mirror of
				https://github.com/cuberite/polarssl.git
				synced 2025-11-04 04:32:24 -05:00 
			
		
		
		
	Prepare handshake reassembly in separate function
This commit moves the code-path preparing the handshake reassembly buffer, consisting of header, message content, and reassembly bitmap, to a separate function ssl_prepare_reassembly_buffer().
This commit is contained in:
		
							parent
							
								
									9e1ec22c36
								
							
						
					
					
						commit
						56e205e2c9
					
				@ -3470,6 +3470,39 @@ static int ssl_bitmask_check( unsigned char *mask, size_t len )
 | 
				
			|||||||
    return( 0 );
 | 
					    return( 0 );
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* msg_len does not include the handshake header */
 | 
				
			||||||
 | 
					static int ssl_prepare_reassembly_buffer( mbedtls_ssl_context *ssl, /* debug */
 | 
				
			||||||
 | 
					                                          unsigned msg_len,
 | 
				
			||||||
 | 
					                                          unsigned char **target )
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					    size_t alloc_len;
 | 
				
			||||||
 | 
					    unsigned char *buf;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    MBEDTLS_SSL_DEBUG_MSG( 2, ( "initialize reassembly, total length = %d",
 | 
				
			||||||
 | 
					                                msg_len ) );
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    /* NOTE: That should be checked earlier */
 | 
				
			||||||
 | 
					    if( msg_len > MBEDTLS_SSL_IN_CONTENT_LEN )
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        MBEDTLS_SSL_DEBUG_MSG( 1, ( "handshake message too large" ) );
 | 
				
			||||||
 | 
					        return( MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE );
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    alloc_len  = 12;                                 /* Handshake header */
 | 
				
			||||||
 | 
					    alloc_len += msg_len;                            /* Content buffer   */
 | 
				
			||||||
 | 
					    alloc_len += msg_len / 8 + ( msg_len % 8 != 0 ); /* Bitmap           */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    buf = mbedtls_calloc( 1, alloc_len );
 | 
				
			||||||
 | 
					    if( buf == NULL )
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        MBEDTLS_SSL_DEBUG_MSG( 1, ( "alloc failed (%d bytes)", alloc_len ) );
 | 
				
			||||||
 | 
					        return( MBEDTLS_ERR_SSL_ALLOC_FAILED );
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    *target = buf;
 | 
				
			||||||
 | 
					    return( 0 );
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/*
 | 
					/*
 | 
				
			||||||
 * Reassemble fragmented DTLS handshake messages.
 | 
					 * Reassemble fragmented DTLS handshake messages.
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
@ -3495,26 +3528,9 @@ static int ssl_reassemble_dtls_handshake( mbedtls_ssl_context *ssl )
 | 
				
			|||||||
     */
 | 
					     */
 | 
				
			||||||
    if( ssl->handshake->hs_msg == NULL )
 | 
					    if( ssl->handshake->hs_msg == NULL )
 | 
				
			||||||
    {
 | 
					    {
 | 
				
			||||||
        size_t alloc_len;
 | 
					        ret = ssl_prepare_reassembly_buffer( msg_len, &ssl->handshake->hs_msg );
 | 
				
			||||||
 | 
					        if( ret != 0 )
 | 
				
			||||||
        MBEDTLS_SSL_DEBUG_MSG( 2, ( "initialize reassembly, total length = %d",
 | 
					            return( ret );
 | 
				
			||||||
                            msg_len ) );
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
        if( ssl->in_hslen > MBEDTLS_SSL_IN_CONTENT_LEN )
 | 
					 | 
				
			||||||
        {
 | 
					 | 
				
			||||||
            MBEDTLS_SSL_DEBUG_MSG( 1, ( "handshake message too large" ) );
 | 
					 | 
				
			||||||
            return( MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE );
 | 
					 | 
				
			||||||
        }
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
        /* The bitmask needs one bit per byte of message excluding header */
 | 
					 | 
				
			||||||
        alloc_len = 12 + msg_len + msg_len / 8 + ( msg_len % 8 != 0 );
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
        ssl->handshake->hs_msg = mbedtls_calloc( 1, alloc_len );
 | 
					 | 
				
			||||||
        if( ssl->handshake->hs_msg == NULL )
 | 
					 | 
				
			||||||
        {
 | 
					 | 
				
			||||||
            MBEDTLS_SSL_DEBUG_MSG( 1, ( "alloc failed (%d bytes)", alloc_len ) );
 | 
					 | 
				
			||||||
            return( MBEDTLS_ERR_SSL_ALLOC_FAILED );
 | 
					 | 
				
			||||||
        }
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
        /* Prepare final header: copy msg_type, length and message_seq,
 | 
					        /* Prepare final header: copy msg_type, length and message_seq,
 | 
				
			||||||
         * then add standardised fragment_offset and fragment_length */
 | 
					         * then add standardised fragment_offset and fragment_length */
 | 
				
			||||||
 | 
				
			|||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user