/src/gnutls/lib/tls13/early_data.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright (C) 2017 Red Hat, Inc. |
3 | | * |
4 | | * Author: Nikos Mavrogiannopoulos |
5 | | * |
6 | | * This file is part of GnuTLS. |
7 | | * |
8 | | * The GnuTLS is free software; you can redistribute it and/or |
9 | | * modify it under the terms of the GNU Lesser General Public License |
10 | | * as published by the Free Software Foundation; either version 2.1 of |
11 | | * the License, or (at your option) any later version. |
12 | | * |
13 | | * This library is distributed in the hope that it will be useful, but |
14 | | * WITHOUT ANY WARRANTY; without even the implied warranty of |
15 | | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
16 | | * Lesser General Public License for more details. |
17 | | * |
18 | | * You should have received a copy of the GNU Lesser General Public License |
19 | | * along with this program. If not, see <https://www.gnu.org/licenses/> |
20 | | * |
21 | | */ |
22 | | |
23 | | #include "gnutls_int.h" |
24 | | #include "handshake.h" |
25 | | #include "tls13/early_data.h" |
26 | | |
27 | | int _gnutls13_send_early_data(gnutls_session_t session) |
28 | 0 | { |
29 | 0 | int ret; |
30 | |
|
31 | 0 | if (!(session->security_parameters.entity == GNUTLS_CLIENT && |
32 | 0 | session->internals.hsk_flags & HSK_EARLY_DATA_IN_FLIGHT)) |
33 | 0 | return 0; |
34 | | |
35 | 0 | while (session->internals.early_data_presend_buffer.length > 0) { |
36 | 0 | ret = |
37 | 0 | gnutls_record_send(session, |
38 | 0 | session->internals. |
39 | 0 | early_data_presend_buffer.data, |
40 | 0 | session->internals. |
41 | 0 | early_data_presend_buffer.length); |
42 | 0 | if (ret < 0) |
43 | 0 | return gnutls_assert_val(ret); |
44 | | |
45 | 0 | session->internals.early_data_presend_buffer.data += ret; |
46 | 0 | session->internals.early_data_presend_buffer.length -= ret; |
47 | 0 | } |
48 | | |
49 | 0 | return 0; |
50 | 0 | } |
51 | | |
52 | | int _gnutls13_send_end_of_early_data(gnutls_session_t session, unsigned again) |
53 | 0 | { |
54 | 0 | int ret; |
55 | 0 | mbuffer_st *bufel = NULL; |
56 | 0 | gnutls_buffer_st buf; |
57 | |
|
58 | 0 | if (!(session->security_parameters.entity == GNUTLS_CLIENT && |
59 | 0 | session->internals.hsk_flags & HSK_EARLY_DATA_ACCEPTED)) |
60 | 0 | return 0; |
61 | | |
62 | 0 | if (session->internals.flags & GNUTLS_NO_END_OF_EARLY_DATA) { |
63 | 0 | return 0; |
64 | 0 | } |
65 | | |
66 | 0 | if (again == 0) { |
67 | 0 | ret = _gnutls_buffer_init_handshake_mbuffer(&buf); |
68 | 0 | if (ret < 0) |
69 | 0 | return gnutls_assert_val(ret); |
70 | | |
71 | 0 | bufel = _gnutls_buffer_to_mbuffer(&buf); |
72 | 0 | } |
73 | | |
74 | 0 | return _gnutls_send_handshake(session, bufel, |
75 | 0 | GNUTLS_HANDSHAKE_END_OF_EARLY_DATA); |
76 | 0 | } |
77 | | |
78 | | int _gnutls13_recv_end_of_early_data(gnutls_session_t session) |
79 | 0 | { |
80 | 0 | int ret; |
81 | 0 | gnutls_buffer_st buf; |
82 | |
|
83 | 0 | if (!(session->security_parameters.entity == GNUTLS_SERVER && |
84 | 0 | session->internals.hsk_flags & HSK_EARLY_DATA_ACCEPTED)) |
85 | 0 | return 0; |
86 | | |
87 | 0 | if (!(session->internals.flags & GNUTLS_NO_END_OF_EARLY_DATA)) { |
88 | 0 | ret = |
89 | 0 | _gnutls_recv_handshake(session, |
90 | 0 | GNUTLS_HANDSHAKE_END_OF_EARLY_DATA, |
91 | 0 | 0, &buf); |
92 | 0 | if (ret < 0) |
93 | 0 | return gnutls_assert_val(ret); |
94 | | |
95 | 0 | if (buf.length != 0) { |
96 | 0 | gnutls_assert(); |
97 | 0 | ret = GNUTLS_E_RECEIVED_ILLEGAL_PARAMETER; |
98 | 0 | goto cleanup; |
99 | 0 | } |
100 | 0 | } |
101 | | |
102 | 0 | session->internals.hsk_flags &= ~HSK_EARLY_DATA_IN_FLIGHT; |
103 | |
|
104 | 0 | ret = 0; |
105 | 0 | cleanup: |
106 | |
|
107 | 0 | _gnutls_buffer_clear(&buf); |
108 | 0 | return ret; |
109 | 0 | } |