
/* /*
* Maximum amount of data to send in one fragment. actual record size can * Maximum amount of data to send in one fragment. actual record size can
* be more than this due to padding and MAC overheads. * be more than this due to padding and MAC overheads.
*/ */
unsigned int max_send_fragment; unsigned int max_send_fragment;
/* Up to how many pipelines should we use? If 0 then 1 is assumed */
unsigned int max_pipelines;
# ifndef OPENSSL_NO_ENGINE # ifndef OPENSSL_NO_ENGINE
/* /*
* Engine to pass requests for client certs to * Engine to pass requests for client certs to
...@@ -1085,8 +1093,21 @@ struct ssl_st { ...@@ -1085,8 +1093,21 @@ struct ssl_st {
int first_packet; int first_packet;
/* what was passed, used for SSLv3/TLS rollback check */ /* what was passed, used for SSLv3/TLS rollback check */
int client_version; int client_version;
/*
* If we're using more than one pipeline how should we divide the data
* up between the pipes?
*/
unsigned int split_send_fragment;
/*
* Maximum amount of data to send in one fragment. actual record size can
* be more than this due to padding and MAC overheads.
*/
unsigned int max_send_fragment; unsigned int max_send_fragment;
/* Up to how many pipelines should we use? If 0 then 1 is assumed */
unsigned int max_pipelines;
/* TLS extension debug callback */ /* TLS extension debug callback */
void (*tlsext_debug_cb) (SSL *s, int client_server, int type, void (*tlsext_debug_cb) (SSL *s, int client_server, int type,
const unsigned char *data, int len, void *arg); const unsigned char *data, int len, void *arg);
...@@ -1635,8 +1656,8 @@ struct tls_sigalgs_st { ...@@ -1635,8 +1656,8 @@ struct tls_sigalgs_st {
* of a mess of functions, but hell, think of it as an opaque structure :-) * of a mess of functions, but hell, think of it as an opaque structure :-)
*/ */
typedef struct ssl3_enc_method { typedef struct ssl3_enc_method {
int (*enc) (SSL *, int); int (*enc) (SSL *, SSL3_RECORD *, unsigned int, int);
int (*mac) (SSL *, unsigned char *, int); int (*mac) (SSL *, SSL3_RECORD *, unsigned char *, int);
int (*setup_key_block) (SSL *); int (*setup_key_block) (SSL *);
int (*generate_master_secret) (SSL *, unsigned char *, unsigned char *, int (*generate_master_secret) (SSL *, unsigned char *, unsigned char *,
int); int);
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册