Simplify SSL BIO buffering logic

The write BIO for handshake messages is bufferred so that we only write
out to the network when we have a complete flight. There was some
complexity in the buffering logic so that we switched buffering on and
off at various points through out the handshake. The only real reason to
do this was historically it complicated the state machine when you wanted
to flush because you had to traverse through the "flush" state (in order
to cope with NBIO). Where we knew up front that there was only going to
be one message in the flight we switched off buffering to avoid that.

In the new state machine there is no longer a need for a flush state so
it is simpler just to have buffering on for the whole handshake. This
also gives us the added benefit that we can simply call flush after every
flight even if it only has one message in it. This means that BIO authors
can implement their own buffering strategies and not have to be aware of
the state of the SSL object (previously they would have to switch off
their own buffering during the handshake because they could not rely on
a flush being received when they really needed to write data out). This
last point addresses GitHub Issue #322.

Reviewed-by: Andy Polyakov <appro@openssl.org>
This commit is contained in:
Matt Caswell 2016-05-17 12:28:14 +01:00
parent 72106aaab4
commit 464175692f
5 changed files with 25 additions and 43 deletions

View file

@ -3220,34 +3220,27 @@ const COMP_METHOD *SSL_get_current_expansion(SSL *s)
#endif #endif
} }
int ssl_init_wbio_buffer(SSL *s, int push) int ssl_init_wbio_buffer(SSL *s)
{ {
BIO *bbio; BIO *bbio;
if (s->bbio == NULL) { if (s->bbio == NULL) {
bbio = BIO_new(BIO_f_buffer()); bbio = BIO_new(BIO_f_buffer());
if (bbio == NULL) if (bbio == NULL)
return (0); return 0;
s->bbio = bbio; s->bbio = bbio;
s->wbio = BIO_push(bbio, s->wbio);
} else { } else {
bbio = s->bbio; bbio = s->bbio;
if (s->bbio == s->wbio) (void)BIO_reset(bbio);
s->wbio = BIO_pop(s->wbio);
} }
(void)BIO_reset(bbio);
/* if (!BIO_set_write_buffer_size(bbio,16*1024)) */
if (!BIO_set_read_buffer_size(bbio, 1)) { if (!BIO_set_read_buffer_size(bbio, 1)) {
SSLerr(SSL_F_SSL_INIT_WBIO_BUFFER, ERR_R_BUF_LIB); SSLerr(SSL_F_SSL_INIT_WBIO_BUFFER, ERR_R_BUF_LIB);
return (0); return 0;
} }
if (push) {
if (s->wbio != bbio) return 1;
s->wbio = BIO_push(bbio, s->wbio);
} else {
if (s->wbio == bbio)
s->wbio = BIO_pop(bbio);
}
return (1);
} }
void ssl_free_wbio_buffer(SSL *s) void ssl_free_wbio_buffer(SSL *s)

View file

@ -1787,7 +1787,7 @@ const SSL_METHOD *func_name(void) \
} }
struct openssl_ssl_test_functions { struct openssl_ssl_test_functions {
int (*p_ssl_init_wbio_buffer) (SSL *s, int push); int (*p_ssl_init_wbio_buffer) (SSL *s);
int (*p_ssl3_setup_buffers) (SSL *s); int (*p_ssl3_setup_buffers) (SSL *s);
# ifndef OPENSSL_NO_HEARTBEATS # ifndef OPENSSL_NO_HEARTBEATS
int (*p_dtls1_process_heartbeat) (SSL *s, int (*p_dtls1_process_heartbeat) (SSL *s,
@ -1963,7 +1963,7 @@ __owur int dtls1_shutdown(SSL *s);
__owur int dtls1_dispatch_alert(SSL *s); __owur int dtls1_dispatch_alert(SSL *s);
__owur int ssl_init_wbio_buffer(SSL *s, int push); __owur int ssl_init_wbio_buffer(SSL *s);
void ssl_free_wbio_buffer(SSL *s); void ssl_free_wbio_buffer(SSL *s);
__owur int tls1_change_cipher_state(SSL *s, int which); __owur int tls1_change_cipher_state(SSL *s, int which);

View file

@ -320,20 +320,20 @@ static int state_machine(SSL *s, int server)
*/ */
s->s3->change_cipher_spec = 0; s->s3->change_cipher_spec = 0;
if (!server || st->state != MSG_FLOW_RENEGOTIATE) {
/*
* Ok, we now need to push on a buffering BIO ...but not with
* SCTP
*/
#ifndef OPENSSL_NO_SCTP
if (!SSL_IS_DTLS(s) || !BIO_dgram_is_sctp(SSL_get_wbio(s)))
#endif
if (!ssl_init_wbio_buffer(s, server ? 1 : 0)) {
goto end;
}
/*
* Ok, we now need to push on a buffering BIO ...but not with
* SCTP
*/
#ifndef OPENSSL_NO_SCTP
if (!SSL_IS_DTLS(s) || !BIO_dgram_is_sctp(SSL_get_wbio(s)))
#endif
if (!ssl_init_wbio_buffer(s)) {
goto end;
}
if (!server || st->state != MSG_FLOW_RENEGOTIATE)
ssl3_init_finished_mac(s); ssl3_init_finished_mac(s);
}
if (server) { if (server) {
if (st->state != MSG_FLOW_RENEGOTIATE) { if (st->state != MSG_FLOW_RENEGOTIATE) {

View file

@ -437,20 +437,9 @@ WORK_STATE ossl_statem_client_post_work(SSL *s, WORK_STATE wst)
switch(st->hand_state) { switch(st->hand_state) {
case TLS_ST_CW_CLNT_HELLO: case TLS_ST_CW_CLNT_HELLO:
if (SSL_IS_DTLS(s) && s->d1->cookie_len > 0 && statem_flush(s) != 1) if (wst == WORK_MORE_A && statem_flush(s) != 1)
return WORK_MORE_A; return WORK_MORE_A;
#ifndef OPENSSL_NO_SCTP
/* Disable buffering for SCTP */
if (!SSL_IS_DTLS(s) || !BIO_dgram_is_sctp(SSL_get_wbio(s))) {
#endif
/*
* turn on buffering for the next lot of output
*/
if (s->bbio != s->wbio)
s->wbio = BIO_push(s->bbio, s->wbio);
#ifndef OPENSSL_NO_SCTP
}
#endif
if (SSL_IS_DTLS(s)) { if (SSL_IS_DTLS(s)) {
/* Treat the next message as the first packet */ /* Treat the next message as the first packet */
s->first_packet = 1; s->first_packet = 1;

View file

@ -101,7 +101,7 @@ static HEARTBEAT_TEST_FIXTURE set_up(const char *const test_case_name,
goto fail; goto fail;
} }
if (!ssl_init_wbio_buffer(fixture.s, 1)) { if (!ssl_init_wbio_buffer(fixture.s)) {
fprintf(stderr, "Failed to set up wbio buffer for test: %s\n", fprintf(stderr, "Failed to set up wbio buffer for test: %s\n",
test_case_name); test_case_name);
setup_ok = 0; setup_ok = 0;