mirror of
https://github.com/openssl/openssl.git
synced 2024-12-27 06:21:43 +08:00
da1c088f59
Reviewed-by: Richard Levitte <levitte@openssl.org> Release: yes
1076 lines
32 KiB
C
1076 lines
32 KiB
C
/*
|
|
* Copyright 2022-2023 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <openssl/macros.h>
|
|
#include <openssl/objects.h>
|
|
#include "internal/quic_ssl.h"
|
|
#include "internal/quic_vlint.h"
|
|
#include "internal/quic_wire.h"
|
|
#include "internal/quic_error.h"
|
|
|
|
OSSL_SAFE_MATH_UNSIGNED(uint64_t, uint64_t)
|
|
|
|
int ossl_quic_frame_ack_contains_pn(const OSSL_QUIC_FRAME_ACK *ack, QUIC_PN pn)
|
|
{
|
|
size_t i;
|
|
|
|
for (i = 0; i < ack->num_ack_ranges; ++i)
|
|
if (pn >= ack->ack_ranges[i].start
|
|
&& pn <= ack->ack_ranges[i].end)
|
|
return 1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* QUIC Wire Format Encoding
|
|
* =========================
|
|
*/
|
|
|
|
int ossl_quic_wire_encode_padding(WPACKET *pkt, size_t num_bytes)
|
|
{
|
|
/*
|
|
* PADDING is frame type zero, which as a variable-length integer is
|
|
* represented as a single zero byte. As an optimisation, just use memset.
|
|
*/
|
|
return WPACKET_memset(pkt, 0, num_bytes);
|
|
}
|
|
|
|
static int encode_frame_hdr(WPACKET *pkt, uint64_t frame_type)
|
|
{
|
|
return WPACKET_quic_write_vlint(pkt, frame_type);
|
|
}
|
|
|
|
int ossl_quic_wire_encode_frame_ping(WPACKET *pkt)
|
|
{
|
|
return encode_frame_hdr(pkt, OSSL_QUIC_FRAME_TYPE_PING);
|
|
}
|
|
|
|
int ossl_quic_wire_encode_frame_ack(WPACKET *pkt,
|
|
uint32_t ack_delay_exponent,
|
|
const OSSL_QUIC_FRAME_ACK *ack)
|
|
{
|
|
uint64_t frame_type = ack->ecn_present ? OSSL_QUIC_FRAME_TYPE_ACK_WITH_ECN
|
|
: OSSL_QUIC_FRAME_TYPE_ACK_WITHOUT_ECN;
|
|
|
|
uint64_t largest_ackd, first_ack_range, ack_delay_enc;
|
|
uint64_t i, num_ack_ranges = ack->num_ack_ranges;
|
|
OSSL_TIME delay;
|
|
|
|
if (num_ack_ranges == 0)
|
|
return 0;
|
|
|
|
delay = ossl_time_divide(ossl_time_divide(ack->delay_time, OSSL_TIME_US),
|
|
(uint64_t)1 << ack_delay_exponent);
|
|
ack_delay_enc = ossl_time2ticks(delay);
|
|
|
|
largest_ackd = ack->ack_ranges[0].end;
|
|
first_ack_range = ack->ack_ranges[0].end - ack->ack_ranges[0].start;
|
|
|
|
if (!encode_frame_hdr(pkt, frame_type)
|
|
|| !WPACKET_quic_write_vlint(pkt, largest_ackd)
|
|
|| !WPACKET_quic_write_vlint(pkt, ack_delay_enc)
|
|
|| !WPACKET_quic_write_vlint(pkt, num_ack_ranges - 1)
|
|
|| !WPACKET_quic_write_vlint(pkt, first_ack_range))
|
|
return 0;
|
|
|
|
for (i = 1; i < num_ack_ranges; ++i) {
|
|
uint64_t gap, range_len;
|
|
|
|
gap = ack->ack_ranges[i - 1].start - ack->ack_ranges[i].end - 2;
|
|
range_len = ack->ack_ranges[i].end - ack->ack_ranges[i].start;
|
|
|
|
if (!WPACKET_quic_write_vlint(pkt, gap)
|
|
|| !WPACKET_quic_write_vlint(pkt, range_len))
|
|
return 0;
|
|
}
|
|
|
|
if (ack->ecn_present)
|
|
if (!WPACKET_quic_write_vlint(pkt, ack->ect0)
|
|
|| !WPACKET_quic_write_vlint(pkt, ack->ect1)
|
|
|| !WPACKET_quic_write_vlint(pkt, ack->ecnce))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_encode_frame_reset_stream(WPACKET *pkt,
|
|
const OSSL_QUIC_FRAME_RESET_STREAM *f)
|
|
{
|
|
if (!encode_frame_hdr(pkt, OSSL_QUIC_FRAME_TYPE_RESET_STREAM)
|
|
|| !WPACKET_quic_write_vlint(pkt, f->stream_id)
|
|
|| !WPACKET_quic_write_vlint(pkt, f->app_error_code)
|
|
|| !WPACKET_quic_write_vlint(pkt, f->final_size))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_encode_frame_stop_sending(WPACKET *pkt,
|
|
const OSSL_QUIC_FRAME_STOP_SENDING *f)
|
|
{
|
|
if (!encode_frame_hdr(pkt, OSSL_QUIC_FRAME_TYPE_STOP_SENDING)
|
|
|| !WPACKET_quic_write_vlint(pkt, f->stream_id)
|
|
|| !WPACKET_quic_write_vlint(pkt, f->app_error_code))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_encode_frame_crypto_hdr(WPACKET *pkt,
|
|
const OSSL_QUIC_FRAME_CRYPTO *f)
|
|
{
|
|
if (!encode_frame_hdr(pkt, OSSL_QUIC_FRAME_TYPE_CRYPTO)
|
|
|| !WPACKET_quic_write_vlint(pkt, f->offset)
|
|
|| !WPACKET_quic_write_vlint(pkt, f->len))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
size_t ossl_quic_wire_get_encoded_frame_len_crypto_hdr(const OSSL_QUIC_FRAME_CRYPTO *f)
|
|
{
|
|
size_t a, b, c;
|
|
|
|
a = ossl_quic_vlint_encode_len(OSSL_QUIC_FRAME_TYPE_CRYPTO);
|
|
b = ossl_quic_vlint_encode_len(f->offset);
|
|
c = ossl_quic_vlint_encode_len(f->len);
|
|
if (a == 0 || b == 0 || c == 0)
|
|
return 0;
|
|
|
|
return a + b + c;
|
|
}
|
|
|
|
void *ossl_quic_wire_encode_frame_crypto(WPACKET *pkt,
|
|
const OSSL_QUIC_FRAME_CRYPTO *f)
|
|
{
|
|
unsigned char *p = NULL;
|
|
|
|
if (!ossl_quic_wire_encode_frame_crypto_hdr(pkt, f)
|
|
|| f->len > SIZE_MAX /* sizeof(uint64_t) > sizeof(size_t)? */
|
|
|| !WPACKET_allocate_bytes(pkt, (size_t)f->len, &p))
|
|
return NULL;
|
|
|
|
if (f->data != NULL)
|
|
memcpy(p, f->data, (size_t)f->len);
|
|
|
|
return p;
|
|
}
|
|
|
|
int ossl_quic_wire_encode_frame_new_token(WPACKET *pkt,
|
|
const unsigned char *token,
|
|
size_t token_len)
|
|
{
|
|
if (!encode_frame_hdr(pkt, OSSL_QUIC_FRAME_TYPE_NEW_TOKEN)
|
|
|| !WPACKET_quic_write_vlint(pkt, token_len)
|
|
|| !WPACKET_memcpy(pkt, token, token_len))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_encode_frame_stream_hdr(WPACKET *pkt,
|
|
const OSSL_QUIC_FRAME_STREAM *f)
|
|
{
|
|
uint64_t frame_type = OSSL_QUIC_FRAME_TYPE_STREAM;
|
|
|
|
if (f->offset != 0)
|
|
frame_type |= OSSL_QUIC_FRAME_FLAG_STREAM_OFF;
|
|
if (f->has_explicit_len)
|
|
frame_type |= OSSL_QUIC_FRAME_FLAG_STREAM_LEN;
|
|
if (f->is_fin)
|
|
frame_type |= OSSL_QUIC_FRAME_FLAG_STREAM_FIN;
|
|
|
|
if (!encode_frame_hdr(pkt, frame_type)
|
|
|| !WPACKET_quic_write_vlint(pkt, f->stream_id))
|
|
return 0;
|
|
|
|
if (f->offset != 0 && !WPACKET_quic_write_vlint(pkt, f->offset))
|
|
return 0;
|
|
|
|
if (f->has_explicit_len && !WPACKET_quic_write_vlint(pkt, f->len))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
size_t ossl_quic_wire_get_encoded_frame_len_stream_hdr(const OSSL_QUIC_FRAME_STREAM *f)
|
|
{
|
|
size_t a, b, c, d;
|
|
|
|
a = ossl_quic_vlint_encode_len(OSSL_QUIC_FRAME_TYPE_STREAM);
|
|
b = ossl_quic_vlint_encode_len(f->stream_id);
|
|
if (a == 0 || b == 0)
|
|
return 0;
|
|
|
|
if (f->offset > 0) {
|
|
c = ossl_quic_vlint_encode_len(f->offset);
|
|
if (c == 0)
|
|
return 0;
|
|
} else {
|
|
c = 0;
|
|
}
|
|
|
|
if (f->has_explicit_len) {
|
|
d = ossl_quic_vlint_encode_len(f->len);
|
|
if (d == 0)
|
|
return 0;
|
|
} else {
|
|
d = 0;
|
|
}
|
|
|
|
return a + b + c + d;
|
|
}
|
|
|
|
void *ossl_quic_wire_encode_frame_stream(WPACKET *pkt,
|
|
const OSSL_QUIC_FRAME_STREAM *f)
|
|
{
|
|
|
|
unsigned char *p = NULL;
|
|
|
|
if (!ossl_quic_wire_encode_frame_stream_hdr(pkt, f)
|
|
|| f->len > SIZE_MAX /* sizeof(uint64_t) > sizeof(size_t)? */)
|
|
return NULL;
|
|
|
|
if (!WPACKET_allocate_bytes(pkt, (size_t)f->len, &p))
|
|
return NULL;
|
|
|
|
if (f->data != NULL)
|
|
memcpy(p, f->data, (size_t)f->len);
|
|
|
|
return p;
|
|
}
|
|
|
|
int ossl_quic_wire_encode_frame_max_data(WPACKET *pkt,
|
|
uint64_t max_data)
|
|
{
|
|
if (!encode_frame_hdr(pkt, OSSL_QUIC_FRAME_TYPE_MAX_DATA)
|
|
|| !WPACKET_quic_write_vlint(pkt, max_data))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_encode_frame_max_stream_data(WPACKET *pkt,
|
|
uint64_t stream_id,
|
|
uint64_t max_data)
|
|
{
|
|
if (!encode_frame_hdr(pkt, OSSL_QUIC_FRAME_TYPE_MAX_STREAM_DATA)
|
|
|| !WPACKET_quic_write_vlint(pkt, stream_id)
|
|
|| !WPACKET_quic_write_vlint(pkt, max_data))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_encode_frame_max_streams(WPACKET *pkt,
|
|
char is_uni,
|
|
uint64_t max_streams)
|
|
{
|
|
if (!encode_frame_hdr(pkt, is_uni ? OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_UNI
|
|
: OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_BIDI)
|
|
|| !WPACKET_quic_write_vlint(pkt, max_streams))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_encode_frame_data_blocked(WPACKET *pkt,
|
|
uint64_t max_data)
|
|
{
|
|
if (!encode_frame_hdr(pkt, OSSL_QUIC_FRAME_TYPE_DATA_BLOCKED)
|
|
|| !WPACKET_quic_write_vlint(pkt, max_data))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
|
|
int ossl_quic_wire_encode_frame_stream_data_blocked(WPACKET *pkt,
|
|
uint64_t stream_id,
|
|
uint64_t max_stream_data)
|
|
{
|
|
if (!encode_frame_hdr(pkt, OSSL_QUIC_FRAME_TYPE_STREAM_DATA_BLOCKED)
|
|
|| !WPACKET_quic_write_vlint(pkt, stream_id)
|
|
|| !WPACKET_quic_write_vlint(pkt, max_stream_data))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_encode_frame_streams_blocked(WPACKET *pkt,
|
|
char is_uni,
|
|
uint64_t max_streams)
|
|
{
|
|
if (!encode_frame_hdr(pkt, is_uni ? OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_UNI
|
|
: OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_BIDI)
|
|
|| !WPACKET_quic_write_vlint(pkt, max_streams))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_encode_frame_new_conn_id(WPACKET *pkt,
|
|
const OSSL_QUIC_FRAME_NEW_CONN_ID *f)
|
|
{
|
|
if (f->conn_id.id_len < 1
|
|
|| f->conn_id.id_len > QUIC_MAX_CONN_ID_LEN)
|
|
return 0;
|
|
|
|
if (!encode_frame_hdr(pkt, OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID)
|
|
|| !WPACKET_quic_write_vlint(pkt, f->seq_num)
|
|
|| !WPACKET_quic_write_vlint(pkt, f->retire_prior_to)
|
|
|| !WPACKET_put_bytes_u8(pkt, f->conn_id.id_len)
|
|
|| !WPACKET_memcpy(pkt, f->conn_id.id, f->conn_id.id_len)
|
|
|| !WPACKET_memcpy(pkt, f->stateless_reset.token,
|
|
sizeof(f->stateless_reset.token)))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_encode_frame_retire_conn_id(WPACKET *pkt,
|
|
uint64_t seq_num)
|
|
{
|
|
if (!encode_frame_hdr(pkt, OSSL_QUIC_FRAME_TYPE_RETIRE_CONN_ID)
|
|
|| !WPACKET_quic_write_vlint(pkt, seq_num))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_encode_frame_path_challenge(WPACKET *pkt,
|
|
uint64_t data)
|
|
{
|
|
if (!encode_frame_hdr(pkt, OSSL_QUIC_FRAME_TYPE_PATH_CHALLENGE)
|
|
|| !WPACKET_put_bytes_u64(pkt, data))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_encode_frame_path_response(WPACKET *pkt,
|
|
uint64_t data)
|
|
{
|
|
if (!encode_frame_hdr(pkt, OSSL_QUIC_FRAME_TYPE_PATH_RESPONSE)
|
|
|| !WPACKET_put_bytes_u64(pkt, data))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_encode_frame_conn_close(WPACKET *pkt,
|
|
const OSSL_QUIC_FRAME_CONN_CLOSE *f)
|
|
{
|
|
if (!encode_frame_hdr(pkt, f->is_app ? OSSL_QUIC_FRAME_TYPE_CONN_CLOSE_APP
|
|
: OSSL_QUIC_FRAME_TYPE_CONN_CLOSE_TRANSPORT)
|
|
|| !WPACKET_quic_write_vlint(pkt, f->error_code))
|
|
return 0;
|
|
|
|
/*
|
|
* RFC 9000 s. 19.19: The application-specific variant of CONNECTION_CLOSE
|
|
* (type 0x1d) does not include this field.
|
|
*/
|
|
if (!f->is_app && !WPACKET_quic_write_vlint(pkt, f->frame_type))
|
|
return 0;
|
|
|
|
if (!WPACKET_quic_write_vlint(pkt, f->reason_len)
|
|
|| !WPACKET_memcpy(pkt, f->reason, f->reason_len))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_encode_frame_handshake_done(WPACKET *pkt)
|
|
{
|
|
return encode_frame_hdr(pkt, OSSL_QUIC_FRAME_TYPE_HANDSHAKE_DONE);
|
|
}
|
|
|
|
unsigned char *ossl_quic_wire_encode_transport_param_bytes(WPACKET *pkt,
|
|
uint64_t id,
|
|
const unsigned char *value,
|
|
size_t value_len)
|
|
{
|
|
unsigned char *b = NULL;
|
|
|
|
if (!WPACKET_quic_write_vlint(pkt, id)
|
|
|| !WPACKET_quic_write_vlint(pkt, value_len))
|
|
return NULL;
|
|
|
|
if (value_len == 0)
|
|
b = WPACKET_get_curr(pkt);
|
|
else if (!WPACKET_allocate_bytes(pkt, value_len, (unsigned char **)&b))
|
|
return NULL;
|
|
|
|
if (value != NULL)
|
|
memcpy(b, value, value_len);
|
|
|
|
return b;
|
|
}
|
|
|
|
int ossl_quic_wire_encode_transport_param_int(WPACKET *pkt,
|
|
uint64_t id,
|
|
uint64_t value)
|
|
{
|
|
if (!WPACKET_quic_write_vlint(pkt, id)
|
|
|| !WPACKET_quic_write_vlint(pkt, ossl_quic_vlint_encode_len(value))
|
|
|| !WPACKET_quic_write_vlint(pkt, value))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_encode_transport_param_cid(WPACKET *wpkt,
|
|
uint64_t id,
|
|
const QUIC_CONN_ID *cid)
|
|
{
|
|
if (cid->id_len > QUIC_MAX_CONN_ID_LEN)
|
|
return 0;
|
|
|
|
if (ossl_quic_wire_encode_transport_param_bytes(wpkt, id,
|
|
cid->id,
|
|
cid->id_len) == NULL)
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
/*
|
|
* QUIC Wire Format Decoding
|
|
* =========================
|
|
*/
|
|
int ossl_quic_wire_peek_frame_header(PACKET *pkt, uint64_t *type,
|
|
int *was_minimal)
|
|
{
|
|
return PACKET_peek_quic_vlint_ex(pkt, type, was_minimal);
|
|
}
|
|
|
|
int ossl_quic_wire_skip_frame_header(PACKET *pkt, uint64_t *type)
|
|
{
|
|
return PACKET_get_quic_vlint(pkt, type);
|
|
}
|
|
|
|
static int expect_frame_header_mask(PACKET *pkt,
|
|
uint64_t expected_frame_type,
|
|
uint64_t mask_bits,
|
|
uint64_t *actual_frame_type)
|
|
{
|
|
uint64_t actual_frame_type_;
|
|
|
|
if (!ossl_quic_wire_skip_frame_header(pkt, &actual_frame_type_)
|
|
|| (actual_frame_type_ & ~mask_bits) != expected_frame_type)
|
|
return 0;
|
|
|
|
if (actual_frame_type != NULL)
|
|
*actual_frame_type = actual_frame_type_;
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int expect_frame_header(PACKET *pkt, uint64_t expected_frame_type)
|
|
{
|
|
uint64_t actual_frame_type;
|
|
|
|
if (!ossl_quic_wire_skip_frame_header(pkt, &actual_frame_type)
|
|
|| actual_frame_type != expected_frame_type)
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_peek_frame_ack_num_ranges(const PACKET *orig_pkt,
|
|
uint64_t *total_ranges)
|
|
{
|
|
PACKET pkt = *orig_pkt;
|
|
uint64_t ack_range_count, i;
|
|
|
|
if (!expect_frame_header_mask(&pkt, OSSL_QUIC_FRAME_TYPE_ACK_WITHOUT_ECN,
|
|
1, NULL)
|
|
|| !PACKET_skip_quic_vlint(&pkt)
|
|
|| !PACKET_skip_quic_vlint(&pkt)
|
|
|| !PACKET_get_quic_vlint(&pkt, &ack_range_count))
|
|
return 0;
|
|
|
|
/*
|
|
* Ensure the specified number of ack ranges listed in the ACK frame header
|
|
* actually are available in the frame data. This naturally bounds the
|
|
* number of ACK ranges which can be requested by the MDPL, and therefore by
|
|
* the MTU. This ensures we do not allocate memory for an excessive number
|
|
* of ACK ranges.
|
|
*/
|
|
for (i = 0; i < ack_range_count; ++i)
|
|
if (!PACKET_skip_quic_vlint(&pkt)
|
|
|| !PACKET_skip_quic_vlint(&pkt))
|
|
return 0;
|
|
|
|
/* (cannot overflow because QUIC vlints can only encode up to 2**62-1) */
|
|
*total_ranges = ack_range_count + 1;
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_frame_ack(PACKET *pkt,
|
|
uint32_t ack_delay_exponent,
|
|
OSSL_QUIC_FRAME_ACK *ack,
|
|
uint64_t *total_ranges) {
|
|
uint64_t frame_type, largest_ackd, ack_delay_raw;
|
|
uint64_t ack_range_count, first_ack_range, start, end, i;
|
|
|
|
/* This call matches both ACK_WITHOUT_ECN and ACK_WITH_ECN. */
|
|
if (!expect_frame_header_mask(pkt, OSSL_QUIC_FRAME_TYPE_ACK_WITHOUT_ECN,
|
|
1, &frame_type)
|
|
|| !PACKET_get_quic_vlint(pkt, &largest_ackd)
|
|
|| !PACKET_get_quic_vlint(pkt, &ack_delay_raw)
|
|
|| !PACKET_get_quic_vlint(pkt, &ack_range_count)
|
|
|| !PACKET_get_quic_vlint(pkt, &first_ack_range))
|
|
return 0;
|
|
|
|
if (first_ack_range > largest_ackd)
|
|
return 0;
|
|
|
|
if (ack_range_count > SIZE_MAX /* sizeof(uint64_t) > sizeof(size_t)? */)
|
|
return 0;
|
|
|
|
start = largest_ackd - first_ack_range;
|
|
|
|
if (ack != NULL) {
|
|
int err = 0;
|
|
ack->delay_time
|
|
= ossl_time_multiply(ossl_ticks2time(OSSL_TIME_US),
|
|
safe_mul_uint64_t(ack_delay_raw,
|
|
(uint64_t)1 << ack_delay_exponent,
|
|
&err));
|
|
if (err)
|
|
ack->delay_time = ossl_time_infinite();
|
|
|
|
if (ack->num_ack_ranges > 0) {
|
|
ack->ack_ranges[0].end = largest_ackd;
|
|
ack->ack_ranges[0].start = start;
|
|
}
|
|
}
|
|
|
|
for (i = 0; i < ack_range_count; ++i) {
|
|
uint64_t gap, len;
|
|
|
|
if (!PACKET_get_quic_vlint(pkt, &gap)
|
|
|| !PACKET_get_quic_vlint(pkt, &len))
|
|
return 0;
|
|
|
|
end = start - gap - 2;
|
|
if (start < gap + 2 || len > end)
|
|
return 0;
|
|
|
|
if (ack != NULL && i + 1 < ack->num_ack_ranges) {
|
|
ack->ack_ranges[i + 1].start = start = end - len;
|
|
ack->ack_ranges[i + 1].end = end;
|
|
}
|
|
}
|
|
|
|
if (ack != NULL && ack_range_count + 1 < ack->num_ack_ranges)
|
|
ack->num_ack_ranges = (size_t)ack_range_count + 1;
|
|
|
|
if (total_ranges != NULL)
|
|
*total_ranges = ack_range_count + 1;
|
|
|
|
if (frame_type == OSSL_QUIC_FRAME_TYPE_ACK_WITH_ECN) {
|
|
uint64_t ect0, ect1, ecnce;
|
|
|
|
if (!PACKET_get_quic_vlint(pkt, &ect0)
|
|
|| !PACKET_get_quic_vlint(pkt, &ect1)
|
|
|| !PACKET_get_quic_vlint(pkt, &ecnce))
|
|
return 0;
|
|
|
|
if (ack != NULL) {
|
|
ack->ect0 = ect0;
|
|
ack->ect1 = ect1;
|
|
ack->ecnce = ecnce;
|
|
ack->ecn_present = 1;
|
|
}
|
|
} else if (ack != NULL) {
|
|
ack->ecn_present = 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_frame_reset_stream(PACKET *pkt,
|
|
OSSL_QUIC_FRAME_RESET_STREAM *f)
|
|
{
|
|
if (!expect_frame_header(pkt, OSSL_QUIC_FRAME_TYPE_RESET_STREAM)
|
|
|| !PACKET_get_quic_vlint(pkt, &f->stream_id)
|
|
|| !PACKET_get_quic_vlint(pkt, &f->app_error_code)
|
|
|| !PACKET_get_quic_vlint(pkt, &f->final_size))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_frame_stop_sending(PACKET *pkt,
|
|
OSSL_QUIC_FRAME_STOP_SENDING *f)
|
|
{
|
|
if (!expect_frame_header(pkt, OSSL_QUIC_FRAME_TYPE_STOP_SENDING)
|
|
|| !PACKET_get_quic_vlint(pkt, &f->stream_id)
|
|
|| !PACKET_get_quic_vlint(pkt, &f->app_error_code))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_frame_crypto(PACKET *pkt,
|
|
int nodata,
|
|
OSSL_QUIC_FRAME_CRYPTO *f)
|
|
{
|
|
if (!expect_frame_header(pkt, OSSL_QUIC_FRAME_TYPE_CRYPTO)
|
|
|| !PACKET_get_quic_vlint(pkt, &f->offset)
|
|
|| !PACKET_get_quic_vlint(pkt, &f->len)
|
|
|| f->len > SIZE_MAX /* sizeof(uint64_t) > sizeof(size_t)? */)
|
|
return 0;
|
|
|
|
if (f->offset + f->len > (((uint64_t)1) << 62) - 1)
|
|
/* RFC 9000 s. 19.6 */
|
|
return 0;
|
|
|
|
if (nodata) {
|
|
f->data = NULL;
|
|
} else {
|
|
if (PACKET_remaining(pkt) < f->len)
|
|
return 0;
|
|
|
|
f->data = PACKET_data(pkt);
|
|
|
|
if (!PACKET_forward(pkt, (size_t)f->len))
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_frame_new_token(PACKET *pkt,
|
|
const unsigned char **token,
|
|
size_t *token_len)
|
|
{
|
|
uint64_t token_len_;
|
|
|
|
if (!expect_frame_header(pkt, OSSL_QUIC_FRAME_TYPE_NEW_TOKEN)
|
|
|| !PACKET_get_quic_vlint(pkt, &token_len_))
|
|
return 0;
|
|
|
|
if (token_len_ > SIZE_MAX)
|
|
return 0;
|
|
|
|
*token = PACKET_data(pkt);
|
|
*token_len = (size_t)token_len_;
|
|
|
|
if (!PACKET_forward(pkt, (size_t)token_len_))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_frame_stream(PACKET *pkt,
|
|
int nodata,
|
|
OSSL_QUIC_FRAME_STREAM *f)
|
|
{
|
|
uint64_t frame_type;
|
|
|
|
/* This call matches all STREAM values (low 3 bits are masked). */
|
|
if (!expect_frame_header_mask(pkt, OSSL_QUIC_FRAME_TYPE_STREAM,
|
|
OSSL_QUIC_FRAME_FLAG_STREAM_MASK,
|
|
&frame_type)
|
|
|| !PACKET_get_quic_vlint(pkt, &f->stream_id))
|
|
return 0;
|
|
|
|
if ((frame_type & OSSL_QUIC_FRAME_FLAG_STREAM_OFF) != 0) {
|
|
if (!PACKET_get_quic_vlint(pkt, &f->offset))
|
|
return 0;
|
|
} else {
|
|
f->offset = 0;
|
|
}
|
|
|
|
f->has_explicit_len = ((frame_type & OSSL_QUIC_FRAME_FLAG_STREAM_LEN) != 0);
|
|
f->is_fin = ((frame_type & OSSL_QUIC_FRAME_FLAG_STREAM_FIN) != 0);
|
|
|
|
if (f->has_explicit_len) {
|
|
if (!PACKET_get_quic_vlint(pkt, &f->len))
|
|
return 0;
|
|
} else {
|
|
if (nodata)
|
|
f->len = 0;
|
|
else
|
|
f->len = PACKET_remaining(pkt);
|
|
}
|
|
|
|
/*
|
|
* RFC 9000 s. 19.8: "The largest offset delivered on a stream -- the sum of
|
|
* the offset and data length -- cannot exceed 2**62 - 1, as it is not
|
|
* possible to provide flow control credit for that data."
|
|
*/
|
|
if (f->offset + f->len > (((uint64_t)1) << 62) - 1)
|
|
return 0;
|
|
|
|
if (nodata) {
|
|
f->data = NULL;
|
|
} else {
|
|
f->data = PACKET_data(pkt);
|
|
|
|
if (f->len > SIZE_MAX /* sizeof(uint64_t) > sizeof(size_t)? */
|
|
|| !PACKET_forward(pkt, (size_t)f->len))
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_frame_max_data(PACKET *pkt,
|
|
uint64_t *max_data)
|
|
{
|
|
if (!expect_frame_header(pkt, OSSL_QUIC_FRAME_TYPE_MAX_DATA)
|
|
|| !PACKET_get_quic_vlint(pkt, max_data))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_frame_max_stream_data(PACKET *pkt,
|
|
uint64_t *stream_id,
|
|
uint64_t *max_stream_data)
|
|
{
|
|
if (!expect_frame_header(pkt, OSSL_QUIC_FRAME_TYPE_MAX_STREAM_DATA)
|
|
|| !PACKET_get_quic_vlint(pkt, stream_id)
|
|
|| !PACKET_get_quic_vlint(pkt, max_stream_data))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_frame_max_streams(PACKET *pkt,
|
|
uint64_t *max_streams)
|
|
{
|
|
/* This call matches both MAX_STREAMS_BIDI and MAX_STREAMS_UNI. */
|
|
if (!expect_frame_header_mask(pkt, OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_BIDI,
|
|
1, NULL)
|
|
|| !PACKET_get_quic_vlint(pkt, max_streams))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_frame_data_blocked(PACKET *pkt,
|
|
uint64_t *max_data)
|
|
{
|
|
if (!expect_frame_header(pkt, OSSL_QUIC_FRAME_TYPE_DATA_BLOCKED)
|
|
|| !PACKET_get_quic_vlint(pkt, max_data))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_frame_stream_data_blocked(PACKET *pkt,
|
|
uint64_t *stream_id,
|
|
uint64_t *max_stream_data)
|
|
{
|
|
if (!expect_frame_header(pkt, OSSL_QUIC_FRAME_TYPE_STREAM_DATA_BLOCKED)
|
|
|| !PACKET_get_quic_vlint(pkt, stream_id)
|
|
|| !PACKET_get_quic_vlint(pkt, max_stream_data))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_frame_streams_blocked(PACKET *pkt,
|
|
uint64_t *max_streams)
|
|
{
|
|
/* This call matches both STREAMS_BLOCKED_BIDI and STREAMS_BLOCKED_UNI. */
|
|
if (!expect_frame_header_mask(pkt, OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_BIDI,
|
|
1, NULL)
|
|
|| !PACKET_get_quic_vlint(pkt, max_streams))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_frame_new_conn_id(PACKET *pkt,
|
|
OSSL_QUIC_FRAME_NEW_CONN_ID *f)
|
|
{
|
|
unsigned int len;
|
|
|
|
if (!expect_frame_header(pkt, OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID)
|
|
|| !PACKET_get_quic_vlint(pkt, &f->seq_num)
|
|
|| !PACKET_get_quic_vlint(pkt, &f->retire_prior_to)
|
|
|| f->seq_num < f->retire_prior_to
|
|
|| !PACKET_get_1(pkt, &len)
|
|
|| len < 1
|
|
|| len > QUIC_MAX_CONN_ID_LEN)
|
|
return 0;
|
|
|
|
f->conn_id.id_len = (unsigned char)len;
|
|
if (!PACKET_copy_bytes(pkt, f->conn_id.id, len))
|
|
return 0;
|
|
|
|
/* Clear unused bytes to allow consistent memcmp. */
|
|
if (len < QUIC_MAX_CONN_ID_LEN)
|
|
memset(f->conn_id.id + len, 0, QUIC_MAX_CONN_ID_LEN - len);
|
|
|
|
if (!PACKET_copy_bytes(pkt, f->stateless_reset.token,
|
|
sizeof(f->stateless_reset.token)))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_frame_retire_conn_id(PACKET *pkt,
|
|
uint64_t *seq_num)
|
|
{
|
|
if (!expect_frame_header(pkt, OSSL_QUIC_FRAME_TYPE_RETIRE_CONN_ID)
|
|
|| !PACKET_get_quic_vlint(pkt, seq_num))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_frame_path_challenge(PACKET *pkt,
|
|
uint64_t *data)
|
|
{
|
|
if (!expect_frame_header(pkt, OSSL_QUIC_FRAME_TYPE_PATH_CHALLENGE)
|
|
|| !PACKET_get_net_8(pkt, data))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_frame_path_response(PACKET *pkt,
|
|
uint64_t *data)
|
|
{
|
|
if (!expect_frame_header(pkt, OSSL_QUIC_FRAME_TYPE_PATH_RESPONSE)
|
|
|| !PACKET_get_net_8(pkt, data))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_frame_conn_close(PACKET *pkt,
|
|
OSSL_QUIC_FRAME_CONN_CLOSE *f)
|
|
{
|
|
uint64_t frame_type, reason_len;
|
|
|
|
/* This call matches both CONN_CLOSE_TRANSPORT and CONN_CLOSE_APP. */
|
|
if (!expect_frame_header_mask(pkt, OSSL_QUIC_FRAME_TYPE_CONN_CLOSE_TRANSPORT,
|
|
1, &frame_type)
|
|
|| !PACKET_get_quic_vlint(pkt, &f->error_code))
|
|
return 0;
|
|
|
|
f->is_app = ((frame_type & 1) != 0);
|
|
|
|
if (!f->is_app) {
|
|
if (!PACKET_get_quic_vlint(pkt, &f->frame_type))
|
|
return 0;
|
|
} else {
|
|
f->frame_type = 0;
|
|
}
|
|
|
|
if (!PACKET_get_quic_vlint(pkt, &reason_len)
|
|
|| reason_len > SIZE_MAX)
|
|
return 0;
|
|
|
|
if (!PACKET_get_bytes(pkt, (const unsigned char **)&f->reason,
|
|
(size_t)reason_len))
|
|
return 0;
|
|
|
|
f->reason_len = (size_t)reason_len;
|
|
return 1;
|
|
}
|
|
|
|
size_t ossl_quic_wire_decode_padding(PACKET *pkt)
|
|
{
|
|
const unsigned char *start = PACKET_data(pkt), *end = PACKET_end(pkt),
|
|
*p = start;
|
|
|
|
while (p < end && *p == 0)
|
|
++p;
|
|
|
|
if (!PACKET_forward(pkt, p - start))
|
|
return 0;
|
|
|
|
return p - start;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_frame_ping(PACKET *pkt)
|
|
{
|
|
return expect_frame_header(pkt, OSSL_QUIC_FRAME_TYPE_PING);
|
|
}
|
|
|
|
int ossl_quic_wire_decode_frame_handshake_done(PACKET *pkt)
|
|
{
|
|
return expect_frame_header(pkt, OSSL_QUIC_FRAME_TYPE_HANDSHAKE_DONE);
|
|
}
|
|
|
|
int ossl_quic_wire_peek_transport_param(PACKET *pkt, uint64_t *id)
|
|
{
|
|
return PACKET_peek_quic_vlint(pkt, id);
|
|
}
|
|
|
|
const unsigned char *ossl_quic_wire_decode_transport_param_bytes(PACKET *pkt,
|
|
uint64_t *id,
|
|
size_t *len)
|
|
{
|
|
uint64_t len_;
|
|
const unsigned char *b = NULL;
|
|
uint64_t id_;
|
|
|
|
if (!PACKET_get_quic_vlint(pkt, &id_)
|
|
|| !PACKET_get_quic_vlint(pkt, &len_))
|
|
return NULL;
|
|
|
|
if (len_ > SIZE_MAX
|
|
|| !PACKET_get_bytes(pkt, (const unsigned char **)&b, (size_t)len_))
|
|
return NULL;
|
|
|
|
*len = (size_t)len_;
|
|
if (id != NULL)
|
|
*id = id_;
|
|
return b;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_transport_param_int(PACKET *pkt,
|
|
uint64_t *id,
|
|
uint64_t *value)
|
|
{
|
|
PACKET sub;
|
|
|
|
sub.curr = ossl_quic_wire_decode_transport_param_bytes(pkt,
|
|
id, &sub.remaining);
|
|
if (sub.curr == NULL)
|
|
return 0;
|
|
|
|
if (!PACKET_get_quic_vlint(&sub, value))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_transport_param_cid(PACKET *pkt,
|
|
uint64_t *id,
|
|
QUIC_CONN_ID *cid)
|
|
{
|
|
const unsigned char *body;
|
|
size_t len = 0;
|
|
|
|
body = ossl_quic_wire_decode_transport_param_bytes(pkt, id, &len);
|
|
if (body == NULL || len > QUIC_MAX_CONN_ID_LEN)
|
|
return 0;
|
|
|
|
cid->id_len = (unsigned char)len;
|
|
memcpy(cid->id, body, cid->id_len);
|
|
return 1;
|
|
}
|
|
|
|
int ossl_quic_wire_decode_transport_param_preferred_addr(PACKET *pkt,
|
|
QUIC_PREFERRED_ADDR *p)
|
|
{
|
|
const unsigned char *body;
|
|
uint64_t id;
|
|
size_t len = 0;
|
|
PACKET pkt2;
|
|
unsigned int ipv4_port, ipv6_port, cidl;
|
|
|
|
body = ossl_quic_wire_decode_transport_param_bytes(pkt, &id, &len);
|
|
if (body == NULL
|
|
|| len < QUIC_MIN_ENCODED_PREFERRED_ADDR_LEN
|
|
|| len > QUIC_MAX_ENCODED_PREFERRED_ADDR_LEN
|
|
|| id != QUIC_TPARAM_PREFERRED_ADDR)
|
|
return 0;
|
|
|
|
if (!PACKET_buf_init(&pkt2, body, len))
|
|
return 0;
|
|
|
|
if (!PACKET_copy_bytes(&pkt2, p->ipv4, sizeof(p->ipv4))
|
|
|| !PACKET_get_net_2(&pkt2, &ipv4_port)
|
|
|| !PACKET_copy_bytes(&pkt2, p->ipv6, sizeof(p->ipv6))
|
|
|| !PACKET_get_net_2(&pkt2, &ipv6_port)
|
|
|| !PACKET_get_1(&pkt2, &cidl)
|
|
|| cidl > QUIC_MAX_CONN_ID_LEN
|
|
|| !PACKET_copy_bytes(&pkt2, p->cid.id, cidl)
|
|
|| !PACKET_copy_bytes(&pkt2, p->stateless_reset.token,
|
|
sizeof(p->stateless_reset.token)))
|
|
return 0;
|
|
|
|
p->ipv4_port = (uint16_t)ipv4_port;
|
|
p->ipv6_port = (uint16_t)ipv6_port;
|
|
p->cid.id_len = (unsigned char)cidl;
|
|
return 1;
|
|
}
|
|
|
|
const char *
|
|
ossl_quic_frame_type_to_string(uint64_t frame_type)
|
|
{
|
|
switch (frame_type) {
|
|
#define X(name) case OSSL_QUIC_FRAME_TYPE_##name: return #name;
|
|
X(PADDING)
|
|
X(PING)
|
|
X(ACK_WITHOUT_ECN)
|
|
X(ACK_WITH_ECN)
|
|
X(RESET_STREAM)
|
|
X(STOP_SENDING)
|
|
X(CRYPTO)
|
|
X(NEW_TOKEN)
|
|
X(MAX_DATA)
|
|
X(MAX_STREAM_DATA)
|
|
X(MAX_STREAMS_BIDI)
|
|
X(MAX_STREAMS_UNI)
|
|
X(DATA_BLOCKED)
|
|
X(STREAM_DATA_BLOCKED)
|
|
X(STREAMS_BLOCKED_BIDI)
|
|
X(STREAMS_BLOCKED_UNI)
|
|
X(NEW_CONN_ID)
|
|
X(RETIRE_CONN_ID)
|
|
X(PATH_CHALLENGE)
|
|
X(PATH_RESPONSE)
|
|
X(CONN_CLOSE_TRANSPORT)
|
|
X(CONN_CLOSE_APP)
|
|
X(HANDSHAKE_DONE)
|
|
X(STREAM)
|
|
X(STREAM_FIN)
|
|
X(STREAM_LEN)
|
|
X(STREAM_LEN_FIN)
|
|
X(STREAM_OFF)
|
|
X(STREAM_OFF_FIN)
|
|
X(STREAM_OFF_LEN)
|
|
X(STREAM_OFF_LEN_FIN)
|
|
#undef X
|
|
default:
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
const char *ossl_quic_err_to_string(uint64_t error_code)
|
|
{
|
|
switch (error_code) {
|
|
#define X(name) case QUIC_ERR_##name: return #name;
|
|
X(NO_ERROR)
|
|
X(INTERNAL_ERROR)
|
|
X(CONNECTION_REFUSED)
|
|
X(FLOW_CONTROL_ERROR)
|
|
X(STREAM_LIMIT_ERROR)
|
|
X(STREAM_STATE_ERROR)
|
|
X(FINAL_SIZE_ERROR)
|
|
X(FRAME_ENCODING_ERROR)
|
|
X(TRANSPORT_PARAMETER_ERROR)
|
|
X(CONNECTION_ID_LIMIT_ERROR)
|
|
X(PROTOCOL_VIOLATION)
|
|
X(INVALID_TOKEN)
|
|
X(APPLICATION_ERROR)
|
|
X(CRYPTO_BUFFER_EXCEEDED)
|
|
X(KEY_UPDATE_ERROR)
|
|
X(AEAD_LIMIT_REACHED)
|
|
X(NO_VIABLE_PATH)
|
|
#undef X
|
|
default:
|
|
return NULL;
|
|
}
|
|
}
|