awesome-grpc-that-works 0.12.2 → 0.14.0.dev
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.yardopts +1 -0
- data/Makefile +5783 -22121
- data/include/grpc/byte_buffer.h +2 -83
- data/include/grpc/census.h +173 -121
- data/include/grpc/compression.h +14 -38
- data/include/grpc/grpc.h +85 -434
- data/include/grpc/grpc_security.h +76 -46
- data/include/grpc/grpc_zookeeper.h +1 -1
- data/include/grpc/impl/codegen/alloc.h +74 -0
- data/include/grpc/impl/codegen/atm.h +92 -0
- data/include/grpc/impl/codegen/atm_gcc_atomic.h +72 -0
- data/include/grpc/impl/codegen/atm_gcc_sync.h +87 -0
- data/include/grpc/impl/codegen/atm_win32.h +125 -0
- data/include/grpc/impl/codegen/byte_buffer.h +121 -0
- data/include/grpc/impl/codegen/compression_types.h +73 -0
- data/include/grpc/impl/codegen/connectivity_state.h +59 -0
- data/include/grpc/impl/codegen/grpc_types.h +378 -0
- data/include/grpc/impl/codegen/log.h +110 -0
- data/include/grpc/impl/codegen/port_platform.h +370 -0
- data/include/grpc/impl/codegen/propagation_bits.h +67 -0
- data/include/grpc/impl/codegen/slice.h +182 -0
- data/include/grpc/impl/codegen/slice_buffer.h +105 -0
- data/include/grpc/impl/codegen/status.h +163 -0
- data/include/grpc/impl/codegen/sync.h +316 -0
- data/include/grpc/impl/codegen/sync_generic.h +55 -0
- data/{src/core/census/context.h → include/grpc/impl/codegen/sync_posix.h} +11 -11
- data/include/grpc/impl/codegen/sync_win32.h +49 -0
- data/include/grpc/impl/codegen/time.h +130 -0
- data/include/grpc/status.h +2 -126
- data/include/grpc/support/alloc.h +2 -35
- data/include/grpc/support/atm.h +2 -55
- data/include/grpc/support/atm_gcc_atomic.h +5 -38
- data/include/grpc/support/atm_gcc_sync.h +2 -50
- data/include/grpc/support/atm_win32.h +2 -88
- data/include/grpc/support/avl.h +10 -9
- data/include/grpc/support/cmdline.h +15 -13
- data/include/grpc/support/cpu.h +5 -3
- data/include/grpc/support/histogram.h +23 -20
- data/include/grpc/support/host_port.h +5 -3
- data/include/grpc/support/log.h +2 -71
- data/include/grpc/support/log_win32.h +2 -2
- data/include/grpc/support/port_platform.h +2 -319
- data/include/grpc/support/slice.h +2 -145
- data/include/grpc/support/slice_buffer.h +2 -65
- data/include/grpc/support/string_util.h +3 -3
- data/include/grpc/support/subprocess.h +8 -6
- data/include/grpc/support/sync.h +2 -278
- data/include/grpc/support/sync_generic.h +2 -18
- data/include/grpc/support/sync_posix.h +2 -10
- data/include/grpc/support/sync_win32.h +2 -12
- data/include/grpc/support/thd.h +11 -11
- data/include/grpc/support/time.h +2 -91
- data/include/grpc/support/tls.h +1 -1
- data/include/grpc/support/tls_gcc.h +1 -1
- data/include/grpc/support/tls_msvc.h +1 -1
- data/include/grpc/support/tls_pthread.h +2 -2
- data/include/grpc/support/useful.h +3 -1
- data/src/boringssl/err_data.c +1252 -0
- data/src/core/census/context.c +471 -8
- data/src/core/census/grpc_filter.c +5 -5
- data/src/core/census/initialize.c +4 -7
- data/src/core/census/mlog.c +600 -0
- data/src/core/census/mlog.h +95 -0
- data/src/core/census/operation.c +2 -2
- data/src/core/census/placeholders.c +109 -0
- data/src/core/census/rpc_metric_id.h +6 -6
- data/src/core/census/tracing.c +1 -1
- data/src/core/channel/channel_args.c +71 -9
- data/src/core/channel/channel_args.h +7 -1
- data/src/core/channel/channel_stack.c +1 -1
- data/src/core/channel/client_channel.c +33 -30
- data/src/core/channel/client_uchannel.c +3 -3
- data/src/core/channel/compress_filter.c +8 -8
- data/src/core/channel/http_client_filter.c +4 -4
- data/src/core/channel/http_server_filter.c +11 -11
- data/src/core/channel/subchannel_call_holder.c +11 -11
- data/src/core/client_config/connector.c +3 -2
- data/src/core/client_config/connector.h +2 -2
- data/src/core/client_config/lb_policies/load_balancer_api.c +163 -0
- data/src/core/client_config/lb_policies/load_balancer_api.h +85 -0
- data/src/core/client_config/lb_policies/pick_first.c +57 -40
- data/src/core/client_config/lb_policies/round_robin.c +14 -15
- data/src/core/client_config/lb_policy.c +3 -3
- data/src/core/client_config/lb_policy.h +3 -2
- data/src/core/client_config/resolvers/dns_resolver.c +3 -3
- data/src/core/client_config/resolvers/sockaddr_resolver.c +5 -5
- data/src/core/client_config/subchannel.c +84 -39
- data/src/core/client_config/subchannel.h +15 -6
- data/src/core/client_config/subchannel_index.c +261 -0
- data/src/core/client_config/subchannel_index.h +77 -0
- data/src/core/compression/{algorithm.c → compression_algorithm.c} +3 -3
- data/src/core/httpcli/format_request.c +1 -1
- data/src/core/httpcli/httpcli.c +18 -16
- data/src/core/httpcli/httpcli.h +3 -2
- data/src/core/httpcli/httpcli_security_connector.c +9 -10
- data/src/core/httpcli/parser.c +7 -7
- data/src/core/httpcli/parser.h +1 -1
- data/src/core/iomgr/closure.c +7 -7
- data/src/core/iomgr/closure.h +6 -5
- data/src/core/iomgr/exec_ctx.c +12 -8
- data/src/core/iomgr/exec_ctx.h +12 -5
- data/src/core/iomgr/executor.c +4 -4
- data/src/core/iomgr/executor.h +2 -2
- data/src/core/iomgr/fd_posix.c +32 -19
- data/src/core/iomgr/fd_posix.h +7 -4
- data/src/core/iomgr/iocp_windows.c +7 -9
- data/src/core/iomgr/iomgr.c +2 -2
- data/src/core/iomgr/pollset.h +9 -10
- data/src/core/iomgr/pollset_multipoller_with_epoll.c +71 -5
- data/src/core/iomgr/pollset_multipoller_with_poll_posix.c +9 -5
- data/src/core/iomgr/pollset_posix.c +44 -49
- data/src/core/iomgr/pollset_posix.h +14 -8
- data/src/core/iomgr/pollset_set.h +3 -9
- data/src/core/iomgr/pollset_set_posix.c +23 -3
- data/src/core/iomgr/pollset_set_posix.h +2 -18
- data/src/core/iomgr/pollset_set_windows.c +3 -3
- data/src/core/iomgr/pollset_set_windows.h +2 -2
- data/src/core/iomgr/pollset_windows.c +29 -37
- data/src/core/iomgr/pollset_windows.h +1 -5
- data/src/core/iomgr/resolve_address_posix.c +2 -2
- data/src/core/iomgr/resolve_address_windows.c +2 -2
- data/src/core/iomgr/sockaddr_utils.c +6 -6
- data/src/core/iomgr/sockaddr_win32.h +1 -6
- data/src/core/iomgr/tcp_client_posix.c +14 -12
- data/src/core/iomgr/tcp_client_windows.c +4 -4
- data/src/core/iomgr/tcp_posix.c +18 -10
- data/src/core/iomgr/tcp_posix.h +7 -1
- data/src/core/iomgr/tcp_server.h +40 -20
- data/src/core/iomgr/tcp_server_posix.c +106 -49
- data/src/core/iomgr/tcp_server_windows.c +98 -49
- data/src/core/iomgr/tcp_windows.c +11 -15
- data/src/core/iomgr/timer.c +10 -11
- data/src/core/iomgr/timer.h +22 -2
- data/src/core/iomgr/timer_heap.c +10 -10
- data/src/core/iomgr/timer_heap.h +2 -2
- data/src/core/iomgr/udp_server.c +7 -16
- data/src/core/iomgr/udp_server.h +2 -9
- data/src/core/iomgr/workqueue.h +2 -4
- data/src/core/iomgr/workqueue_posix.c +4 -3
- data/src/core/iomgr/workqueue_posix.h +3 -1
- data/src/core/json/json_reader.c +11 -12
- data/src/core/json/json_reader.h +4 -4
- data/src/core/json/json_string.c +19 -19
- data/src/core/json/json_writer.c +7 -9
- data/src/core/profiling/basic_timers.c +1 -1
- data/src/core/proto/grpc/lb/v0/load_balancer.pb.c +119 -0
- data/src/core/proto/grpc/lb/v0/load_balancer.pb.h +182 -0
- data/src/core/security/{base64.c → b64.c} +10 -10
- data/src/core/security/{base64.h → b64.h} +1 -1
- data/src/core/security/client_auth_filter.c +4 -5
- data/src/core/security/credentials.c +17 -10
- data/src/core/security/credentials.h +3 -3
- data/src/core/security/google_default_credentials.c +27 -22
- data/src/core/security/handshake.c +21 -12
- data/src/core/security/handshake.h +2 -1
- data/src/core/security/json_token.c +14 -8
- data/src/core/security/jwt_verifier.c +4 -3
- data/src/core/security/secure_endpoint.c +16 -16
- data/src/core/security/security_connector.c +131 -81
- data/src/core/security/security_connector.h +47 -27
- data/src/core/security/security_context.c +8 -3
- data/src/core/security/server_auth_filter.c +5 -5
- data/src/core/security/server_secure_chttp2.c +36 -37
- data/src/core/statistics/census_interface.h +2 -2
- data/src/core/statistics/census_rpc_stats.h +3 -3
- data/src/core/support/alloc.c +1 -1
- data/src/core/support/avl.c +2 -2
- data/src/core/support/cpu_posix.c +2 -2
- data/src/core/support/env_linux.c +28 -1
- data/src/core/support/env_win32.c +15 -7
- data/src/core/support/histogram.c +5 -5
- data/src/core/support/{file.c → load_file.c} +2 -2
- data/src/core/support/{file.h → load_file.h} +4 -12
- data/src/core/support/log_posix.c +1 -1
- data/src/core/support/log_win32.c +4 -3
- data/src/core/support/murmur_hash.c +11 -11
- data/src/core/support/murmur_hash.h +1 -1
- data/src/core/support/slice.c +11 -11
- data/src/core/support/slice_buffer.c +6 -6
- data/src/core/support/stack_lockfree.c +20 -10
- data/src/core/support/string.c +15 -15
- data/src/core/support/string.h +5 -5
- data/src/core/support/string_win32.c +5 -5
- data/src/core/support/subprocess_windows.c +141 -0
- data/src/core/support/sync.c +4 -4
- data/src/core/support/sync_posix.c +2 -2
- data/src/core/support/sync_win32.c +10 -5
- data/src/core/support/time.c +29 -29
- data/src/core/support/time_posix.c +15 -6
- data/src/core/support/time_precise.c +2 -2
- data/src/core/support/time_win32.c +18 -9
- data/src/core/support/tls_pthread.c +1 -1
- data/src/core/support/tmpfile.h +55 -0
- data/src/core/support/{file_posix.c → tmpfile_posix.c} +2 -2
- data/src/core/support/{file_win32.c → tmpfile_win32.c} +2 -2
- data/src/core/support/wrap_memcpy.c +53 -0
- data/src/core/surface/alarm.c +84 -0
- data/src/core/surface/byte_buffer_reader.c +1 -1
- data/src/core/surface/call.c +175 -116
- data/src/core/surface/call.h +2 -2
- data/src/core/surface/call_test_only.h +2 -2
- data/src/core/surface/channel.c +9 -9
- data/src/core/surface/channel.h +1 -1
- data/src/core/surface/channel_connectivity.c +3 -3
- data/src/core/surface/channel_create.c +4 -4
- data/src/core/surface/channel_ping.c +2 -2
- data/src/core/surface/completion_queue.c +84 -53
- data/src/core/surface/completion_queue.h +1 -1
- data/src/core/surface/init.c +11 -5
- data/src/core/surface/lame_client.c +2 -3
- data/src/core/surface/secure_channel_create.c +9 -10
- data/src/core/surface/server.c +30 -30
- data/src/core/surface/server_chttp2.c +8 -8
- data/src/core/surface/server_create.c +1 -4
- data/src/core/surface/validate_metadata.c +4 -4
- data/src/core/surface/version.c +2 -2
- data/src/core/transport/byte_stream.c +8 -6
- data/src/core/transport/byte_stream.h +6 -5
- data/src/core/transport/chttp2/bin_encoder.c +29 -29
- data/src/core/transport/chttp2/frame_data.c +29 -26
- data/src/core/transport/chttp2/frame_data.h +6 -6
- data/src/core/transport/chttp2/frame_goaway.c +30 -30
- data/src/core/transport/chttp2/frame_goaway.h +6 -6
- data/src/core/transport/chttp2/frame_ping.c +6 -6
- data/src/core/transport/chttp2/frame_ping.h +5 -5
- data/src/core/transport/chttp2/frame_rst_stream.c +18 -19
- data/src/core/transport/chttp2/frame_rst_stream.h +4 -4
- data/src/core/transport/chttp2/frame_settings.c +30 -30
- data/src/core/transport/chttp2/frame_settings.h +13 -13
- data/src/core/transport/chttp2/frame_window_update.c +17 -18
- data/src/core/transport/chttp2/frame_window_update.h +5 -7
- data/src/core/transport/chttp2/hpack_encoder.c +69 -73
- data/src/core/transport/chttp2/hpack_encoder.h +16 -16
- data/src/core/transport/chttp2/hpack_parser.c +167 -167
- data/src/core/transport/chttp2/hpack_parser.h +16 -16
- data/src/core/transport/chttp2/hpack_table.c +13 -13
- data/src/core/transport/chttp2/hpack_table.h +11 -11
- data/src/core/transport/chttp2/internal.h +103 -87
- data/src/core/transport/chttp2/parsing.c +25 -25
- data/src/core/transport/chttp2/stream_lists.c +38 -1
- data/src/core/transport/chttp2/stream_map.c +13 -14
- data/src/core/transport/chttp2/stream_map.h +6 -7
- data/src/core/transport/chttp2/timeout_encoding.c +19 -16
- data/src/core/transport/chttp2/varint.c +8 -9
- data/src/core/transport/chttp2/varint.h +7 -8
- data/src/core/transport/chttp2/writing.c +25 -22
- data/src/core/transport/chttp2_transport.c +147 -100
- data/src/core/transport/connectivity_state.c +6 -6
- data/src/core/transport/metadata.c +18 -18
- data/src/core/transport/metadata.h +5 -5
- data/src/core/transport/static_metadata.c +32 -33
- data/src/core/transport/static_metadata.h +8 -8
- data/src/core/transport/transport.c +6 -5
- data/src/core/transport/transport.h +17 -1
- data/src/core/tsi/fake_transport_security.c +7 -7
- data/src/core/tsi/ssl_transport_security.c +6 -4
- data/src/core/{iomgr/timer_internal.h → tsi/ssl_types.h} +19 -25
- data/src/ruby/ext/grpc/extconf.rb +52 -14
- data/src/ruby/ext/grpc/rb_byte_buffer.c +3 -1
- data/src/ruby/ext/grpc/rb_call.c +7 -3
- data/src/ruby/ext/grpc/rb_call_credentials.c +4 -0
- data/src/ruby/ext/grpc/rb_channel.c +4 -2
- data/src/ruby/ext/grpc/rb_channel_args.c +3 -1
- data/src/ruby/ext/grpc/rb_channel_credentials.c +3 -1
- data/src/ruby/ext/grpc/rb_completion_queue.c +3 -1
- data/src/ruby/ext/grpc/rb_event_thread.c +5 -0
- data/src/ruby/ext/grpc/rb_grpc.c +28 -19
- data/src/ruby/ext/grpc/rb_grpc_imports.generated.c +562 -0
- data/src/ruby/ext/grpc/rb_grpc_imports.generated.h +846 -0
- data/src/ruby/ext/grpc/rb_loader.c +72 -0
- data/src/ruby/ext/grpc/rb_loader.h +40 -0
- data/src/ruby/ext/grpc/rb_server.c +3 -1
- data/src/ruby/ext/grpc/rb_server_credentials.c +4 -2
- data/src/ruby/lib/grpc/core/time_consts.rb +2 -2
- data/src/ruby/lib/grpc/errors.rb +2 -2
- data/src/ruby/lib/grpc/generic/bidi_call.rb +1 -1
- data/src/ruby/lib/grpc/generic/rpc_desc.rb +1 -1
- data/src/ruby/lib/grpc/generic/rpc_server.rb +1 -1
- data/src/ruby/lib/grpc/grpc.rb +34 -0
- data/src/ruby/lib/grpc/version.rb +1 -1
- data/src/ruby/pb/README.md +2 -2
- data/src/ruby/pb/generate_proto_ruby.sh +2 -2
- data/src/ruby/pb/grpc/health/checker.rb +11 -11
- data/src/ruby/pb/grpc/health/v1/health.rb +28 -0
- data/src/ruby/pb/grpc/health/{v1alpha → v1}/health_services.rb +4 -4
- data/src/ruby/spec/client_server_spec.rb +2 -1
- data/src/ruby/spec/pb/health/checker_spec.rb +23 -37
- data/third_party/boringssl/crypto/aes/aes.c +1142 -0
- data/third_party/boringssl/crypto/aes/internal.h +87 -0
- data/third_party/boringssl/crypto/aes/mode_wrappers.c +108 -0
- data/third_party/boringssl/crypto/asn1/a_bitstr.c +255 -0
- data/third_party/boringssl/crypto/asn1/a_bool.c +112 -0
- data/third_party/boringssl/crypto/asn1/a_bytes.c +317 -0
- data/third_party/boringssl/crypto/asn1/a_d2i_fp.c +286 -0
- data/third_party/boringssl/crypto/asn1/a_dup.c +103 -0
- data/third_party/boringssl/crypto/asn1/a_enum.c +183 -0
- data/third_party/boringssl/crypto/asn1/a_gentm.c +255 -0
- data/third_party/boringssl/crypto/asn1/a_i2d_fp.c +154 -0
- data/third_party/boringssl/crypto/asn1/a_int.c +456 -0
- data/third_party/boringssl/crypto/asn1/a_mbstr.c +390 -0
- data/third_party/boringssl/crypto/asn1/a_object.c +412 -0
- data/third_party/boringssl/crypto/asn1/a_octet.c +70 -0
- data/third_party/boringssl/crypto/asn1/a_print.c +119 -0
- data/third_party/boringssl/crypto/asn1/a_strnid.c +286 -0
- data/third_party/boringssl/crypto/asn1/a_time.c +221 -0
- data/third_party/boringssl/crypto/asn1/a_type.c +160 -0
- data/third_party/boringssl/crypto/asn1/a_utctm.c +342 -0
- data/third_party/boringssl/crypto/asn1/a_utf8.c +210 -0
- data/third_party/boringssl/crypto/asn1/asn1_lib.c +510 -0
- data/third_party/boringssl/crypto/asn1/asn1_locl.h +73 -0
- data/third_party/boringssl/crypto/asn1/asn1_par.c +444 -0
- data/third_party/boringssl/crypto/asn1/asn_pack.c +104 -0
- data/third_party/boringssl/crypto/asn1/bio_asn1.c +496 -0
- data/third_party/boringssl/crypto/asn1/bio_ndef.c +254 -0
- data/third_party/boringssl/crypto/asn1/f_enum.c +206 -0
- data/third_party/boringssl/crypto/asn1/f_int.c +210 -0
- data/third_party/boringssl/crypto/asn1/f_string.c +204 -0
- data/third_party/boringssl/crypto/asn1/t_bitst.c +102 -0
- data/third_party/boringssl/crypto/asn1/t_pkey.c +112 -0
- data/third_party/boringssl/crypto/asn1/tasn_dec.c +1342 -0
- data/third_party/boringssl/crypto/asn1/tasn_enc.c +695 -0
- data/third_party/boringssl/crypto/asn1/tasn_fre.c +264 -0
- data/third_party/boringssl/crypto/asn1/tasn_new.c +398 -0
- data/third_party/boringssl/crypto/asn1/tasn_prn.c +642 -0
- data/third_party/boringssl/crypto/asn1/tasn_typ.c +137 -0
- data/third_party/boringssl/crypto/asn1/tasn_utl.c +266 -0
- data/third_party/boringssl/crypto/asn1/x_bignum.c +143 -0
- data/third_party/boringssl/crypto/asn1/x_long.c +182 -0
- data/third_party/boringssl/crypto/base64/base64.c +478 -0
- data/third_party/boringssl/crypto/bio/bio.c +608 -0
- data/third_party/boringssl/crypto/bio/bio_mem.c +327 -0
- data/third_party/boringssl/crypto/bio/buffer.c +496 -0
- data/third_party/boringssl/crypto/bio/connect.c +544 -0
- data/third_party/boringssl/crypto/bio/fd.c +270 -0
- data/third_party/boringssl/crypto/bio/file.c +349 -0
- data/third_party/boringssl/crypto/bio/hexdump.c +192 -0
- data/third_party/boringssl/crypto/bio/internal.h +108 -0
- data/third_party/boringssl/crypto/bio/pair.c +803 -0
- data/third_party/boringssl/crypto/bio/printf.c +119 -0
- data/third_party/boringssl/crypto/bio/socket.c +195 -0
- data/third_party/boringssl/crypto/bio/socket_helper.c +113 -0
- data/third_party/boringssl/crypto/bn/add.c +377 -0
- data/third_party/boringssl/crypto/bn/asm/x86_64-gcc.c +599 -0
- data/third_party/boringssl/crypto/bn/bn.c +341 -0
- data/third_party/boringssl/crypto/bn/bn_asn1.c +93 -0
- data/third_party/boringssl/crypto/bn/cmp.c +200 -0
- data/third_party/boringssl/crypto/bn/convert.c +597 -0
- data/third_party/boringssl/crypto/bn/ctx.c +311 -0
- data/third_party/boringssl/crypto/bn/div.c +625 -0
- data/third_party/boringssl/crypto/bn/exponentiation.c +1544 -0
- data/third_party/boringssl/crypto/bn/gcd.c +711 -0
- data/third_party/boringssl/crypto/bn/generic.c +1019 -0
- data/third_party/boringssl/crypto/bn/internal.h +294 -0
- data/third_party/boringssl/crypto/bn/kronecker.c +175 -0
- data/third_party/boringssl/crypto/bn/montgomery.c +561 -0
- data/third_party/boringssl/crypto/bn/mul.c +888 -0
- data/third_party/boringssl/crypto/bn/prime.c +845 -0
- data/third_party/boringssl/crypto/bn/random.c +326 -0
- data/third_party/boringssl/crypto/bn/rsaz_exp.c +326 -0
- data/third_party/boringssl/crypto/bn/rsaz_exp.h +56 -0
- data/third_party/boringssl/crypto/bn/shift.c +299 -0
- data/third_party/boringssl/crypto/bn/sqrt.c +505 -0
- data/third_party/boringssl/crypto/buf/buf.c +235 -0
- data/third_party/boringssl/crypto/bytestring/ber.c +221 -0
- data/third_party/boringssl/crypto/bytestring/cbb.c +411 -0
- data/third_party/boringssl/crypto/bytestring/cbs.c +415 -0
- data/third_party/boringssl/crypto/bytestring/internal.h +46 -0
- data/third_party/boringssl/crypto/chacha/chacha_generic.c +140 -0
- data/third_party/boringssl/crypto/chacha/chacha_vec.c +323 -0
- data/third_party/boringssl/crypto/cipher/aead.c +167 -0
- data/third_party/boringssl/crypto/cipher/cipher.c +652 -0
- data/third_party/boringssl/crypto/cipher/derive_key.c +154 -0
- data/third_party/boringssl/crypto/cipher/e_aes.c +1767 -0
- data/third_party/boringssl/crypto/cipher/e_chacha20poly1305.c +311 -0
- data/third_party/boringssl/crypto/cipher/e_des.c +207 -0
- data/third_party/boringssl/crypto/cipher/e_null.c +85 -0
- data/third_party/boringssl/crypto/cipher/e_rc2.c +443 -0
- data/third_party/boringssl/crypto/cipher/e_rc4.c +87 -0
- data/third_party/boringssl/crypto/cipher/e_ssl3.c +463 -0
- data/third_party/boringssl/crypto/cipher/e_tls.c +673 -0
- data/third_party/boringssl/crypto/cipher/internal.h +164 -0
- data/third_party/boringssl/crypto/cipher/tls_cbc.c +495 -0
- data/third_party/boringssl/crypto/cmac/cmac.c +239 -0
- data/third_party/boringssl/crypto/conf/conf.c +778 -0
- data/third_party/boringssl/crypto/conf/conf_def.h +127 -0
- data/third_party/boringssl/crypto/conf/internal.h +31 -0
- data/third_party/boringssl/crypto/cpu-arm.c +199 -0
- data/third_party/boringssl/crypto/cpu-intel.c +261 -0
- data/third_party/boringssl/crypto/crypto.c +140 -0
- data/third_party/boringssl/crypto/curve25519/curve25519.c +4897 -0
- data/third_party/boringssl/crypto/des/des.c +771 -0
- data/third_party/boringssl/crypto/des/internal.h +212 -0
- data/third_party/boringssl/crypto/dh/check.c +180 -0
- data/third_party/boringssl/crypto/dh/dh.c +463 -0
- data/third_party/boringssl/crypto/dh/dh_asn1.c +84 -0
- data/third_party/boringssl/crypto/dh/internal.h +80 -0
- data/third_party/boringssl/crypto/dh/params.c +301 -0
- data/third_party/boringssl/crypto/digest/digest.c +248 -0
- data/third_party/boringssl/crypto/digest/digests.c +321 -0
- data/third_party/boringssl/crypto/digest/internal.h +112 -0
- data/third_party/boringssl/crypto/digest/md32_common.h +322 -0
- data/third_party/boringssl/crypto/directory.h +66 -0
- data/third_party/boringssl/crypto/directory_posix.c +108 -0
- data/third_party/boringssl/crypto/directory_win.c +144 -0
- data/third_party/boringssl/crypto/dsa/dsa.c +908 -0
- data/third_party/boringssl/crypto/dsa/dsa_asn1.c +150 -0
- data/third_party/boringssl/crypto/dsa/internal.h +78 -0
- data/third_party/boringssl/crypto/ec/ec.c +889 -0
- data/third_party/boringssl/crypto/ec/ec_asn1.c +586 -0
- data/third_party/boringssl/crypto/ec/ec_key.c +482 -0
- data/third_party/boringssl/crypto/ec/ec_montgomery.c +280 -0
- data/third_party/boringssl/crypto/ec/internal.h +318 -0
- data/third_party/boringssl/crypto/ec/oct.c +416 -0
- data/third_party/boringssl/crypto/ec/p224-64.c +1305 -0
- data/third_party/boringssl/crypto/ec/p256-64.c +1878 -0
- data/third_party/boringssl/crypto/ec/p256-x86_64-table.h +9548 -0
- data/third_party/boringssl/crypto/ec/p256-x86_64.c +596 -0
- data/third_party/boringssl/crypto/ec/simple.c +1313 -0
- data/third_party/boringssl/crypto/ec/util-64.c +183 -0
- data/third_party/boringssl/crypto/ec/wnaf.c +449 -0
- data/third_party/boringssl/crypto/ecdh/ecdh.c +153 -0
- data/third_party/boringssl/crypto/ecdsa/ecdsa.c +496 -0
- data/third_party/boringssl/crypto/ecdsa/ecdsa_asn1.c +240 -0
- data/third_party/boringssl/crypto/engine/engine.c +96 -0
- data/third_party/boringssl/crypto/err/err.c +756 -0
- data/third_party/boringssl/crypto/evp/algorithm.c +153 -0
- data/third_party/boringssl/crypto/evp/digestsign.c +159 -0
- data/third_party/boringssl/crypto/evp/evp.c +411 -0
- data/third_party/boringssl/crypto/evp/evp_asn1.c +179 -0
- data/third_party/boringssl/crypto/evp/evp_ctx.c +477 -0
- data/third_party/boringssl/crypto/evp/internal.h +278 -0
- data/third_party/boringssl/crypto/evp/p_dsa_asn1.c +588 -0
- data/third_party/boringssl/crypto/evp/p_ec.c +283 -0
- data/third_party/boringssl/crypto/evp/p_ec_asn1.c +562 -0
- data/third_party/boringssl/crypto/evp/p_rsa.c +596 -0
- data/third_party/boringssl/crypto/evp/p_rsa_asn1.c +737 -0
- data/third_party/boringssl/crypto/evp/pbkdf.c +151 -0
- data/third_party/boringssl/crypto/evp/sign.c +151 -0
- data/third_party/boringssl/crypto/ex_data.c +294 -0
- data/third_party/boringssl/crypto/hkdf/hkdf.c +89 -0
- data/third_party/boringssl/crypto/hmac/hmac.c +213 -0
- data/third_party/boringssl/crypto/internal.h +532 -0
- data/third_party/boringssl/crypto/lhash/lhash.c +346 -0
- data/third_party/boringssl/crypto/md4/md4.c +225 -0
- data/third_party/boringssl/crypto/md5/md5.c +275 -0
- data/third_party/boringssl/crypto/mem.c +200 -0
- data/third_party/boringssl/crypto/modes/cbc.c +216 -0
- data/third_party/boringssl/crypto/modes/cfb.c +231 -0
- data/third_party/boringssl/crypto/modes/ctr.c +226 -0
- data/third_party/boringssl/crypto/modes/gcm.c +1252 -0
- data/third_party/boringssl/crypto/modes/internal.h +370 -0
- data/third_party/boringssl/crypto/modes/ofb.c +108 -0
- data/third_party/boringssl/crypto/obj/obj.c +664 -0
- data/third_party/boringssl/crypto/obj/obj_dat.h +5257 -0
- data/third_party/boringssl/crypto/obj/obj_xref.c +124 -0
- data/third_party/boringssl/crypto/obj/obj_xref.h +96 -0
- data/third_party/boringssl/crypto/pem/pem_all.c +281 -0
- data/third_party/boringssl/crypto/pem/pem_info.c +404 -0
- data/third_party/boringssl/crypto/pem/pem_lib.c +835 -0
- data/third_party/boringssl/crypto/pem/pem_oth.c +89 -0
- data/third_party/boringssl/crypto/pem/pem_pk8.c +244 -0
- data/third_party/boringssl/crypto/pem/pem_pkey.c +312 -0
- data/third_party/boringssl/crypto/pem/pem_x509.c +65 -0
- data/third_party/boringssl/crypto/pem/pem_xaux.c +66 -0
- data/third_party/boringssl/crypto/pkcs8/internal.h +83 -0
- data/third_party/boringssl/crypto/pkcs8/p5_pbe.c +150 -0
- data/third_party/boringssl/crypto/pkcs8/p5_pbev2.c +440 -0
- data/third_party/boringssl/crypto/pkcs8/p8_pkey.c +85 -0
- data/third_party/boringssl/crypto/pkcs8/pkcs8.c +1217 -0
- data/third_party/boringssl/crypto/poly1305/poly1305.c +331 -0
- data/third_party/boringssl/crypto/poly1305/poly1305_arm.c +301 -0
- data/third_party/boringssl/crypto/poly1305/poly1305_vec.c +892 -0
- data/third_party/boringssl/crypto/rand/internal.h +32 -0
- data/third_party/boringssl/crypto/rand/rand.c +239 -0
- data/third_party/boringssl/crypto/rand/urandom.c +223 -0
- data/third_party/boringssl/crypto/rand/windows.c +56 -0
- data/third_party/boringssl/crypto/rc4/rc4.c +283 -0
- data/third_party/boringssl/crypto/refcount_c11.c +67 -0
- data/third_party/boringssl/crypto/refcount_lock.c +53 -0
- data/third_party/boringssl/crypto/rsa/blinding.c +462 -0
- data/third_party/boringssl/crypto/rsa/internal.h +164 -0
- data/third_party/boringssl/crypto/rsa/padding.c +711 -0
- data/third_party/boringssl/crypto/rsa/rsa.c +808 -0
- data/third_party/boringssl/crypto/rsa/rsa_asn1.c +473 -0
- data/third_party/boringssl/crypto/rsa/rsa_impl.c +1138 -0
- data/third_party/boringssl/crypto/sha/sha1.c +337 -0
- data/third_party/boringssl/crypto/sha/sha256.c +327 -0
- data/third_party/boringssl/crypto/sha/sha512.c +607 -0
- data/third_party/boringssl/crypto/stack/stack.c +386 -0
- data/third_party/boringssl/crypto/test/scoped_types.h +137 -0
- data/third_party/boringssl/crypto/test/test_util.h +35 -0
- data/third_party/boringssl/crypto/thread.c +101 -0
- data/third_party/boringssl/crypto/thread_none.c +55 -0
- data/third_party/boringssl/crypto/thread_pthread.c +167 -0
- data/third_party/boringssl/crypto/thread_win.c +282 -0
- data/third_party/boringssl/crypto/time_support.c +212 -0
- data/third_party/boringssl/crypto/x509/a_digest.c +97 -0
- data/third_party/boringssl/crypto/x509/a_sign.c +136 -0
- data/third_party/boringssl/crypto/x509/a_strex.c +564 -0
- data/third_party/boringssl/crypto/x509/a_verify.c +133 -0
- data/third_party/boringssl/crypto/x509/asn1_gen.c +873 -0
- data/third_party/boringssl/crypto/x509/by_dir.c +491 -0
- data/third_party/boringssl/crypto/x509/by_file.c +295 -0
- data/third_party/boringssl/crypto/x509/charmap.h +15 -0
- data/third_party/boringssl/crypto/x509/i2d_pr.c +84 -0
- data/third_party/boringssl/crypto/x509/pkcs7.c +353 -0
- data/third_party/boringssl/crypto/x509/t_crl.c +129 -0
- data/third_party/boringssl/crypto/x509/t_req.c +246 -0
- data/third_party/boringssl/crypto/x509/t_x509.c +500 -0
- data/third_party/boringssl/crypto/x509/t_x509a.c +109 -0
- data/third_party/boringssl/crypto/x509/vpm_int.h +70 -0
- data/third_party/boringssl/crypto/x509/x509.c +152 -0
- data/third_party/boringssl/crypto/x509/x509_att.c +353 -0
- data/third_party/boringssl/crypto/x509/x509_cmp.c +490 -0
- data/third_party/boringssl/crypto/x509/x509_d2.c +105 -0
- data/third_party/boringssl/crypto/x509/x509_def.c +88 -0
- data/third_party/boringssl/crypto/x509/x509_ext.c +206 -0
- data/third_party/boringssl/crypto/x509/x509_lu.c +738 -0
- data/third_party/boringssl/crypto/x509/x509_obj.c +191 -0
- data/third_party/boringssl/crypto/x509/x509_r2x.c +113 -0
- data/third_party/boringssl/crypto/x509/x509_req.c +315 -0
- data/third_party/boringssl/crypto/x509/x509_set.c +154 -0
- data/third_party/boringssl/crypto/x509/x509_trs.c +304 -0
- data/third_party/boringssl/crypto/x509/x509_txt.c +209 -0
- data/third_party/boringssl/crypto/x509/x509_v3.c +271 -0
- data/third_party/boringssl/crypto/x509/x509_vfy.c +2456 -0
- data/third_party/boringssl/crypto/x509/x509_vpm.c +672 -0
- data/third_party/boringssl/crypto/x509/x509cset.c +172 -0
- data/third_party/boringssl/crypto/x509/x509name.c +381 -0
- data/third_party/boringssl/crypto/x509/x509rset.c +80 -0
- data/third_party/boringssl/crypto/x509/x509spki.c +135 -0
- data/third_party/boringssl/crypto/x509/x509type.c +128 -0
- data/third_party/boringssl/crypto/x509/x_algor.c +154 -0
- data/third_party/boringssl/crypto/x509/x_all.c +547 -0
- data/third_party/boringssl/crypto/x509/x_attrib.c +117 -0
- data/third_party/boringssl/crypto/x509/x_crl.c +560 -0
- data/third_party/boringssl/crypto/x509/x_exten.c +75 -0
- data/third_party/boringssl/crypto/x509/x_info.c +95 -0
- data/third_party/boringssl/crypto/x509/x_name.c +538 -0
- data/third_party/boringssl/crypto/x509/x_pkey.c +100 -0
- data/third_party/boringssl/crypto/x509/x_pubkey.c +384 -0
- data/third_party/boringssl/crypto/x509/x_req.c +112 -0
- data/third_party/boringssl/crypto/x509/x_sig.c +69 -0
- data/third_party/boringssl/crypto/x509/x_spki.c +78 -0
- data/third_party/boringssl/crypto/x509/x_val.c +69 -0
- data/third_party/boringssl/crypto/x509/x_x509.c +227 -0
- data/third_party/boringssl/crypto/x509/x_x509a.c +197 -0
- data/third_party/boringssl/crypto/x509v3/ext_dat.h +129 -0
- data/third_party/boringssl/crypto/x509v3/pcy_cache.c +299 -0
- data/third_party/boringssl/crypto/x509v3/pcy_data.c +137 -0
- data/third_party/boringssl/crypto/x509v3/pcy_int.h +212 -0
- data/third_party/boringssl/crypto/x509v3/pcy_lib.c +165 -0
- data/third_party/boringssl/crypto/x509v3/pcy_map.c +133 -0
- data/third_party/boringssl/crypto/x509v3/pcy_node.c +197 -0
- data/third_party/boringssl/crypto/x509v3/pcy_tree.c +876 -0
- data/third_party/boringssl/crypto/x509v3/v3_akey.c +212 -0
- data/third_party/boringssl/crypto/x509v3/v3_akeya.c +71 -0
- data/third_party/boringssl/crypto/x509v3/v3_alt.c +622 -0
- data/third_party/boringssl/crypto/x509v3/v3_bcons.c +126 -0
- data/third_party/boringssl/crypto/x509v3/v3_bitst.c +141 -0
- data/third_party/boringssl/crypto/x509v3/v3_conf.c +459 -0
- data/third_party/boringssl/crypto/x509v3/v3_cpols.c +475 -0
- data/third_party/boringssl/crypto/x509v3/v3_crld.c +616 -0
- data/third_party/boringssl/crypto/x509v3/v3_enum.c +98 -0
- data/third_party/boringssl/crypto/x509v3/v3_extku.c +145 -0
- data/third_party/boringssl/crypto/x509v3/v3_genn.c +252 -0
- data/third_party/boringssl/crypto/x509v3/v3_ia5.c +117 -0
- data/third_party/boringssl/crypto/x509v3/v3_info.c +200 -0
- data/third_party/boringssl/crypto/x509v3/v3_int.c +87 -0
- data/third_party/boringssl/crypto/x509v3/v3_lib.c +335 -0
- data/third_party/boringssl/crypto/x509v3/v3_ncons.c +510 -0
- data/third_party/boringssl/crypto/x509v3/v3_pci.c +335 -0
- data/third_party/boringssl/crypto/x509v3/v3_pcia.c +56 -0
- data/third_party/boringssl/crypto/x509v3/v3_pcons.c +142 -0
- data/third_party/boringssl/crypto/x509v3/v3_pku.c +109 -0
- data/third_party/boringssl/crypto/x509v3/v3_pmaps.c +156 -0
- data/third_party/boringssl/crypto/x509v3/v3_prn.c +207 -0
- data/third_party/boringssl/crypto/x509v3/v3_purp.c +805 -0
- data/third_party/boringssl/crypto/x509v3/v3_skey.c +148 -0
- data/third_party/boringssl/crypto/x509v3/v3_sxnet.c +266 -0
- data/third_party/boringssl/crypto/x509v3/v3_utl.c +1322 -0
- data/third_party/boringssl/include/openssl/aead.h +346 -0
- data/third_party/boringssl/include/openssl/aes.h +158 -0
- data/third_party/boringssl/include/openssl/arm_arch.h +127 -0
- data/third_party/boringssl/include/openssl/asn1.h +1168 -0
- data/third_party/boringssl/include/openssl/asn1_mac.h +75 -0
- data/third_party/boringssl/include/openssl/asn1t.h +906 -0
- data/third_party/boringssl/include/openssl/base.h +261 -0
- data/third_party/boringssl/include/openssl/base64.h +184 -0
- data/third_party/boringssl/include/openssl/bio.h +902 -0
- data/third_party/boringssl/include/openssl/blowfish.h +93 -0
- data/third_party/boringssl/include/openssl/bn.h +885 -0
- data/third_party/boringssl/include/openssl/buf.h +118 -0
- data/third_party/boringssl/include/openssl/buffer.h +18 -0
- data/third_party/boringssl/include/openssl/bytestring.h +360 -0
- data/third_party/boringssl/include/openssl/cast.h +96 -0
- data/third_party/boringssl/include/openssl/chacha.h +37 -0
- data/third_party/boringssl/include/openssl/cipher.h +571 -0
- data/third_party/boringssl/include/openssl/cmac.h +76 -0
- data/third_party/boringssl/include/openssl/conf.h +145 -0
- data/third_party/boringssl/include/openssl/cpu.h +184 -0
- data/third_party/boringssl/include/openssl/crypto.h +68 -0
- data/third_party/boringssl/include/openssl/curve25519.h +88 -0
- data/third_party/boringssl/include/openssl/des.h +177 -0
- data/third_party/boringssl/include/openssl/dh.h +238 -0
- data/third_party/boringssl/include/openssl/digest.h +258 -0
- data/third_party/boringssl/include/openssl/dsa.h +343 -0
- data/third_party/boringssl/include/openssl/dtls1.h +16 -0
- data/third_party/boringssl/include/openssl/ec.h +355 -0
- data/third_party/boringssl/include/openssl/ec_key.h +280 -0
- data/third_party/boringssl/include/openssl/ecdh.h +102 -0
- data/third_party/boringssl/include/openssl/ecdsa.h +206 -0
- data/third_party/boringssl/include/openssl/engine.h +98 -0
- data/third_party/boringssl/include/openssl/err.h +487 -0
- data/third_party/boringssl/include/openssl/evp.h +750 -0
- data/third_party/boringssl/include/openssl/ex_data.h +213 -0
- data/third_party/boringssl/include/openssl/hkdf.h +44 -0
- data/third_party/boringssl/include/openssl/hmac.h +160 -0
- data/third_party/boringssl/include/openssl/lhash.h +192 -0
- data/third_party/boringssl/include/openssl/lhash_macros.h +132 -0
- data/third_party/boringssl/include/openssl/md4.h +102 -0
- data/third_party/boringssl/include/openssl/md5.h +107 -0
- data/third_party/boringssl/include/openssl/mem.h +140 -0
- data/third_party/boringssl/include/openssl/obj.h +198 -0
- data/third_party/boringssl/include/openssl/obj_mac.h +4140 -0
- data/third_party/boringssl/include/openssl/objects.h +18 -0
- data/third_party/boringssl/include/openssl/opensslfeatures.h +60 -0
- data/third_party/boringssl/include/openssl/opensslv.h +18 -0
- data/third_party/boringssl/include/openssl/ossl_typ.h +18 -0
- data/third_party/boringssl/include/openssl/pem.h +521 -0
- data/third_party/boringssl/include/openssl/pkcs12.h +18 -0
- data/third_party/boringssl/include/openssl/pkcs7.h +16 -0
- data/third_party/boringssl/include/openssl/pkcs8.h +220 -0
- data/third_party/boringssl/include/openssl/poly1305.h +51 -0
- data/third_party/boringssl/include/openssl/pqueue.h +146 -0
- data/third_party/boringssl/include/openssl/rand.h +113 -0
- data/third_party/boringssl/include/openssl/rc4.h +90 -0
- data/third_party/boringssl/include/openssl/rsa.h +637 -0
- data/third_party/boringssl/include/openssl/safestack.h +16 -0
- data/third_party/boringssl/include/openssl/sha.h +256 -0
- data/third_party/boringssl/include/openssl/srtp.h +18 -0
- data/third_party/boringssl/include/openssl/ssl.h +4466 -0
- data/third_party/boringssl/include/openssl/ssl3.h +441 -0
- data/third_party/boringssl/include/openssl/stack.h +298 -0
- data/third_party/boringssl/include/openssl/stack_macros.h +4190 -0
- data/third_party/boringssl/include/openssl/thread.h +173 -0
- data/third_party/boringssl/include/openssl/time_support.h +90 -0
- data/third_party/boringssl/include/openssl/tls1.h +653 -0
- data/third_party/boringssl/include/openssl/type_check.h +91 -0
- data/third_party/boringssl/include/openssl/x509.h +1258 -0
- data/third_party/boringssl/include/openssl/x509_vfy.h +611 -0
- data/third_party/boringssl/include/openssl/x509v3.h +798 -0
- data/third_party/boringssl/ssl/custom_extensions.c +257 -0
- data/third_party/boringssl/ssl/d1_both.c +880 -0
- data/third_party/boringssl/ssl/d1_clnt.c +566 -0
- data/third_party/boringssl/ssl/d1_lib.c +340 -0
- data/third_party/boringssl/ssl/d1_meth.c +130 -0
- data/third_party/boringssl/ssl/d1_pkt.c +578 -0
- data/third_party/boringssl/ssl/d1_srtp.c +234 -0
- data/third_party/boringssl/ssl/d1_srvr.c +485 -0
- data/third_party/boringssl/ssl/dtls_record.c +308 -0
- data/third_party/boringssl/ssl/internal.h +1276 -0
- data/third_party/boringssl/ssl/pqueue/pqueue.c +197 -0
- data/third_party/boringssl/ssl/s3_both.c +571 -0
- data/third_party/boringssl/ssl/s3_clnt.c +2241 -0
- data/third_party/boringssl/ssl/s3_enc.c +494 -0
- data/third_party/boringssl/ssl/s3_lib.c +587 -0
- data/third_party/boringssl/ssl/s3_meth.c +166 -0
- data/third_party/boringssl/ssl/s3_pkt.c +732 -0
- data/third_party/boringssl/ssl/s3_srvr.c +2536 -0
- data/third_party/boringssl/ssl/ssl_aead_ctx.c +300 -0
- data/third_party/boringssl/ssl/ssl_asn1.c +718 -0
- data/third_party/boringssl/ssl/ssl_buffer.c +319 -0
- data/third_party/boringssl/ssl/ssl_cert.c +539 -0
- data/third_party/boringssl/ssl/ssl_cipher.c +2003 -0
- data/third_party/boringssl/ssl/ssl_file.c +633 -0
- data/third_party/boringssl/ssl/ssl_lib.c +2653 -0
- data/third_party/boringssl/ssl/ssl_rsa.c +423 -0
- data/third_party/boringssl/ssl/ssl_session.c +764 -0
- data/third_party/boringssl/ssl/ssl_stat.c +591 -0
- data/third_party/boringssl/ssl/t1_enc.c +708 -0
- data/third_party/boringssl/ssl/t1_lib.c +2905 -0
- data/third_party/boringssl/ssl/test/async_bio.h +45 -0
- data/third_party/boringssl/ssl/test/packeted_bio.h +44 -0
- data/third_party/boringssl/ssl/test/scoped_types.h +28 -0
- data/third_party/boringssl/ssl/test/test_config.h +108 -0
- data/third_party/boringssl/ssl/tls_record.c +342 -0
- data/third_party/nanopb/pb.h +547 -0
- data/third_party/nanopb/pb_common.c +97 -0
- data/third_party/nanopb/pb_common.h +42 -0
- data/third_party/nanopb/pb_decode.c +1319 -0
- data/third_party/nanopb/pb_decode.h +149 -0
- data/third_party/nanopb/pb_encode.c +690 -0
- data/third_party/nanopb/pb_encode.h +154 -0
- data/third_party/zlib/adler32.c +179 -0
- data/third_party/zlib/compress.c +80 -0
- data/third_party/zlib/crc32.c +425 -0
- data/third_party/zlib/crc32.h +441 -0
- data/third_party/zlib/deflate.c +1967 -0
- data/third_party/zlib/deflate.h +346 -0
- data/third_party/zlib/gzclose.c +25 -0
- data/third_party/zlib/gzguts.h +209 -0
- data/third_party/zlib/gzlib.c +634 -0
- data/third_party/zlib/gzread.c +594 -0
- data/third_party/zlib/gzwrite.c +577 -0
- data/third_party/zlib/infback.c +640 -0
- data/third_party/zlib/inffast.c +340 -0
- data/third_party/zlib/inffast.h +11 -0
- data/third_party/zlib/inffixed.h +94 -0
- data/third_party/zlib/inflate.c +1512 -0
- data/third_party/zlib/inflate.h +122 -0
- data/third_party/zlib/inftrees.c +306 -0
- data/third_party/zlib/inftrees.h +62 -0
- data/third_party/zlib/trees.c +1226 -0
- data/third_party/zlib/trees.h +128 -0
- data/third_party/zlib/uncompr.c +59 -0
- data/third_party/zlib/zconf.h +511 -0
- data/third_party/zlib/zlib.h +1768 -0
- data/third_party/zlib/zutil.c +324 -0
- data/third_party/zlib/zutil.h +253 -0
- metadata +504 -20
- data/Rakefile +0 -63
- data/src/ruby/pb/grpc/health/v1alpha/health.rb +0 -29
@@ -0,0 +1,257 @@
|
|
1
|
+
/* Copyright (c) 2014, Google Inc.
|
2
|
+
*
|
3
|
+
* Permission to use, copy, modify, and/or distribute this software for any
|
4
|
+
* purpose with or without fee is hereby granted, provided that the above
|
5
|
+
* copyright notice and this permission notice appear in all copies.
|
6
|
+
*
|
7
|
+
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
8
|
+
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
9
|
+
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
|
10
|
+
* SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
11
|
+
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
|
12
|
+
* OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
|
13
|
+
* CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
|
14
|
+
|
15
|
+
#include <openssl/ssl.h>
|
16
|
+
|
17
|
+
#include <assert.h>
|
18
|
+
#include <string.h>
|
19
|
+
|
20
|
+
#include <openssl/bytestring.h>
|
21
|
+
#include <openssl/err.h>
|
22
|
+
#include <openssl/mem.h>
|
23
|
+
#include <openssl/stack.h>
|
24
|
+
|
25
|
+
#include "internal.h"
|
26
|
+
|
27
|
+
|
28
|
+
void SSL_CUSTOM_EXTENSION_free(SSL_CUSTOM_EXTENSION *custom_extension) {
|
29
|
+
OPENSSL_free(custom_extension);
|
30
|
+
}
|
31
|
+
|
32
|
+
static const SSL_CUSTOM_EXTENSION *custom_ext_find(
|
33
|
+
STACK_OF(SSL_CUSTOM_EXTENSION) *stack,
|
34
|
+
unsigned *out_index, uint16_t value) {
|
35
|
+
size_t i;
|
36
|
+
for (i = 0; i < sk_SSL_CUSTOM_EXTENSION_num(stack); i++) {
|
37
|
+
const SSL_CUSTOM_EXTENSION *ext = sk_SSL_CUSTOM_EXTENSION_value(stack, i);
|
38
|
+
if (ext->value == value) {
|
39
|
+
if (out_index != NULL) {
|
40
|
+
*out_index = i;
|
41
|
+
}
|
42
|
+
return ext;
|
43
|
+
}
|
44
|
+
}
|
45
|
+
|
46
|
+
return NULL;
|
47
|
+
}
|
48
|
+
|
49
|
+
/* default_add_callback is used as the |add_callback| when the user doesn't
|
50
|
+
* provide one. For servers, it does nothing while, for clients, it causes an
|
51
|
+
* empty extension to be included. */
|
52
|
+
static int default_add_callback(SSL *ssl, unsigned extension_value,
|
53
|
+
const uint8_t **out, size_t *out_len,
|
54
|
+
int *out_alert_value, void *add_arg) {
|
55
|
+
if (ssl->server) {
|
56
|
+
return 0;
|
57
|
+
}
|
58
|
+
*out_len = 0;
|
59
|
+
return 1;
|
60
|
+
}
|
61
|
+
|
62
|
+
static int custom_ext_add_hello(SSL *ssl, CBB *extensions) {
|
63
|
+
STACK_OF(SSL_CUSTOM_EXTENSION) *stack = ssl->ctx->client_custom_extensions;
|
64
|
+
if (ssl->server) {
|
65
|
+
stack = ssl->ctx->server_custom_extensions;
|
66
|
+
}
|
67
|
+
|
68
|
+
if (stack == NULL) {
|
69
|
+
return 1;
|
70
|
+
}
|
71
|
+
|
72
|
+
size_t i;
|
73
|
+
for (i = 0; i < sk_SSL_CUSTOM_EXTENSION_num(stack); i++) {
|
74
|
+
const SSL_CUSTOM_EXTENSION *ext = sk_SSL_CUSTOM_EXTENSION_value(stack, i);
|
75
|
+
|
76
|
+
if (ssl->server &&
|
77
|
+
!(ssl->s3->tmp.custom_extensions.received & (1u << i))) {
|
78
|
+
/* Servers cannot echo extensions that the client didn't send. */
|
79
|
+
continue;
|
80
|
+
}
|
81
|
+
|
82
|
+
const uint8_t *contents;
|
83
|
+
size_t contents_len;
|
84
|
+
int alert = SSL_AD_DECODE_ERROR;
|
85
|
+
CBB contents_cbb;
|
86
|
+
|
87
|
+
switch (ext->add_callback(ssl, ext->value, &contents, &contents_len, &alert,
|
88
|
+
ext->add_arg)) {
|
89
|
+
case 1:
|
90
|
+
if (!CBB_add_u16(extensions, ext->value) ||
|
91
|
+
!CBB_add_u16_length_prefixed(extensions, &contents_cbb) ||
|
92
|
+
!CBB_add_bytes(&contents_cbb, contents, contents_len) ||
|
93
|
+
!CBB_flush(extensions)) {
|
94
|
+
OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR);
|
95
|
+
ERR_add_error_dataf("extension: %u", (unsigned) ext->value);
|
96
|
+
if (ext->free_callback && 0 < contents_len) {
|
97
|
+
ext->free_callback(ssl, ext->value, contents, ext->add_arg);
|
98
|
+
}
|
99
|
+
return 0;
|
100
|
+
}
|
101
|
+
|
102
|
+
if (ext->free_callback && 0 < contents_len) {
|
103
|
+
ext->free_callback(ssl, ext->value, contents, ext->add_arg);
|
104
|
+
}
|
105
|
+
|
106
|
+
if (!ssl->server) {
|
107
|
+
assert((ssl->s3->tmp.custom_extensions.sent & (1u << i)) == 0);
|
108
|
+
ssl->s3->tmp.custom_extensions.sent |= (1u << i);
|
109
|
+
}
|
110
|
+
break;
|
111
|
+
|
112
|
+
case 0:
|
113
|
+
break;
|
114
|
+
|
115
|
+
default:
|
116
|
+
ssl3_send_alert(ssl, SSL3_AL_FATAL, alert);
|
117
|
+
OPENSSL_PUT_ERROR(SSL, SSL_R_CUSTOM_EXTENSION_ERROR);
|
118
|
+
ERR_add_error_dataf("extension: %u", (unsigned) ext->value);
|
119
|
+
return 0;
|
120
|
+
}
|
121
|
+
}
|
122
|
+
|
123
|
+
return 1;
|
124
|
+
}
|
125
|
+
|
126
|
+
int custom_ext_add_clienthello(SSL *ssl, CBB *extensions) {
|
127
|
+
return custom_ext_add_hello(ssl, extensions);
|
128
|
+
}
|
129
|
+
|
130
|
+
int custom_ext_parse_serverhello(SSL *ssl, int *out_alert, uint16_t value,
|
131
|
+
const CBS *extension) {
|
132
|
+
unsigned index;
|
133
|
+
const SSL_CUSTOM_EXTENSION *ext =
|
134
|
+
custom_ext_find(ssl->ctx->client_custom_extensions, &index, value);
|
135
|
+
|
136
|
+
if (/* Unknown extensions are not allowed in a ServerHello. */
|
137
|
+
ext == NULL ||
|
138
|
+
/* Also, if we didn't send the extension, that's also unacceptable. */
|
139
|
+
!(ssl->s3->tmp.custom_extensions.sent & (1u << index))) {
|
140
|
+
OPENSSL_PUT_ERROR(SSL, SSL_R_UNEXPECTED_EXTENSION);
|
141
|
+
ERR_add_error_dataf("extension: %u", (unsigned)value);
|
142
|
+
*out_alert = SSL_AD_DECODE_ERROR;
|
143
|
+
return 0;
|
144
|
+
}
|
145
|
+
|
146
|
+
if (ext->parse_callback != NULL &&
|
147
|
+
!ext->parse_callback(ssl, value, CBS_data(extension), CBS_len(extension),
|
148
|
+
out_alert, ext->parse_arg)) {
|
149
|
+
OPENSSL_PUT_ERROR(SSL, SSL_R_CUSTOM_EXTENSION_ERROR);
|
150
|
+
ERR_add_error_dataf("extension: %u", (unsigned)ext->value);
|
151
|
+
return 0;
|
152
|
+
}
|
153
|
+
|
154
|
+
return 1;
|
155
|
+
}
|
156
|
+
|
157
|
+
int custom_ext_parse_clienthello(SSL *ssl, int *out_alert, uint16_t value,
|
158
|
+
const CBS *extension) {
|
159
|
+
unsigned index;
|
160
|
+
const SSL_CUSTOM_EXTENSION *ext =
|
161
|
+
custom_ext_find(ssl->ctx->server_custom_extensions, &index, value);
|
162
|
+
|
163
|
+
if (ext == NULL) {
|
164
|
+
return 1;
|
165
|
+
}
|
166
|
+
|
167
|
+
assert((ssl->s3->tmp.custom_extensions.received & (1u << index)) == 0);
|
168
|
+
ssl->s3->tmp.custom_extensions.received |= (1u << index);
|
169
|
+
|
170
|
+
if (ext->parse_callback &&
|
171
|
+
!ext->parse_callback(ssl, value, CBS_data(extension), CBS_len(extension),
|
172
|
+
out_alert, ext->parse_arg)) {
|
173
|
+
OPENSSL_PUT_ERROR(SSL, SSL_R_CUSTOM_EXTENSION_ERROR);
|
174
|
+
ERR_add_error_dataf("extension: %u", (unsigned)ext->value);
|
175
|
+
return 0;
|
176
|
+
}
|
177
|
+
|
178
|
+
return 1;
|
179
|
+
}
|
180
|
+
|
181
|
+
int custom_ext_add_serverhello(SSL *ssl, CBB *extensions) {
|
182
|
+
return custom_ext_add_hello(ssl, extensions);
|
183
|
+
}
|
184
|
+
|
185
|
+
/* MAX_NUM_CUSTOM_EXTENSIONS is the maximum number of custom extensions that
|
186
|
+
* can be set on an |SSL_CTX|. It's determined by the size of the bitset used
|
187
|
+
* to track when an extension has been sent. */
|
188
|
+
#define MAX_NUM_CUSTOM_EXTENSIONS \
|
189
|
+
(sizeof(((struct ssl3_state_st *)NULL)->tmp.custom_extensions.sent) * 8)
|
190
|
+
|
191
|
+
static int custom_ext_append(STACK_OF(SSL_CUSTOM_EXTENSION) **stack,
|
192
|
+
unsigned extension_value,
|
193
|
+
SSL_custom_ext_add_cb add_cb,
|
194
|
+
SSL_custom_ext_free_cb free_cb, void *add_arg,
|
195
|
+
SSL_custom_ext_parse_cb parse_cb,
|
196
|
+
void *parse_arg) {
|
197
|
+
if (add_cb == NULL ||
|
198
|
+
0xffff < extension_value ||
|
199
|
+
SSL_extension_supported(extension_value) ||
|
200
|
+
/* Specifying a free callback without an add callback is nonsensical
|
201
|
+
* and an error. */
|
202
|
+
(*stack != NULL &&
|
203
|
+
(MAX_NUM_CUSTOM_EXTENSIONS <= sk_SSL_CUSTOM_EXTENSION_num(*stack) ||
|
204
|
+
custom_ext_find(*stack, NULL, extension_value) != NULL))) {
|
205
|
+
return 0;
|
206
|
+
}
|
207
|
+
|
208
|
+
SSL_CUSTOM_EXTENSION *ext = OPENSSL_malloc(sizeof(SSL_CUSTOM_EXTENSION));
|
209
|
+
if (ext == NULL) {
|
210
|
+
return 0;
|
211
|
+
}
|
212
|
+
ext->add_callback = add_cb;
|
213
|
+
ext->add_arg = add_arg;
|
214
|
+
ext->free_callback = free_cb;
|
215
|
+
ext->parse_callback = parse_cb;
|
216
|
+
ext->parse_arg = parse_arg;
|
217
|
+
ext->value = extension_value;
|
218
|
+
|
219
|
+
if (*stack == NULL) {
|
220
|
+
*stack = sk_SSL_CUSTOM_EXTENSION_new_null();
|
221
|
+
if (*stack == NULL) {
|
222
|
+
SSL_CUSTOM_EXTENSION_free(ext);
|
223
|
+
return 0;
|
224
|
+
}
|
225
|
+
}
|
226
|
+
|
227
|
+
if (!sk_SSL_CUSTOM_EXTENSION_push(*stack, ext)) {
|
228
|
+
SSL_CUSTOM_EXTENSION_free(ext);
|
229
|
+
if (sk_SSL_CUSTOM_EXTENSION_num(*stack) == 0) {
|
230
|
+
sk_SSL_CUSTOM_EXTENSION_free(*stack);
|
231
|
+
*stack = NULL;
|
232
|
+
}
|
233
|
+
return 0;
|
234
|
+
}
|
235
|
+
|
236
|
+
return 1;
|
237
|
+
}
|
238
|
+
|
239
|
+
int SSL_CTX_add_client_custom_ext(SSL_CTX *ctx, unsigned extension_value,
|
240
|
+
SSL_custom_ext_add_cb add_cb,
|
241
|
+
SSL_custom_ext_free_cb free_cb, void *add_arg,
|
242
|
+
SSL_custom_ext_parse_cb parse_cb,
|
243
|
+
void *parse_arg) {
|
244
|
+
return custom_ext_append(&ctx->client_custom_extensions, extension_value,
|
245
|
+
add_cb ? add_cb : default_add_callback, free_cb,
|
246
|
+
add_arg, parse_cb, parse_arg);
|
247
|
+
}
|
248
|
+
|
249
|
+
int SSL_CTX_add_server_custom_ext(SSL_CTX *ctx, unsigned extension_value,
|
250
|
+
SSL_custom_ext_add_cb add_cb,
|
251
|
+
SSL_custom_ext_free_cb free_cb, void *add_arg,
|
252
|
+
SSL_custom_ext_parse_cb parse_cb,
|
253
|
+
void *parse_arg) {
|
254
|
+
return custom_ext_append(&ctx->server_custom_extensions, extension_value,
|
255
|
+
add_cb ? add_cb : default_add_callback, free_cb,
|
256
|
+
add_arg, parse_cb, parse_arg);
|
257
|
+
}
|
@@ -0,0 +1,880 @@
|
|
1
|
+
/*
|
2
|
+
* DTLS implementation written by Nagendra Modadugu
|
3
|
+
* (nagendra@cs.stanford.edu) for the OpenSSL project 2005.
|
4
|
+
*/
|
5
|
+
/* ====================================================================
|
6
|
+
* Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved.
|
7
|
+
*
|
8
|
+
* Redistribution and use in source and binary forms, with or without
|
9
|
+
* modification, are permitted provided that the following conditions
|
10
|
+
* are met:
|
11
|
+
*
|
12
|
+
* 1. Redistributions of source code must retain the above copyright
|
13
|
+
* notice, this list of conditions and the following disclaimer.
|
14
|
+
*
|
15
|
+
* 2. Redistributions in binary form must reproduce the above copyright
|
16
|
+
* notice, this list of conditions and the following disclaimer in
|
17
|
+
* the documentation and/or other materials provided with the
|
18
|
+
* distribution.
|
19
|
+
*
|
20
|
+
* 3. All advertising materials mentioning features or use of this
|
21
|
+
* software must display the following acknowledgment:
|
22
|
+
* "This product includes software developed by the OpenSSL Project
|
23
|
+
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
24
|
+
*
|
25
|
+
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
26
|
+
* endorse or promote products derived from this software without
|
27
|
+
* prior written permission. For written permission, please contact
|
28
|
+
* openssl-core@openssl.org.
|
29
|
+
*
|
30
|
+
* 5. Products derived from this software may not be called "OpenSSL"
|
31
|
+
* nor may "OpenSSL" appear in their names without prior written
|
32
|
+
* permission of the OpenSSL Project.
|
33
|
+
*
|
34
|
+
* 6. Redistributions of any form whatsoever must retain the following
|
35
|
+
* acknowledgment:
|
36
|
+
* "This product includes software developed by the OpenSSL Project
|
37
|
+
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
38
|
+
*
|
39
|
+
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
40
|
+
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
41
|
+
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
42
|
+
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
43
|
+
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
44
|
+
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
45
|
+
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
46
|
+
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
47
|
+
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
48
|
+
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
49
|
+
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
50
|
+
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
51
|
+
* ====================================================================
|
52
|
+
*
|
53
|
+
* This product includes cryptographic software written by Eric Young
|
54
|
+
* (eay@cryptsoft.com). This product includes software written by Tim
|
55
|
+
* Hudson (tjh@cryptsoft.com).
|
56
|
+
*
|
57
|
+
*/
|
58
|
+
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
|
59
|
+
* All rights reserved.
|
60
|
+
*
|
61
|
+
* This package is an SSL implementation written
|
62
|
+
* by Eric Young (eay@cryptsoft.com).
|
63
|
+
* The implementation was written so as to conform with Netscapes SSL.
|
64
|
+
*
|
65
|
+
* This library is free for commercial and non-commercial use as long as
|
66
|
+
* the following conditions are aheared to. The following conditions
|
67
|
+
* apply to all code found in this distribution, be it the RC4, RSA,
|
68
|
+
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
69
|
+
* included with this distribution is covered by the same copyright terms
|
70
|
+
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
71
|
+
*
|
72
|
+
* Copyright remains Eric Young's, and as such any Copyright notices in
|
73
|
+
* the code are not to be removed.
|
74
|
+
* If this package is used in a product, Eric Young should be given attribution
|
75
|
+
* as the author of the parts of the library used.
|
76
|
+
* This can be in the form of a textual message at program startup or
|
77
|
+
* in documentation (online or textual) provided with the package.
|
78
|
+
*
|
79
|
+
* Redistribution and use in source and binary forms, with or without
|
80
|
+
* modification, are permitted provided that the following conditions
|
81
|
+
* are met:
|
82
|
+
* 1. Redistributions of source code must retain the copyright
|
83
|
+
* notice, this list of conditions and the following disclaimer.
|
84
|
+
* 2. Redistributions in binary form must reproduce the above copyright
|
85
|
+
* notice, this list of conditions and the following disclaimer in the
|
86
|
+
* documentation and/or other materials provided with the distribution.
|
87
|
+
* 3. All advertising materials mentioning features or use of this software
|
88
|
+
* must display the following acknowledgement:
|
89
|
+
* "This product includes cryptographic software written by
|
90
|
+
* Eric Young (eay@cryptsoft.com)"
|
91
|
+
* The word 'cryptographic' can be left out if the rouines from the library
|
92
|
+
* being used are not cryptographic related :-).
|
93
|
+
* 4. If you include any Windows specific code (or a derivative thereof) from
|
94
|
+
* the apps directory (application code) you must include an acknowledgement:
|
95
|
+
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
96
|
+
*
|
97
|
+
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
98
|
+
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
99
|
+
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
100
|
+
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
101
|
+
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
102
|
+
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
103
|
+
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
104
|
+
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
105
|
+
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
106
|
+
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
107
|
+
* SUCH DAMAGE.
|
108
|
+
*
|
109
|
+
* The licence and distribution terms for any publically available version or
|
110
|
+
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
111
|
+
* copied and put under another distribution licence
|
112
|
+
* [including the GNU Public Licence.] */
|
113
|
+
|
114
|
+
#include <openssl/ssl.h>
|
115
|
+
|
116
|
+
#include <assert.h>
|
117
|
+
#include <limits.h>
|
118
|
+
#include <stdio.h>
|
119
|
+
#include <string.h>
|
120
|
+
|
121
|
+
#include <openssl/buf.h>
|
122
|
+
#include <openssl/err.h>
|
123
|
+
#include <openssl/evp.h>
|
124
|
+
#include <openssl/mem.h>
|
125
|
+
#include <openssl/obj.h>
|
126
|
+
#include <openssl/rand.h>
|
127
|
+
#include <openssl/x509.h>
|
128
|
+
|
129
|
+
#include "internal.h"
|
130
|
+
|
131
|
+
|
132
|
+
/* TODO(davidben): 28 comes from the size of IP + UDP header. Is this reasonable
|
133
|
+
* for these values? Notably, why is kMinMTU a function of the transport
|
134
|
+
* protocol's overhead rather than, say, what's needed to hold a minimally-sized
|
135
|
+
* handshake fragment plus protocol overhead. */
|
136
|
+
|
137
|
+
/* kMinMTU is the minimum acceptable MTU value. */
|
138
|
+
static const unsigned int kMinMTU = 256 - 28;
|
139
|
+
|
140
|
+
/* kDefaultMTU is the default MTU value to use if neither the user nor
|
141
|
+
* the underlying BIO supplies one. */
|
142
|
+
static const unsigned int kDefaultMTU = 1500 - 28;
|
143
|
+
|
144
|
+
/* kMaxHandshakeBuffer is the maximum number of handshake messages ahead of the
|
145
|
+
* current one to buffer. */
|
146
|
+
static const unsigned int kHandshakeBufferSize = 10;
|
147
|
+
|
148
|
+
static hm_fragment *dtls1_hm_fragment_new(size_t frag_len, int reassembly) {
|
149
|
+
hm_fragment *frag = OPENSSL_malloc(sizeof(hm_fragment));
|
150
|
+
if (frag == NULL) {
|
151
|
+
OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
|
152
|
+
return NULL;
|
153
|
+
}
|
154
|
+
memset(frag, 0, sizeof(hm_fragment));
|
155
|
+
|
156
|
+
/* If the handshake message is empty, |frag->fragment| and |frag->reassembly|
|
157
|
+
* are NULL. */
|
158
|
+
if (frag_len > 0) {
|
159
|
+
frag->fragment = OPENSSL_malloc(frag_len);
|
160
|
+
if (frag->fragment == NULL) {
|
161
|
+
OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
|
162
|
+
goto err;
|
163
|
+
}
|
164
|
+
|
165
|
+
if (reassembly) {
|
166
|
+
/* Initialize reassembly bitmask. */
|
167
|
+
if (frag_len + 7 < frag_len) {
|
168
|
+
OPENSSL_PUT_ERROR(SSL, ERR_R_OVERFLOW);
|
169
|
+
goto err;
|
170
|
+
}
|
171
|
+
size_t bitmask_len = (frag_len + 7) / 8;
|
172
|
+
frag->reassembly = OPENSSL_malloc(bitmask_len);
|
173
|
+
if (frag->reassembly == NULL) {
|
174
|
+
OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
|
175
|
+
goto err;
|
176
|
+
}
|
177
|
+
memset(frag->reassembly, 0, bitmask_len);
|
178
|
+
}
|
179
|
+
}
|
180
|
+
|
181
|
+
return frag;
|
182
|
+
|
183
|
+
err:
|
184
|
+
dtls1_hm_fragment_free(frag);
|
185
|
+
return NULL;
|
186
|
+
}
|
187
|
+
|
188
|
+
void dtls1_hm_fragment_free(hm_fragment *frag) {
|
189
|
+
if (frag == NULL) {
|
190
|
+
return;
|
191
|
+
}
|
192
|
+
OPENSSL_free(frag->fragment);
|
193
|
+
OPENSSL_free(frag->reassembly);
|
194
|
+
OPENSSL_free(frag);
|
195
|
+
}
|
196
|
+
|
197
|
+
#if !defined(inline)
|
198
|
+
#define inline __inline
|
199
|
+
#endif
|
200
|
+
|
201
|
+
/* bit_range returns a |uint8_t| with bits |start|, inclusive, to |end|,
|
202
|
+
* exclusive, set. */
|
203
|
+
static inline uint8_t bit_range(size_t start, size_t end) {
|
204
|
+
return (uint8_t)(~((1u << start) - 1) & ((1u << end) - 1));
|
205
|
+
}
|
206
|
+
|
207
|
+
/* dtls1_hm_fragment_mark marks bytes |start|, inclusive, to |end|, exclusive,
|
208
|
+
* as received in |frag|. If |frag| becomes complete, it clears
|
209
|
+
* |frag->reassembly|. The range must be within the bounds of |frag|'s message
|
210
|
+
* and |frag->reassembly| must not be NULL. */
|
211
|
+
static void dtls1_hm_fragment_mark(hm_fragment *frag, size_t start,
|
212
|
+
size_t end) {
|
213
|
+
size_t i;
|
214
|
+
size_t msg_len = frag->msg_header.msg_len;
|
215
|
+
|
216
|
+
if (frag->reassembly == NULL || start > end || end > msg_len) {
|
217
|
+
assert(0);
|
218
|
+
return;
|
219
|
+
}
|
220
|
+
/* A zero-length message will never have a pending reassembly. */
|
221
|
+
assert(msg_len > 0);
|
222
|
+
|
223
|
+
if ((start >> 3) == (end >> 3)) {
|
224
|
+
frag->reassembly[start >> 3] |= bit_range(start & 7, end & 7);
|
225
|
+
} else {
|
226
|
+
frag->reassembly[start >> 3] |= bit_range(start & 7, 8);
|
227
|
+
for (i = (start >> 3) + 1; i < (end >> 3); i++) {
|
228
|
+
frag->reassembly[i] = 0xff;
|
229
|
+
}
|
230
|
+
if ((end & 7) != 0) {
|
231
|
+
frag->reassembly[end >> 3] |= bit_range(0, end & 7);
|
232
|
+
}
|
233
|
+
}
|
234
|
+
|
235
|
+
/* Check if the fragment is complete. */
|
236
|
+
for (i = 0; i < (msg_len >> 3); i++) {
|
237
|
+
if (frag->reassembly[i] != 0xff) {
|
238
|
+
return;
|
239
|
+
}
|
240
|
+
}
|
241
|
+
if ((msg_len & 7) != 0 &&
|
242
|
+
frag->reassembly[msg_len >> 3] != bit_range(0, msg_len & 7)) {
|
243
|
+
return;
|
244
|
+
}
|
245
|
+
|
246
|
+
OPENSSL_free(frag->reassembly);
|
247
|
+
frag->reassembly = NULL;
|
248
|
+
}
|
249
|
+
|
250
|
+
static void dtls1_update_mtu(SSL *ssl) {
|
251
|
+
/* TODO(davidben): What is this code doing and do we need it? */
|
252
|
+
if (ssl->d1->mtu < dtls1_min_mtu() &&
|
253
|
+
!(SSL_get_options(ssl) & SSL_OP_NO_QUERY_MTU)) {
|
254
|
+
long mtu = BIO_ctrl(SSL_get_wbio(ssl), BIO_CTRL_DGRAM_QUERY_MTU, 0, NULL);
|
255
|
+
if (mtu >= 0 && mtu <= (1 << 30) && (unsigned)mtu >= dtls1_min_mtu()) {
|
256
|
+
ssl->d1->mtu = (unsigned)mtu;
|
257
|
+
} else {
|
258
|
+
ssl->d1->mtu = kDefaultMTU;
|
259
|
+
BIO_ctrl(SSL_get_wbio(ssl), BIO_CTRL_DGRAM_SET_MTU, ssl->d1->mtu, NULL);
|
260
|
+
}
|
261
|
+
}
|
262
|
+
|
263
|
+
/* The MTU should be above the minimum now. */
|
264
|
+
assert(ssl->d1->mtu >= dtls1_min_mtu());
|
265
|
+
}
|
266
|
+
|
267
|
+
/* dtls1_max_record_size returns the maximum record body length that may be
|
268
|
+
* written without exceeding the MTU. It accounts for any buffering installed on
|
269
|
+
* the write BIO. If no record may be written, it returns zero. */
|
270
|
+
static size_t dtls1_max_record_size(SSL *ssl) {
|
271
|
+
size_t ret = ssl->d1->mtu;
|
272
|
+
|
273
|
+
size_t overhead = ssl_max_seal_overhead(ssl);
|
274
|
+
if (ret <= overhead) {
|
275
|
+
return 0;
|
276
|
+
}
|
277
|
+
ret -= overhead;
|
278
|
+
|
279
|
+
size_t pending = BIO_wpending(SSL_get_wbio(ssl));
|
280
|
+
if (ret <= pending) {
|
281
|
+
return 0;
|
282
|
+
}
|
283
|
+
ret -= pending;
|
284
|
+
|
285
|
+
return ret;
|
286
|
+
}
|
287
|
+
|
288
|
+
static int dtls1_write_change_cipher_spec(SSL *ssl,
|
289
|
+
enum dtls1_use_epoch_t use_epoch) {
|
290
|
+
dtls1_update_mtu(ssl);
|
291
|
+
|
292
|
+
/* During the handshake, wbio is buffered to pack messages together. Flush the
|
293
|
+
* buffer if the ChangeCipherSpec would not fit in a packet. */
|
294
|
+
if (dtls1_max_record_size(ssl) == 0) {
|
295
|
+
ssl->rwstate = SSL_WRITING;
|
296
|
+
int ret = BIO_flush(SSL_get_wbio(ssl));
|
297
|
+
if (ret <= 0) {
|
298
|
+
return ret;
|
299
|
+
}
|
300
|
+
ssl->rwstate = SSL_NOTHING;
|
301
|
+
}
|
302
|
+
|
303
|
+
static const uint8_t kChangeCipherSpec[1] = {SSL3_MT_CCS};
|
304
|
+
int ret = dtls1_write_bytes(ssl, SSL3_RT_CHANGE_CIPHER_SPEC, kChangeCipherSpec,
|
305
|
+
sizeof(kChangeCipherSpec), use_epoch);
|
306
|
+
if (ret <= 0) {
|
307
|
+
return ret;
|
308
|
+
}
|
309
|
+
|
310
|
+
if (ssl->msg_callback != NULL) {
|
311
|
+
ssl->msg_callback(1 /* write */, ssl->version, SSL3_RT_CHANGE_CIPHER_SPEC,
|
312
|
+
kChangeCipherSpec, sizeof(kChangeCipherSpec), ssl,
|
313
|
+
ssl->msg_callback_arg);
|
314
|
+
}
|
315
|
+
|
316
|
+
return 1;
|
317
|
+
}
|
318
|
+
|
319
|
+
int dtls1_do_handshake_write(SSL *ssl, enum dtls1_use_epoch_t use_epoch) {
|
320
|
+
dtls1_update_mtu(ssl);
|
321
|
+
|
322
|
+
int ret = -1;
|
323
|
+
CBB cbb;
|
324
|
+
CBB_zero(&cbb);
|
325
|
+
/* Allocate a temporary buffer to hold the message fragments to avoid
|
326
|
+
* clobbering the message. */
|
327
|
+
uint8_t *buf = OPENSSL_malloc(ssl->d1->mtu);
|
328
|
+
if (buf == NULL) {
|
329
|
+
goto err;
|
330
|
+
}
|
331
|
+
|
332
|
+
/* Consume the message header. Fragments will have different headers
|
333
|
+
* prepended. */
|
334
|
+
if (ssl->init_off == 0) {
|
335
|
+
ssl->init_off += DTLS1_HM_HEADER_LENGTH;
|
336
|
+
ssl->init_num -= DTLS1_HM_HEADER_LENGTH;
|
337
|
+
}
|
338
|
+
assert(ssl->init_off >= DTLS1_HM_HEADER_LENGTH);
|
339
|
+
|
340
|
+
do {
|
341
|
+
/* During the handshake, wbio is buffered to pack messages together. Flush
|
342
|
+
* the buffer if there isn't enough room to make progress. */
|
343
|
+
if (dtls1_max_record_size(ssl) < DTLS1_HM_HEADER_LENGTH + 1) {
|
344
|
+
ssl->rwstate = SSL_WRITING;
|
345
|
+
int flush_ret = BIO_flush(SSL_get_wbio(ssl));
|
346
|
+
if (flush_ret <= 0) {
|
347
|
+
ret = flush_ret;
|
348
|
+
goto err;
|
349
|
+
}
|
350
|
+
ssl->rwstate = SSL_NOTHING;
|
351
|
+
assert(BIO_wpending(SSL_get_wbio(ssl)) == 0);
|
352
|
+
}
|
353
|
+
|
354
|
+
size_t todo = dtls1_max_record_size(ssl);
|
355
|
+
if (todo < DTLS1_HM_HEADER_LENGTH + 1) {
|
356
|
+
/* To make forward progress, the MTU must, at minimum, fit the handshake
|
357
|
+
* header and one byte of handshake body. */
|
358
|
+
OPENSSL_PUT_ERROR(SSL, SSL_R_MTU_TOO_SMALL);
|
359
|
+
goto err;
|
360
|
+
}
|
361
|
+
todo -= DTLS1_HM_HEADER_LENGTH;
|
362
|
+
|
363
|
+
if (todo > (size_t)ssl->init_num) {
|
364
|
+
todo = ssl->init_num;
|
365
|
+
}
|
366
|
+
if (todo >= (1u << 24)) {
|
367
|
+
todo = (1u << 24) - 1;
|
368
|
+
}
|
369
|
+
|
370
|
+
size_t len;
|
371
|
+
if (!CBB_init_fixed(&cbb, buf, ssl->d1->mtu) ||
|
372
|
+
!CBB_add_u8(&cbb, ssl->d1->w_msg_hdr.type) ||
|
373
|
+
!CBB_add_u24(&cbb, ssl->d1->w_msg_hdr.msg_len) ||
|
374
|
+
!CBB_add_u16(&cbb, ssl->d1->w_msg_hdr.seq) ||
|
375
|
+
!CBB_add_u24(&cbb, ssl->init_off - DTLS1_HM_HEADER_LENGTH) ||
|
376
|
+
!CBB_add_u24(&cbb, todo) ||
|
377
|
+
!CBB_add_bytes(
|
378
|
+
&cbb, (const uint8_t *)ssl->init_buf->data + ssl->init_off, todo) ||
|
379
|
+
!CBB_finish(&cbb, NULL, &len)) {
|
380
|
+
OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR);
|
381
|
+
goto err;
|
382
|
+
}
|
383
|
+
|
384
|
+
int write_ret = dtls1_write_bytes(ssl, SSL3_RT_HANDSHAKE, buf, len,
|
385
|
+
use_epoch);
|
386
|
+
if (write_ret <= 0) {
|
387
|
+
ret = write_ret;
|
388
|
+
goto err;
|
389
|
+
}
|
390
|
+
ssl->init_off += todo;
|
391
|
+
ssl->init_num -= todo;
|
392
|
+
} while (ssl->init_num > 0);
|
393
|
+
|
394
|
+
if (ssl->msg_callback != NULL) {
|
395
|
+
ssl->msg_callback(
|
396
|
+
1 /* write */, ssl->version, SSL3_RT_HANDSHAKE, ssl->init_buf->data,
|
397
|
+
(size_t)(ssl->init_off + ssl->init_num), ssl, ssl->msg_callback_arg);
|
398
|
+
}
|
399
|
+
|
400
|
+
ssl->init_off = 0;
|
401
|
+
ssl->init_num = 0;
|
402
|
+
|
403
|
+
ret = 1;
|
404
|
+
|
405
|
+
err:
|
406
|
+
CBB_cleanup(&cbb);
|
407
|
+
OPENSSL_free(buf);
|
408
|
+
return ret;
|
409
|
+
}
|
410
|
+
|
411
|
+
/* dtls1_is_next_message_complete returns one if the next handshake message is
|
412
|
+
* complete and zero otherwise. */
|
413
|
+
static int dtls1_is_next_message_complete(SSL *s) {
|
414
|
+
pitem *item = pqueue_peek(s->d1->buffered_messages);
|
415
|
+
if (item == NULL) {
|
416
|
+
return 0;
|
417
|
+
}
|
418
|
+
|
419
|
+
hm_fragment *frag = (hm_fragment *)item->data;
|
420
|
+
assert(s->d1->handshake_read_seq <= frag->msg_header.seq);
|
421
|
+
|
422
|
+
return s->d1->handshake_read_seq == frag->msg_header.seq &&
|
423
|
+
frag->reassembly == NULL;
|
424
|
+
}
|
425
|
+
|
426
|
+
/* dtls1_discard_fragment_body discards a handshake fragment body of length
|
427
|
+
* |frag_len|. It returns one on success and zero on error.
|
428
|
+
*
|
429
|
+
* TODO(davidben): This function will go away when ssl_read_bytes is gone from
|
430
|
+
* the DTLS side. */
|
431
|
+
static int dtls1_discard_fragment_body(SSL *s, size_t frag_len) {
|
432
|
+
uint8_t discard[256];
|
433
|
+
while (frag_len > 0) {
|
434
|
+
size_t chunk = frag_len < sizeof(discard) ? frag_len : sizeof(discard);
|
435
|
+
int ret = dtls1_read_bytes(s, SSL3_RT_HANDSHAKE, discard, chunk, 0);
|
436
|
+
if (ret != (int) chunk) {
|
437
|
+
return 0;
|
438
|
+
}
|
439
|
+
frag_len -= chunk;
|
440
|
+
}
|
441
|
+
return 1;
|
442
|
+
}
|
443
|
+
|
444
|
+
/* dtls1_get_buffered_message returns the buffered message corresponding to
|
445
|
+
* |msg_hdr|. If none exists, it creates a new one and inserts it in the
|
446
|
+
* queue. Otherwise, it checks |msg_hdr| is consistent with the existing one. It
|
447
|
+
* returns NULL on failure. The caller does not take ownership of the result. */
|
448
|
+
static hm_fragment *dtls1_get_buffered_message(
|
449
|
+
SSL *s, const struct hm_header_st *msg_hdr) {
|
450
|
+
uint8_t seq64be[8];
|
451
|
+
memset(seq64be, 0, sizeof(seq64be));
|
452
|
+
seq64be[6] = (uint8_t)(msg_hdr->seq >> 8);
|
453
|
+
seq64be[7] = (uint8_t)msg_hdr->seq;
|
454
|
+
pitem *item = pqueue_find(s->d1->buffered_messages, seq64be);
|
455
|
+
|
456
|
+
hm_fragment *frag;
|
457
|
+
if (item == NULL) {
|
458
|
+
/* This is the first fragment from this message. */
|
459
|
+
frag = dtls1_hm_fragment_new(msg_hdr->msg_len,
|
460
|
+
1 /* reassembly buffer needed */);
|
461
|
+
if (frag == NULL) {
|
462
|
+
return NULL;
|
463
|
+
}
|
464
|
+
memcpy(&frag->msg_header, msg_hdr, sizeof(*msg_hdr));
|
465
|
+
item = pitem_new(seq64be, frag);
|
466
|
+
if (item == NULL) {
|
467
|
+
dtls1_hm_fragment_free(frag);
|
468
|
+
return NULL;
|
469
|
+
}
|
470
|
+
item = pqueue_insert(s->d1->buffered_messages, item);
|
471
|
+
/* |pqueue_insert| fails iff a duplicate item is inserted, but |item| cannot
|
472
|
+
* be a duplicate. */
|
473
|
+
assert(item != NULL);
|
474
|
+
} else {
|
475
|
+
frag = item->data;
|
476
|
+
assert(frag->msg_header.seq == msg_hdr->seq);
|
477
|
+
if (frag->msg_header.type != msg_hdr->type ||
|
478
|
+
frag->msg_header.msg_len != msg_hdr->msg_len) {
|
479
|
+
/* The new fragment must be compatible with the previous fragments from
|
480
|
+
* this message. */
|
481
|
+
OPENSSL_PUT_ERROR(SSL, SSL_R_FRAGMENT_MISMATCH);
|
482
|
+
ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_ILLEGAL_PARAMETER);
|
483
|
+
return NULL;
|
484
|
+
}
|
485
|
+
}
|
486
|
+
return frag;
|
487
|
+
}
|
488
|
+
|
489
|
+
/* dtls1_max_handshake_message_len returns the maximum number of bytes
|
490
|
+
* permitted in a DTLS handshake message for |s|. The minimum is 16KB, but may
|
491
|
+
* be greater if the maximum certificate list size requires it. */
|
492
|
+
static size_t dtls1_max_handshake_message_len(const SSL *s) {
|
493
|
+
size_t max_len = DTLS1_HM_HEADER_LENGTH + SSL3_RT_MAX_ENCRYPTED_LENGTH;
|
494
|
+
if (max_len < s->max_cert_list) {
|
495
|
+
return s->max_cert_list;
|
496
|
+
}
|
497
|
+
return max_len;
|
498
|
+
}
|
499
|
+
|
500
|
+
/* dtls1_process_fragment reads a handshake fragment and processes it. It
|
501
|
+
* returns one if a fragment was successfully processed and 0 or -1 on error. */
|
502
|
+
static int dtls1_process_fragment(SSL *s) {
|
503
|
+
/* Read handshake message header. */
|
504
|
+
uint8_t header[DTLS1_HM_HEADER_LENGTH];
|
505
|
+
int ret = dtls1_read_bytes(s, SSL3_RT_HANDSHAKE, header,
|
506
|
+
DTLS1_HM_HEADER_LENGTH, 0);
|
507
|
+
if (ret <= 0) {
|
508
|
+
return ret;
|
509
|
+
}
|
510
|
+
if (ret != DTLS1_HM_HEADER_LENGTH) {
|
511
|
+
OPENSSL_PUT_ERROR(SSL, SSL_R_UNEXPECTED_MESSAGE);
|
512
|
+
ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_UNEXPECTED_MESSAGE);
|
513
|
+
return -1;
|
514
|
+
}
|
515
|
+
|
516
|
+
/* Parse the message fragment header. */
|
517
|
+
struct hm_header_st msg_hdr;
|
518
|
+
dtls1_get_message_header(header, &msg_hdr);
|
519
|
+
|
520
|
+
/* TODO(davidben): dtls1_read_bytes is the wrong abstraction for DTLS. There
|
521
|
+
* should be no need to reach into |s->s3->rrec.length|. */
|
522
|
+
const size_t frag_off = msg_hdr.frag_off;
|
523
|
+
const size_t frag_len = msg_hdr.frag_len;
|
524
|
+
const size_t msg_len = msg_hdr.msg_len;
|
525
|
+
if (frag_off > msg_len || frag_off + frag_len < frag_off ||
|
526
|
+
frag_off + frag_len > msg_len ||
|
527
|
+
msg_len > dtls1_max_handshake_message_len(s) ||
|
528
|
+
frag_len > s->s3->rrec.length) {
|
529
|
+
OPENSSL_PUT_ERROR(SSL, SSL_R_EXCESSIVE_MESSAGE_SIZE);
|
530
|
+
ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_ILLEGAL_PARAMETER);
|
531
|
+
return -1;
|
532
|
+
}
|
533
|
+
|
534
|
+
if (msg_hdr.seq < s->d1->handshake_read_seq ||
|
535
|
+
msg_hdr.seq > (unsigned)s->d1->handshake_read_seq +
|
536
|
+
kHandshakeBufferSize) {
|
537
|
+
/* Ignore fragments from the past, or ones too far in the future. */
|
538
|
+
if (!dtls1_discard_fragment_body(s, frag_len)) {
|
539
|
+
return -1;
|
540
|
+
}
|
541
|
+
return 1;
|
542
|
+
}
|
543
|
+
|
544
|
+
hm_fragment *frag = dtls1_get_buffered_message(s, &msg_hdr);
|
545
|
+
if (frag == NULL) {
|
546
|
+
return -1;
|
547
|
+
}
|
548
|
+
assert(frag->msg_header.msg_len == msg_len);
|
549
|
+
|
550
|
+
if (frag->reassembly == NULL) {
|
551
|
+
/* The message is already assembled. */
|
552
|
+
if (!dtls1_discard_fragment_body(s, frag_len)) {
|
553
|
+
return -1;
|
554
|
+
}
|
555
|
+
return 1;
|
556
|
+
}
|
557
|
+
assert(msg_len > 0);
|
558
|
+
|
559
|
+
/* Read the body of the fragment. */
|
560
|
+
ret = dtls1_read_bytes(s, SSL3_RT_HANDSHAKE, frag->fragment + frag_off,
|
561
|
+
frag_len, 0);
|
562
|
+
if (ret != (int) frag_len) {
|
563
|
+
OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR);
|
564
|
+
ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_INTERNAL_ERROR);
|
565
|
+
return -1;
|
566
|
+
}
|
567
|
+
dtls1_hm_fragment_mark(frag, frag_off, frag_off + frag_len);
|
568
|
+
|
569
|
+
return 1;
|
570
|
+
}
|
571
|
+
|
572
|
+
/* dtls1_get_message reads a handshake message of message type |msg_type| (any
|
573
|
+
* if |msg_type| == -1), maximum acceptable body length |max|. Read an entire
|
574
|
+
* handshake message. Handshake messages arrive in fragments. */
|
575
|
+
long dtls1_get_message(SSL *s, int st1, int stn, int msg_type, long max,
|
576
|
+
enum ssl_hash_message_t hash_message, int *ok) {
|
577
|
+
pitem *item = NULL;
|
578
|
+
hm_fragment *frag = NULL;
|
579
|
+
int al;
|
580
|
+
|
581
|
+
/* s3->tmp is used to store messages that are unexpected, caused
|
582
|
+
* by the absence of an optional handshake message */
|
583
|
+
if (s->s3->tmp.reuse_message) {
|
584
|
+
/* A ssl_dont_hash_message call cannot be combined with reuse_message; the
|
585
|
+
* ssl_dont_hash_message would have to have been applied to the previous
|
586
|
+
* call. */
|
587
|
+
assert(hash_message == ssl_hash_message);
|
588
|
+
s->s3->tmp.reuse_message = 0;
|
589
|
+
if (msg_type >= 0 && s->s3->tmp.message_type != msg_type) {
|
590
|
+
al = SSL_AD_UNEXPECTED_MESSAGE;
|
591
|
+
OPENSSL_PUT_ERROR(SSL, SSL_R_UNEXPECTED_MESSAGE);
|
592
|
+
goto f_err;
|
593
|
+
}
|
594
|
+
*ok = 1;
|
595
|
+
s->init_msg = (uint8_t *)s->init_buf->data + DTLS1_HM_HEADER_LENGTH;
|
596
|
+
s->init_num = (int)s->s3->tmp.message_size;
|
597
|
+
return s->init_num;
|
598
|
+
}
|
599
|
+
|
600
|
+
/* Process fragments until one is found. */
|
601
|
+
while (!dtls1_is_next_message_complete(s)) {
|
602
|
+
int ret = dtls1_process_fragment(s);
|
603
|
+
if (ret <= 0) {
|
604
|
+
*ok = 0;
|
605
|
+
return ret;
|
606
|
+
}
|
607
|
+
}
|
608
|
+
|
609
|
+
/* Read out the next complete handshake message. */
|
610
|
+
item = pqueue_pop(s->d1->buffered_messages);
|
611
|
+
assert(item != NULL);
|
612
|
+
frag = (hm_fragment *)item->data;
|
613
|
+
assert(s->d1->handshake_read_seq == frag->msg_header.seq);
|
614
|
+
assert(frag->reassembly == NULL);
|
615
|
+
|
616
|
+
if (frag->msg_header.msg_len > (size_t)max) {
|
617
|
+
OPENSSL_PUT_ERROR(SSL, SSL_R_EXCESSIVE_MESSAGE_SIZE);
|
618
|
+
goto err;
|
619
|
+
}
|
620
|
+
|
621
|
+
/* Reconstruct the assembled message. */
|
622
|
+
size_t len;
|
623
|
+
CBB cbb;
|
624
|
+
CBB_zero(&cbb);
|
625
|
+
if (!BUF_MEM_grow(s->init_buf,
|
626
|
+
(size_t)frag->msg_header.msg_len +
|
627
|
+
DTLS1_HM_HEADER_LENGTH) ||
|
628
|
+
!CBB_init_fixed(&cbb, (uint8_t *)s->init_buf->data, s->init_buf->max) ||
|
629
|
+
!CBB_add_u8(&cbb, frag->msg_header.type) ||
|
630
|
+
!CBB_add_u24(&cbb, frag->msg_header.msg_len) ||
|
631
|
+
!CBB_add_u16(&cbb, frag->msg_header.seq) ||
|
632
|
+
!CBB_add_u24(&cbb, 0 /* frag_off */) ||
|
633
|
+
!CBB_add_u24(&cbb, frag->msg_header.msg_len) ||
|
634
|
+
!CBB_add_bytes(&cbb, frag->fragment, frag->msg_header.msg_len) ||
|
635
|
+
!CBB_finish(&cbb, NULL, &len)) {
|
636
|
+
CBB_cleanup(&cbb);
|
637
|
+
OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
|
638
|
+
goto err;
|
639
|
+
}
|
640
|
+
assert(len == (size_t)frag->msg_header.msg_len + DTLS1_HM_HEADER_LENGTH);
|
641
|
+
|
642
|
+
s->d1->handshake_read_seq++;
|
643
|
+
|
644
|
+
/* TODO(davidben): This function has a lot of implicit outputs. Simplify the
|
645
|
+
* |ssl_get_message| API. */
|
646
|
+
s->s3->tmp.message_type = frag->msg_header.type;
|
647
|
+
s->s3->tmp.message_size = frag->msg_header.msg_len;
|
648
|
+
s->init_msg = (uint8_t *)s->init_buf->data + DTLS1_HM_HEADER_LENGTH;
|
649
|
+
s->init_num = frag->msg_header.msg_len;
|
650
|
+
|
651
|
+
if (msg_type >= 0 && s->s3->tmp.message_type != msg_type) {
|
652
|
+
al = SSL_AD_UNEXPECTED_MESSAGE;
|
653
|
+
OPENSSL_PUT_ERROR(SSL, SSL_R_UNEXPECTED_MESSAGE);
|
654
|
+
goto f_err;
|
655
|
+
}
|
656
|
+
if (hash_message == ssl_hash_message && !ssl3_hash_current_message(s)) {
|
657
|
+
goto err;
|
658
|
+
}
|
659
|
+
if (s->msg_callback) {
|
660
|
+
s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, s->init_buf->data,
|
661
|
+
s->init_num + DTLS1_HM_HEADER_LENGTH, s,
|
662
|
+
s->msg_callback_arg);
|
663
|
+
}
|
664
|
+
|
665
|
+
pitem_free(item);
|
666
|
+
dtls1_hm_fragment_free(frag);
|
667
|
+
|
668
|
+
s->state = stn;
|
669
|
+
*ok = 1;
|
670
|
+
return s->init_num;
|
671
|
+
|
672
|
+
f_err:
|
673
|
+
ssl3_send_alert(s, SSL3_AL_FATAL, al);
|
674
|
+
err:
|
675
|
+
pitem_free(item);
|
676
|
+
dtls1_hm_fragment_free(frag);
|
677
|
+
*ok = 0;
|
678
|
+
return -1;
|
679
|
+
}
|
680
|
+
|
681
|
+
int dtls1_read_failed(SSL *s, int code) {
|
682
|
+
if (code > 0) {
|
683
|
+
assert(0);
|
684
|
+
return 1;
|
685
|
+
}
|
686
|
+
|
687
|
+
if (!dtls1_is_timer_expired(s)) {
|
688
|
+
/* not a timeout, none of our business, let higher layers handle this. In
|
689
|
+
* fact, it's probably an error */
|
690
|
+
return code;
|
691
|
+
}
|
692
|
+
|
693
|
+
if (!SSL_in_init(s)) {
|
694
|
+
/* done, no need to send a retransmit */
|
695
|
+
BIO_set_flags(SSL_get_rbio(s), BIO_FLAGS_READ);
|
696
|
+
return code;
|
697
|
+
}
|
698
|
+
|
699
|
+
return DTLSv1_handle_timeout(s);
|
700
|
+
}
|
701
|
+
|
702
|
+
static uint16_t dtls1_get_queue_priority(uint16_t seq, int is_ccs) {
|
703
|
+
assert(seq * 2 >= seq);
|
704
|
+
|
705
|
+
/* The index of the retransmission queue actually is the message sequence
|
706
|
+
* number, since the queue only contains messages of a single handshake.
|
707
|
+
* However, the ChangeCipherSpec has no message sequence number and so using
|
708
|
+
* only the sequence will result in the CCS and Finished having the same
|
709
|
+
* index. To prevent this, the sequence number is multiplied by 2. In case of
|
710
|
+
* a CCS 1 is subtracted. This does not only differ CSS and Finished, it also
|
711
|
+
* maintains the order of the index (important for priority queues) and fits
|
712
|
+
* in the unsigned short variable. */
|
713
|
+
return seq * 2 - is_ccs;
|
714
|
+
}
|
715
|
+
|
716
|
+
static int dtls1_retransmit_message(SSL *s, hm_fragment *frag) {
|
717
|
+
/* DTLS renegotiation is unsupported, so only epochs 0 (NULL cipher) and 1
|
718
|
+
* (negotiated cipher) exist. */
|
719
|
+
assert(s->d1->w_epoch == 0 || s->d1->w_epoch == 1);
|
720
|
+
assert(frag->msg_header.epoch <= s->d1->w_epoch);
|
721
|
+
enum dtls1_use_epoch_t use_epoch = dtls1_use_current_epoch;
|
722
|
+
if (s->d1->w_epoch == 1 && frag->msg_header.epoch == 0) {
|
723
|
+
use_epoch = dtls1_use_previous_epoch;
|
724
|
+
}
|
725
|
+
|
726
|
+
/* TODO(davidben): This cannot handle non-blocking writes. */
|
727
|
+
int ret;
|
728
|
+
if (frag->msg_header.is_ccs) {
|
729
|
+
ret = dtls1_write_change_cipher_spec(s, use_epoch);
|
730
|
+
} else {
|
731
|
+
/* Restore the message body.
|
732
|
+
* TODO(davidben): Make this less stateful. */
|
733
|
+
memcpy(s->init_buf->data, frag->fragment,
|
734
|
+
frag->msg_header.msg_len + DTLS1_HM_HEADER_LENGTH);
|
735
|
+
s->init_num = frag->msg_header.msg_len + DTLS1_HM_HEADER_LENGTH;
|
736
|
+
|
737
|
+
dtls1_set_message_header(s, frag->msg_header.type,
|
738
|
+
frag->msg_header.msg_len, frag->msg_header.seq,
|
739
|
+
0, frag->msg_header.frag_len);
|
740
|
+
ret = dtls1_do_handshake_write(s, use_epoch);
|
741
|
+
}
|
742
|
+
|
743
|
+
/* TODO(davidben): Check return value? */
|
744
|
+
(void)BIO_flush(SSL_get_wbio(s));
|
745
|
+
return ret;
|
746
|
+
}
|
747
|
+
|
748
|
+
|
749
|
+
int dtls1_retransmit_buffered_messages(SSL *s) {
|
750
|
+
pqueue sent = s->d1->sent_messages;
|
751
|
+
piterator iter = pqueue_iterator(sent);
|
752
|
+
pitem *item;
|
753
|
+
|
754
|
+
for (item = pqueue_next(&iter); item != NULL; item = pqueue_next(&iter)) {
|
755
|
+
hm_fragment *frag = (hm_fragment *)item->data;
|
756
|
+
if (dtls1_retransmit_message(s, frag) <= 0) {
|
757
|
+
return -1;
|
758
|
+
}
|
759
|
+
}
|
760
|
+
|
761
|
+
return 1;
|
762
|
+
}
|
763
|
+
|
764
|
+
/* dtls1_buffer_change_cipher_spec adds a ChangeCipherSpec to the current
|
765
|
+
* handshake flight, ordered just before the handshake message numbered
|
766
|
+
* |seq|. */
|
767
|
+
static int dtls1_buffer_change_cipher_spec(SSL *ssl, uint16_t seq) {
|
768
|
+
hm_fragment *frag = dtls1_hm_fragment_new(0 /* frag_len */,
|
769
|
+
0 /* no reassembly */);
|
770
|
+
if (frag == NULL) {
|
771
|
+
return 0;
|
772
|
+
}
|
773
|
+
frag->msg_header.is_ccs = 1;
|
774
|
+
frag->msg_header.epoch = ssl->d1->w_epoch;
|
775
|
+
|
776
|
+
uint16_t priority = dtls1_get_queue_priority(seq, 1 /* is_ccs */);
|
777
|
+
uint8_t seq64be[8];
|
778
|
+
memset(seq64be, 0, sizeof(seq64be));
|
779
|
+
seq64be[6] = (uint8_t)(priority >> 8);
|
780
|
+
seq64be[7] = (uint8_t)priority;
|
781
|
+
|
782
|
+
pitem *item = pitem_new(seq64be, frag);
|
783
|
+
if (item == NULL) {
|
784
|
+
dtls1_hm_fragment_free(frag);
|
785
|
+
return 0;
|
786
|
+
}
|
787
|
+
|
788
|
+
pqueue_insert(ssl->d1->sent_messages, item);
|
789
|
+
return 1;
|
790
|
+
}
|
791
|
+
|
792
|
+
int dtls1_buffer_message(SSL *s) {
|
793
|
+
/* this function is called immediately after a message has
|
794
|
+
* been serialized */
|
795
|
+
assert(s->init_off == 0);
|
796
|
+
|
797
|
+
hm_fragment *frag = dtls1_hm_fragment_new(s->init_num, 0);
|
798
|
+
if (!frag) {
|
799
|
+
return 0;
|
800
|
+
}
|
801
|
+
|
802
|
+
memcpy(frag->fragment, s->init_buf->data, s->init_num);
|
803
|
+
|
804
|
+
assert(s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH ==
|
805
|
+
(unsigned int)s->init_num);
|
806
|
+
|
807
|
+
frag->msg_header.msg_len = s->d1->w_msg_hdr.msg_len;
|
808
|
+
frag->msg_header.seq = s->d1->w_msg_hdr.seq;
|
809
|
+
frag->msg_header.type = s->d1->w_msg_hdr.type;
|
810
|
+
frag->msg_header.frag_off = 0;
|
811
|
+
frag->msg_header.frag_len = s->d1->w_msg_hdr.msg_len;
|
812
|
+
frag->msg_header.is_ccs = 0;
|
813
|
+
frag->msg_header.epoch = s->d1->w_epoch;
|
814
|
+
|
815
|
+
uint16_t priority = dtls1_get_queue_priority(frag->msg_header.seq,
|
816
|
+
0 /* handshake */);
|
817
|
+
uint8_t seq64be[8];
|
818
|
+
memset(seq64be, 0, sizeof(seq64be));
|
819
|
+
seq64be[6] = (uint8_t)(priority >> 8);
|
820
|
+
seq64be[7] = (uint8_t)priority;
|
821
|
+
|
822
|
+
pitem *item = pitem_new(seq64be, frag);
|
823
|
+
if (item == NULL) {
|
824
|
+
dtls1_hm_fragment_free(frag);
|
825
|
+
return 0;
|
826
|
+
}
|
827
|
+
|
828
|
+
pqueue_insert(s->d1->sent_messages, item);
|
829
|
+
return 1;
|
830
|
+
}
|
831
|
+
|
832
|
+
int dtls1_send_change_cipher_spec(SSL *s, int a, int b) {
|
833
|
+
if (s->state == a) {
|
834
|
+
/* Buffer the message to handle retransmits. */
|
835
|
+
s->d1->handshake_write_seq = s->d1->next_handshake_write_seq;
|
836
|
+
dtls1_buffer_change_cipher_spec(s, s->d1->handshake_write_seq);
|
837
|
+
s->state = b;
|
838
|
+
}
|
839
|
+
|
840
|
+
return dtls1_write_change_cipher_spec(s, dtls1_use_current_epoch);
|
841
|
+
}
|
842
|
+
|
843
|
+
/* call this function when the buffered messages are no longer needed */
|
844
|
+
void dtls1_clear_record_buffer(SSL *s) {
|
845
|
+
pitem *item;
|
846
|
+
|
847
|
+
for (item = pqueue_pop(s->d1->sent_messages); item != NULL;
|
848
|
+
item = pqueue_pop(s->d1->sent_messages)) {
|
849
|
+
dtls1_hm_fragment_free((hm_fragment *)item->data);
|
850
|
+
pitem_free(item);
|
851
|
+
}
|
852
|
+
}
|
853
|
+
|
854
|
+
/* don't actually do the writing, wait till the MTU has been retrieved */
|
855
|
+
void dtls1_set_message_header(SSL *s, uint8_t mt, unsigned long len,
|
856
|
+
unsigned short seq_num, unsigned long frag_off,
|
857
|
+
unsigned long frag_len) {
|
858
|
+
struct hm_header_st *msg_hdr = &s->d1->w_msg_hdr;
|
859
|
+
|
860
|
+
msg_hdr->type = mt;
|
861
|
+
msg_hdr->msg_len = len;
|
862
|
+
msg_hdr->seq = seq_num;
|
863
|
+
msg_hdr->frag_off = frag_off;
|
864
|
+
msg_hdr->frag_len = frag_len;
|
865
|
+
}
|
866
|
+
|
867
|
+
unsigned int dtls1_min_mtu(void) {
|
868
|
+
return kMinMTU;
|
869
|
+
}
|
870
|
+
|
871
|
+
void dtls1_get_message_header(uint8_t *data,
|
872
|
+
struct hm_header_st *msg_hdr) {
|
873
|
+
memset(msg_hdr, 0x00, sizeof(struct hm_header_st));
|
874
|
+
msg_hdr->type = *(data++);
|
875
|
+
n2l3(data, msg_hdr->msg_len);
|
876
|
+
|
877
|
+
n2s(data, msg_hdr->seq);
|
878
|
+
n2l3(data, msg_hdr->frag_off);
|
879
|
+
n2l3(data, msg_hdr->frag_len);
|
880
|
+
}
|