2 * Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
10 /*****************************************************************************
12 * These structures should be considered PRIVATE to the record layer. No *
13 * non-record layer code should be using these structures in any way. *
15 *****************************************************************************/
17 typedef struct ssl3_buffer_st
{
18 /* at least SSL3_RT_MAX_PACKET_SIZE bytes, see ssl3_setup_buffers() */
20 /* default buffer size (or 0 if no default set) */
24 /* where to 'copy from' */
26 /* how many bytes left */
28 /* 'buf' is from application for KTLS */
32 #define SEQ_NUM_SIZE 8
34 typedef struct ssl3_record_st
{
35 /* Record layer version */
41 /* How many bytes available */
45 * How many bytes were available before padding was removed? This is used
46 * to implement the MAC check in constant time for CBC records.
50 /* read/write offset into 'buf' */
53 /* pointer to the record data */
56 /* where the decode bytes are */
59 /* only used with decompression - malloc()ed */
62 /* Whether the data from this record has already been read or not */
65 /* epoch number, needed by DTLS1 */
68 /* sequence number, needed by DTLS1 */
70 unsigned char seq_num
[SEQ_NUM_SIZE
];
73 typedef struct dtls1_bitmap_st
{
74 /* Track 32 packets on 32-bit systems and 64 - on 64-bit systems */
76 /* Max record number seen so far, 64-bit value in big-endian encoding */
77 unsigned char max_seq_num
[SEQ_NUM_SIZE
];
80 typedef struct record_pqueue_st
{
85 typedef struct dtls1_record_data_st
{
86 unsigned char *packet
;
90 #ifndef OPENSSL_NO_SCTP
91 struct bio_dgram_sctp_rcvinfo recordinfo
;
95 typedef struct dtls_record_layer_st
{
97 * The current data and handshake epoch. This is initially
98 * undefined, and starts at zero once the initial handshake is
101 unsigned short r_epoch
;
102 unsigned short w_epoch
;
103 /* records being received in the current epoch */
105 /* renegotiation starts a new set of sequence numbers */
106 DTLS1_BITMAP next_bitmap
;
107 /* Received handshake records (processed and unprocessed) */
108 record_pqueue unprocessed_rcds
;
109 record_pqueue processed_rcds
;
111 * Buffered application records. Only for records between CCS and
112 * Finished to prevent either protocol violation or unnecessary message
115 record_pqueue buffered_app_data
;
116 /* save last and current sequence numbers for retransmissions */
117 unsigned char last_write_sequence
[8];
118 unsigned char curr_write_sequence
[8];
121 /*****************************************************************************
123 * This structure should be considered "opaque" to anything outside of the *
124 * record layer. No non-record layer code should be accessing the members of *
127 *****************************************************************************/
129 typedef struct record_layer_st
{
130 /* The parent SSL structure */
133 * Read as many input bytes as possible (for
134 * non-blocking reads)
137 /* where we are when reading */
139 /* How many pipelines can be used to read data */
141 /* How many pipelines can be used to write data */
143 /* read IO goes into here */
145 /* write IO goes into here */
146 SSL3_BUFFER wbuf
[SSL_MAX_PIPELINES
];
147 /* each decoded record goes in here */
148 SSL3_RECORD rrec
[SSL_MAX_PIPELINES
];
149 /* used internally to point at a raw packet */
150 unsigned char *packet
;
151 size_t packet_length
;
152 /* number of bytes sent so far */
154 unsigned char handshake_fragment
[4];
155 size_t handshake_fragment_len
;
156 /* The number of consecutive empty records we have received */
157 size_t empty_record_count
;
158 /* partial write - check the numbers match */
159 /* number bytes written */
162 /* number of bytes submitted */
164 const unsigned char *wpend_buf
;
165 unsigned char read_sequence
[SEQ_NUM_SIZE
];
166 unsigned char write_sequence
[SEQ_NUM_SIZE
];
167 /* Set to true if this is the first record in a connection */
168 unsigned int is_first_record
;
169 /* Count of the number of consecutive warning alerts received */
170 unsigned int alert_count
;
171 DTLS_RECORD_LAYER
*d
;
174 /*****************************************************************************
176 * The following macros/functions represent the libssl internal API to the *
177 * record layer. Any libssl code may call these functions/macros *
179 *****************************************************************************/
181 #define MIN_SSL2_RECORD_LEN 9
183 #define RECORD_LAYER_set_read_ahead(rl, ra) ((rl)->read_ahead = (ra))
184 #define RECORD_LAYER_get_read_ahead(rl) ((rl)->read_ahead)
185 #define RECORD_LAYER_get_packet(rl) ((rl)->packet)
186 #define RECORD_LAYER_get_packet_length(rl) ((rl)->packet_length)
187 #define RECORD_LAYER_add_packet_length(rl, inc) ((rl)->packet_length += (inc))
188 #define DTLS_RECORD_LAYER_get_w_epoch(rl) ((rl)->d->w_epoch)
189 #define DTLS_RECORD_LAYER_get_processed_rcds(rl) \
190 ((rl)->d->processed_rcds)
191 #define DTLS_RECORD_LAYER_get_unprocessed_rcds(rl) \
192 ((rl)->d->unprocessed_rcds)
193 #define RECORD_LAYER_get_rbuf(rl) (&(rl)->rbuf)
194 #define RECORD_LAYER_get_wbuf(rl) ((rl)->wbuf)
196 void RECORD_LAYER_init(RECORD_LAYER
*rl
, SSL
*s
);
197 void RECORD_LAYER_clear(RECORD_LAYER
*rl
);
198 void RECORD_LAYER_release(RECORD_LAYER
*rl
);
199 int RECORD_LAYER_read_pending(const RECORD_LAYER
*rl
);
200 int RECORD_LAYER_processed_read_pending(const RECORD_LAYER
*rl
);
201 int RECORD_LAYER_write_pending(const RECORD_LAYER
*rl
);
202 void RECORD_LAYER_reset_read_sequence(RECORD_LAYER
*rl
);
203 void RECORD_LAYER_reset_write_sequence(RECORD_LAYER
*rl
);
204 int RECORD_LAYER_is_sslv2_record(RECORD_LAYER
*rl
);
205 size_t RECORD_LAYER_get_rrec_length(RECORD_LAYER
*rl
);
206 __owur
size_t ssl3_pending(const SSL
*s
);
207 __owur
int ssl3_write_bytes(SSL
*s
, int type
, const void *buf
, size_t len
,
209 int do_ssl3_write(SSL
*s
, int type
, const unsigned char *buf
,
210 size_t *pipelens
, size_t numpipes
,
211 int create_empty_fragment
, size_t *written
);
212 __owur
int ssl3_read_bytes(SSL
*s
, int type
, int *recvd_type
,
213 unsigned char *buf
, size_t len
, int peek
,
215 __owur
int ssl3_setup_buffers(SSL
*s
);
216 __owur
int ssl3_enc(SSL
*s
, SSL3_RECORD
*inrecs
, size_t n_recs
, int send
);
217 __owur
int n_ssl3_mac(SSL
*ssl
, SSL3_RECORD
*rec
, unsigned char *md
, int send
);
218 __owur
int ssl3_write_pending(SSL
*s
, int type
, const unsigned char *buf
, size_t len
,
220 __owur
int tls1_enc(SSL
*s
, SSL3_RECORD
*recs
, size_t n_recs
, int send
);
221 __owur
int tls1_mac(SSL
*ssl
, SSL3_RECORD
*rec
, unsigned char *md
, int send
);
222 __owur
int tls13_enc(SSL
*s
, SSL3_RECORD
*recs
, size_t n_recs
, int send
);
223 int DTLS_RECORD_LAYER_new(RECORD_LAYER
*rl
);
224 void DTLS_RECORD_LAYER_free(RECORD_LAYER
*rl
);
225 void DTLS_RECORD_LAYER_clear(RECORD_LAYER
*rl
);
226 void DTLS_RECORD_LAYER_set_saved_w_epoch(RECORD_LAYER
*rl
, unsigned short e
);
227 void DTLS_RECORD_LAYER_clear(RECORD_LAYER
*rl
);
228 void DTLS_RECORD_LAYER_set_write_sequence(RECORD_LAYER
*rl
, unsigned char *seq
);
229 __owur
int dtls1_read_bytes(SSL
*s
, int type
, int *recvd_type
,
230 unsigned char *buf
, size_t len
, int peek
,
232 __owur
int dtls1_write_bytes(SSL
*s
, int type
, const void *buf
, size_t len
,
234 int do_dtls1_write(SSL
*s
, int type
, const unsigned char *buf
,
235 size_t len
, int create_empty_fragment
, size_t *written
);
236 void dtls1_reset_seq_numbers(SSL
*s
, int rw
);
237 int dtls_buffer_listen_record(SSL
*s
, size_t len
, unsigned char *seq
,