/* Copyright (c) 2018, Google Inc. * * Permission to use, copy, modify, and/or distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ #include "test_state.h" #include #include "../../crypto/internal.h" #include "../internal.h" using namespace bssl; static CRYPTO_once_t g_once = CRYPTO_ONCE_INIT; static int g_state_index = 0; // Some code treats the zero time special, so initialize the clock to a // non-zero time. static timeval g_clock = { 1234, 1234 }; static void TestStateExFree(void *parent, void *ptr, CRYPTO_EX_DATA *ad, int index, long argl, void *argp) { delete ((TestState *)ptr); } static bool InitGlobals() { CRYPTO_once(&g_once, [] { g_state_index = SSL_get_ex_new_index(0, nullptr, nullptr, nullptr, TestStateExFree); }); return g_state_index >= 0; } struct timeval *GetClock() { return &g_clock; } void AdvanceClock(unsigned seconds) { g_clock.tv_sec += seconds; } bool SetTestState(SSL *ssl, std::unique_ptr state) { if (!InitGlobals()) { return false; } // |SSL_set_ex_data| takes ownership of |state| only on success. if (SSL_set_ex_data(ssl, g_state_index, state.get()) == 1) { state.release(); return true; } return false; } TestState *GetTestState(const SSL *ssl) { if (!InitGlobals()) { return nullptr; } return static_cast(SSL_get_ex_data(ssl, g_state_index)); } static void ssl_ctx_add_session(SSL_SESSION *session, void *void_param) { SSL_CTX *ctx = reinterpret_cast(void_param); UniquePtr new_session = SSL_SESSION_dup( session, SSL_SESSION_INCLUDE_NONAUTH | SSL_SESSION_INCLUDE_TICKET); if (new_session != nullptr) { SSL_CTX_add_session(ctx, new_session.get()); } } void CopySessions(SSL_CTX *dst, const SSL_CTX *src) { lh_SSL_SESSION_doall_arg(src->sessions, ssl_ctx_add_session, dst); } static void push_session(SSL_SESSION *session, void *arg) { auto s = reinterpret_cast *>(arg); s->push_back(session); } bool SerializeContextState(SSL_CTX *ctx, CBB *cbb) { CBB out, ctx_sessions, ticket_keys; uint8_t keys[48]; if (!CBB_add_u24_length_prefixed(cbb, &out) || !CBB_add_u16(&out, 0 /* version */) || !SSL_CTX_get_tlsext_ticket_keys(ctx, &keys, sizeof(keys)) || !CBB_add_u8_length_prefixed(&out, &ticket_keys) || !CBB_add_bytes(&ticket_keys, keys, sizeof(keys)) || !CBB_add_asn1(&out, &ctx_sessions, CBS_ASN1_SEQUENCE)) { return false; } std::vector sessions; lh_SSL_SESSION_doall_arg(ctx->sessions, push_session, &sessions); for (const auto &sess : sessions) { if (!ssl_session_serialize(sess, &ctx_sessions)) { return false; } } return CBB_flush(cbb); } bool DeserializeContextState(CBS *cbs, SSL_CTX *ctx) { CBS in, sessions, ticket_keys; uint16_t version; constexpr uint16_t kVersion = 0; if (!CBS_get_u24_length_prefixed(cbs, &in) || !CBS_get_u16(&in, &version) || version > kVersion || !CBS_get_u8_length_prefixed(&in, &ticket_keys) || !SSL_CTX_set_tlsext_ticket_keys(ctx, CBS_data(&ticket_keys), CBS_len(&ticket_keys)) || !CBS_get_asn1(&in, &sessions, CBS_ASN1_SEQUENCE)) { return false; } while (CBS_len(&sessions)) { UniquePtr session = SSL_SESSION_parse(&sessions, ctx->x509_method, ctx->pool); if (!session) { return false; } SSL_CTX_add_session(ctx, session.get()); } return true; } bool TestState::Serialize(CBB *cbb) const { CBB out, pending, text; if (!CBB_add_u24_length_prefixed(cbb, &out) || !CBB_add_u16(&out, 0 /* version */) || !CBB_add_u24_length_prefixed(&out, &pending) || (pending_session && !ssl_session_serialize(pending_session.get(), &pending)) || !CBB_add_u16_length_prefixed(&out, &text) || !CBB_add_bytes( &text, reinterpret_cast(msg_callback_text.data()), msg_callback_text.length()) || !CBB_add_asn1_uint64(&out, g_clock.tv_sec) || !CBB_add_asn1_uint64(&out, g_clock.tv_usec) || !CBB_flush(cbb)) { return false; } return true; } std::unique_ptr TestState::Deserialize(CBS *cbs, SSL_CTX *ctx) { CBS in, pending_session, text; auto state = std::make_unique(); uint16_t version; constexpr uint16_t kVersion = 0; uint64_t sec, usec; if (!CBS_get_u24_length_prefixed(cbs, &in) || // !CBS_get_u16(&in, &version) || // version > kVersion || !CBS_get_u24_length_prefixed(&in, &pending_session) || !CBS_get_u16_length_prefixed(&in, &text) || !CBS_get_asn1_uint64(&in, &sec) || // !CBS_get_asn1_uint64(&in, &usec) || // usec >= 1000000) { return nullptr; } if (CBS_len(&pending_session)) { state->pending_session = SSL_SESSION_parse( &pending_session, ctx->x509_method, ctx->pool); if (!state->pending_session) { return nullptr; } } state->msg_callback_text = std::string( reinterpret_cast(CBS_data(&text)), CBS_len(&text)); g_clock.tv_sec = sec; g_clock.tv_usec = usec; return state; }