VirtualBox

source: vbox/trunk/src/libs/openssl-3.3.2/ssl/quic/quic_demux.c@ 108358

最後變更 在這個檔案從108358是 108206,由 vboxsync 提交於 5 週 前

openssl-3.3.2: Exported all files to OSE and removed .scm-settings ​bugref:10757

  • 屬性 svn:eol-style 設為 native
  • 屬性 svn:keywords 設為 Author Date Id Revision
檔案大小: 14.3 KB
 
1/*
2 * Copyright 2022-2024 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10#include "internal/quic_demux.h"
11#include "internal/quic_wire_pkt.h"
12#include "internal/common.h"
13#include <openssl/lhash.h>
14#include <openssl/err.h>
15
16#define URXE_DEMUX_STATE_FREE 0 /* on urx_free list */
17#define URXE_DEMUX_STATE_PENDING 1 /* on urx_pending list */
18#define URXE_DEMUX_STATE_ISSUED 2 /* on neither list */
19
20#define DEMUX_MAX_MSGS_PER_CALL 32
21
22#define DEMUX_DEFAULT_MTU 1500
23
24struct quic_demux_st {
25 /* The underlying transport BIO with datagram semantics. */
26 BIO *net_bio;
27
28 /*
29 * QUIC short packets do not contain the length of the connection ID field,
30 * therefore it must be known contextually. The demuxer requires connection
31 * IDs of the same length to be used for all incoming packets.
32 */
33 size_t short_conn_id_len;
34
35 /*
36 * Our current understanding of the upper bound on an incoming datagram size
37 * in bytes.
38 */
39 size_t mtu;
40
41 /* The datagram_id to use for the next datagram we receive. */
42 uint64_t next_datagram_id;
43
44 /* Time retrieval callback. */
45 OSSL_TIME (*now)(void *arg);
46 void *now_arg;
47
48 /* The default packet handler, if any. */
49 ossl_quic_demux_cb_fn *default_cb;
50 void *default_cb_arg;
51
52 /*
53 * List of URXEs which are not currently in use (i.e., not filled with
54 * unconsumed data). These are moved to the pending list as they are filled.
55 */
56 QUIC_URXE_LIST urx_free;
57
58 /*
59 * List of URXEs which are filled with received encrypted data. These are
60 * removed from this list as we invoke the callbacks for each of them. They
61 * are then not on any list managed by us; we forget about them until our
62 * user calls ossl_quic_demux_release_urxe to return the URXE to us, at
63 * which point we add it to the free list.
64 */
65 QUIC_URXE_LIST urx_pending;
66
67 /* Whether to use local address support. */
68 char use_local_addr;
69};
70
71QUIC_DEMUX *ossl_quic_demux_new(BIO *net_bio,
72 size_t short_conn_id_len,
73 OSSL_TIME (*now)(void *arg),
74 void *now_arg)
75{
76 QUIC_DEMUX *demux;
77
78 demux = OPENSSL_zalloc(sizeof(QUIC_DEMUX));
79 if (demux == NULL)
80 return NULL;
81
82 demux->net_bio = net_bio;
83 demux->short_conn_id_len = short_conn_id_len;
84 /* We update this if possible when we get a BIO. */
85 demux->mtu = DEMUX_DEFAULT_MTU;
86 demux->now = now;
87 demux->now_arg = now_arg;
88
89 if (net_bio != NULL
90 && BIO_dgram_get_local_addr_cap(net_bio)
91 && BIO_dgram_set_local_addr_enable(net_bio, 1))
92 demux->use_local_addr = 1;
93
94 return demux;
95}
96
97static void demux_free_urxl(QUIC_URXE_LIST *l)
98{
99 QUIC_URXE *e, *enext;
100
101 for (e = ossl_list_urxe_head(l); e != NULL; e = enext) {
102 enext = ossl_list_urxe_next(e);
103 ossl_list_urxe_remove(l, e);
104 OPENSSL_free(e);
105 }
106}
107
108void ossl_quic_demux_free(QUIC_DEMUX *demux)
109{
110 if (demux == NULL)
111 return;
112
113 /* Free all URXEs we are holding. */
114 demux_free_urxl(&demux->urx_free);
115 demux_free_urxl(&demux->urx_pending);
116
117 OPENSSL_free(demux);
118}
119
120void ossl_quic_demux_set_bio(QUIC_DEMUX *demux, BIO *net_bio)
121{
122 unsigned int mtu;
123
124 demux->net_bio = net_bio;
125
126 if (net_bio != NULL) {
127 /*
128 * Try to determine our MTU if possible. The BIO is not required to
129 * support this, in which case we remain at the last known MTU, or our
130 * initial default.
131 */
132 mtu = BIO_dgram_get_mtu(net_bio);
133 if (mtu >= QUIC_MIN_INITIAL_DGRAM_LEN)
134 ossl_quic_demux_set_mtu(demux, mtu); /* best effort */
135 }
136}
137
138int ossl_quic_demux_set_mtu(QUIC_DEMUX *demux, unsigned int mtu)
139{
140 if (mtu < QUIC_MIN_INITIAL_DGRAM_LEN)
141 return 0;
142
143 demux->mtu = mtu;
144 return 1;
145}
146
147void ossl_quic_demux_set_default_handler(QUIC_DEMUX *demux,
148 ossl_quic_demux_cb_fn *cb,
149 void *cb_arg)
150{
151 demux->default_cb = cb;
152 demux->default_cb_arg = cb_arg;
153}
154
155static QUIC_URXE *demux_alloc_urxe(size_t alloc_len)
156{
157 QUIC_URXE *e;
158
159 if (alloc_len >= SIZE_MAX - sizeof(QUIC_URXE))
160 return NULL;
161
162 e = OPENSSL_malloc(sizeof(QUIC_URXE) + alloc_len);
163 if (e == NULL)
164 return NULL;
165
166 ossl_list_urxe_init_elem(e);
167 e->alloc_len = alloc_len;
168 e->data_len = 0;
169 return e;
170}
171
172static QUIC_URXE *demux_resize_urxe(QUIC_DEMUX *demux, QUIC_URXE *e,
173 size_t new_alloc_len)
174{
175 QUIC_URXE *e2, *prev;
176
177 if (!ossl_assert(e->demux_state == URXE_DEMUX_STATE_FREE))
178 /* Never attempt to resize a URXE which is not on the free list. */
179 return NULL;
180
181 prev = ossl_list_urxe_prev(e);
182 ossl_list_urxe_remove(&demux->urx_free, e);
183
184 e2 = OPENSSL_realloc(e, sizeof(QUIC_URXE) + new_alloc_len);
185 if (e2 == NULL) {
186 /* Failed to resize, abort. */
187 if (prev == NULL)
188 ossl_list_urxe_insert_head(&demux->urx_free, e);
189 else
190 ossl_list_urxe_insert_after(&demux->urx_free, prev, e);
191
192 return NULL;
193 }
194
195 if (prev == NULL)
196 ossl_list_urxe_insert_head(&demux->urx_free, e2);
197 else
198 ossl_list_urxe_insert_after(&demux->urx_free, prev, e2);
199
200 e2->alloc_len = new_alloc_len;
201 return e2;
202}
203
204static QUIC_URXE *demux_reserve_urxe(QUIC_DEMUX *demux, QUIC_URXE *e,
205 size_t alloc_len)
206{
207 return e->alloc_len < alloc_len ? demux_resize_urxe(demux, e, alloc_len) : e;
208}
209
210static int demux_ensure_free_urxe(QUIC_DEMUX *demux, size_t min_num_free)
211{
212 QUIC_URXE *e;
213
214 while (ossl_list_urxe_num(&demux->urx_free) < min_num_free) {
215 e = demux_alloc_urxe(demux->mtu);
216 if (e == NULL)
217 return 0;
218
219 ossl_list_urxe_insert_tail(&demux->urx_free, e);
220 e->demux_state = URXE_DEMUX_STATE_FREE;
221 }
222
223 return 1;
224}
225
226/*
227 * Receive datagrams from network, placing them into URXEs.
228 *
229 * Returns 1 on success or 0 on failure.
230 *
231 * Precondition: at least one URXE is free
232 * Precondition: there are no pending URXEs
233 */
234static int demux_recv(QUIC_DEMUX *demux)
235{
236 BIO_MSG msg[DEMUX_MAX_MSGS_PER_CALL];
237 size_t rd, i;
238 QUIC_URXE *urxe = ossl_list_urxe_head(&demux->urx_free), *unext;
239 OSSL_TIME now;
240
241 /* This should never be called when we have any pending URXE. */
242 assert(ossl_list_urxe_head(&demux->urx_pending) == NULL);
243 assert(urxe->demux_state == URXE_DEMUX_STATE_FREE);
244
245 if (demux->net_bio == NULL)
246 /*
247 * If no BIO is plugged in, treat this as no datagram being available.
248 */
249 return QUIC_DEMUX_PUMP_RES_TRANSIENT_FAIL;
250
251 /*
252 * Opportunistically receive as many messages as possible in a single
253 * syscall, determined by how many free URXEs are available.
254 */
255 for (i = 0; i < (ossl_ssize_t)OSSL_NELEM(msg);
256 ++i, urxe = ossl_list_urxe_next(urxe)) {
257 if (urxe == NULL) {
258 /* We need at least one URXE to receive into. */
259 if (!ossl_assert(i > 0))
260 return QUIC_DEMUX_PUMP_RES_PERMANENT_FAIL;
261
262 break;
263 }
264
265 /* Ensure the URXE is big enough. */
266 urxe = demux_reserve_urxe(demux, urxe, demux->mtu);
267 if (urxe == NULL)
268 /* Allocation error, fail. */
269 return QUIC_DEMUX_PUMP_RES_PERMANENT_FAIL;
270
271 /* Ensure we zero any fields added to BIO_MSG at a later date. */
272 memset(&msg[i], 0, sizeof(BIO_MSG));
273 msg[i].data = ossl_quic_urxe_data(urxe);
274 msg[i].data_len = urxe->alloc_len;
275 msg[i].peer = &urxe->peer;
276 BIO_ADDR_clear(&urxe->peer);
277 if (demux->use_local_addr)
278 msg[i].local = &urxe->local;
279 else
280 BIO_ADDR_clear(&urxe->local);
281 }
282
283 ERR_set_mark();
284 if (!BIO_recvmmsg(demux->net_bio, msg, sizeof(BIO_MSG), i, 0, &rd)) {
285 if (BIO_err_is_non_fatal(ERR_peek_last_error())) {
286 /* Transient error, clear the error and stop. */
287 ERR_pop_to_mark();
288 return QUIC_DEMUX_PUMP_RES_TRANSIENT_FAIL;
289 } else {
290 /* Non-transient error, do not clear the error. */
291 ERR_clear_last_mark();
292 return QUIC_DEMUX_PUMP_RES_PERMANENT_FAIL;
293 }
294 }
295
296 ERR_clear_last_mark();
297 now = demux->now != NULL ? demux->now(demux->now_arg) : ossl_time_zero();
298
299 urxe = ossl_list_urxe_head(&demux->urx_free);
300 for (i = 0; i < rd; ++i, urxe = unext) {
301 unext = ossl_list_urxe_next(urxe);
302 /* Set URXE with actual length of received datagram. */
303 urxe->data_len = msg[i].data_len;
304 /* Time we received datagram. */
305 urxe->time = now;
306 urxe->datagram_id = demux->next_datagram_id++;
307 /* Move from free list to pending list. */
308 ossl_list_urxe_remove(&demux->urx_free, urxe);
309 ossl_list_urxe_insert_tail(&demux->urx_pending, urxe);
310 urxe->demux_state = URXE_DEMUX_STATE_PENDING;
311 }
312
313 return QUIC_DEMUX_PUMP_RES_OK;
314}
315
316/* Extract destination connection ID from the first packet in a datagram. */
317static int demux_identify_conn_id(QUIC_DEMUX *demux,
318 QUIC_URXE *e,
319 QUIC_CONN_ID *dst_conn_id)
320{
321 return ossl_quic_wire_get_pkt_hdr_dst_conn_id(ossl_quic_urxe_data(e),
322 e->data_len,
323 demux->short_conn_id_len,
324 dst_conn_id);
325}
326
327/*
328 * Process a single pending URXE.
329 * Returning 1 on success, 0 on failure.
330 */
331static int demux_process_pending_urxe(QUIC_DEMUX *demux, QUIC_URXE *e)
332{
333 QUIC_CONN_ID dst_conn_id;
334 int dst_conn_id_ok = 0;
335
336 /* The next URXE we process should be at the head of the pending list. */
337 if (!ossl_assert(e == ossl_list_urxe_head(&demux->urx_pending)))
338 return 0;
339
340 assert(e->demux_state == URXE_DEMUX_STATE_PENDING);
341
342 /* Determine the DCID of the first packet in the datagram. */
343 dst_conn_id_ok = demux_identify_conn_id(demux, e, &dst_conn_id);
344
345 ossl_list_urxe_remove(&demux->urx_pending, e);
346 if (demux->default_cb != NULL) {
347 /*
348 * Pass to default handler for routing. The URXE now belongs to the
349 * callback.
350 */
351 e->demux_state = URXE_DEMUX_STATE_ISSUED;
352 demux->default_cb(e, demux->default_cb_arg,
353 dst_conn_id_ok ? &dst_conn_id : NULL);
354 } else {
355 /* Discard. */
356 ossl_list_urxe_insert_tail(&demux->urx_free, e);
357 e->demux_state = URXE_DEMUX_STATE_FREE;
358 }
359
360 return 1; /* keep processing pending URXEs */
361}
362
363/* Process pending URXEs to generate callbacks. */
364static int demux_process_pending_urxl(QUIC_DEMUX *demux)
365{
366 QUIC_URXE *e;
367 int ret;
368
369 while ((e = ossl_list_urxe_head(&demux->urx_pending)) != NULL)
370 if ((ret = demux_process_pending_urxe(demux, e)) <= 0)
371 return ret;
372
373 return 1;
374}
375
376/*
377 * Drain the pending URXE list, processing any pending URXEs by making their
378 * callbacks. If no URXEs are pending, a network read is attempted first.
379 */
380int ossl_quic_demux_pump(QUIC_DEMUX *demux)
381{
382 int ret;
383
384 if (ossl_list_urxe_head(&demux->urx_pending) == NULL) {
385 ret = demux_ensure_free_urxe(demux, DEMUX_MAX_MSGS_PER_CALL);
386 if (ret != 1)
387 return QUIC_DEMUX_PUMP_RES_PERMANENT_FAIL;
388
389 ret = demux_recv(demux);
390 if (ret != QUIC_DEMUX_PUMP_RES_OK)
391 return ret;
392
393 /*
394 * If demux_recv returned successfully, we should always have something.
395 */
396 assert(ossl_list_urxe_head(&demux->urx_pending) != NULL);
397 }
398
399 if ((ret = demux_process_pending_urxl(demux)) <= 0)
400 return QUIC_DEMUX_PUMP_RES_PERMANENT_FAIL;
401
402 return QUIC_DEMUX_PUMP_RES_OK;
403}
404
405/* Artificially inject a packet into the demuxer for testing purposes. */
406int ossl_quic_demux_inject(QUIC_DEMUX *demux,
407 const unsigned char *buf,
408 size_t buf_len,
409 const BIO_ADDR *peer,
410 const BIO_ADDR *local)
411{
412 int ret;
413 QUIC_URXE *urxe;
414
415 ret = demux_ensure_free_urxe(demux, 1);
416 if (ret != 1)
417 return 0;
418
419 urxe = ossl_list_urxe_head(&demux->urx_free);
420
421 assert(urxe->demux_state == URXE_DEMUX_STATE_FREE);
422
423 urxe = demux_reserve_urxe(demux, urxe, buf_len);
424 if (urxe == NULL)
425 return 0;
426
427 memcpy(ossl_quic_urxe_data(urxe), buf, buf_len);
428 urxe->data_len = buf_len;
429
430 if (peer != NULL)
431 urxe->peer = *peer;
432 else
433 BIO_ADDR_clear(&urxe->peer);
434
435 if (local != NULL)
436 urxe->local = *local;
437 else
438 BIO_ADDR_clear(&urxe->local);
439
440 urxe->time
441 = demux->now != NULL ? demux->now(demux->now_arg) : ossl_time_zero();
442
443 /* Move from free list to pending list. */
444 ossl_list_urxe_remove(&demux->urx_free, urxe);
445 ossl_list_urxe_insert_tail(&demux->urx_pending, urxe);
446 urxe->demux_state = URXE_DEMUX_STATE_PENDING;
447
448 return demux_process_pending_urxl(demux) > 0;
449}
450
451/* Called by our user to return a URXE to the free list. */
452void ossl_quic_demux_release_urxe(QUIC_DEMUX *demux,
453 QUIC_URXE *e)
454{
455 assert(ossl_list_urxe_prev(e) == NULL && ossl_list_urxe_next(e) == NULL);
456 assert(e->demux_state == URXE_DEMUX_STATE_ISSUED);
457 ossl_list_urxe_insert_tail(&demux->urx_free, e);
458 e->demux_state = URXE_DEMUX_STATE_FREE;
459}
460
461void ossl_quic_demux_reinject_urxe(QUIC_DEMUX *demux,
462 QUIC_URXE *e)
463{
464 assert(ossl_list_urxe_prev(e) == NULL && ossl_list_urxe_next(e) == NULL);
465 assert(e->demux_state == URXE_DEMUX_STATE_ISSUED);
466 ossl_list_urxe_insert_head(&demux->urx_pending, e);
467 e->demux_state = URXE_DEMUX_STATE_PENDING;
468}
469
470int ossl_quic_demux_has_pending(const QUIC_DEMUX *demux)
471{
472 return ossl_list_urxe_head(&demux->urx_pending) != NULL;
473}
注意: 瀏覽 TracBrowser 來幫助您使用儲存庫瀏覽器

© 2025 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette