Skip to content

Commit

Permalink
Bug 1368980 - Refactor extension senders, r=ekr,ttaubert
Browse files Browse the repository at this point in the history
--HG--
branch : NSS_TLS13_DRAFT19_BRANCH
extra : rebase_source : c2c4eae5bc13298513fac59b2f336af0047094e1
extra : amend_source : c598baccb0a630e2648d8b2d6733694c861f89b6
extra : source : 15572efbbc172c68ef8a307a7c2f61f5e7b17319
  • Loading branch information
martinthomson committed May 31, 2017
1 parent 83048fd commit 793a2fc
Show file tree
Hide file tree
Showing 29 changed files with 1,529 additions and 2,183 deletions.
2 changes: 2 additions & 0 deletions fuzz/tls_mutators.cc
Expand Up @@ -6,7 +6,9 @@
#include "tls_parser.h"

#include "ssl.h"
extern "C" {
#include "sslimpl.h"
}

using namespace nss_test;

Expand Down
24 changes: 0 additions & 24 deletions gtests/ssl_gtest/libssl_internals.c
Expand Up @@ -351,30 +351,6 @@ unsigned char *SSLInt_CipherSpecToIv(PRBool isServer, ssl3CipherSpec *spec) {
return GetKeyingMaterial(isServer, spec)->write_iv;
}

SECStatus SSLInt_EnableShortHeaders(PRFileDesc *fd) {
sslSocket *ss;

ss = ssl_FindSocket(fd);
if (!ss) {
return SECFailure;
}

ss->opt.enableShortHeaders = PR_TRUE;
return SECSuccess;
}

SECStatus SSLInt_UsingShortHeaders(PRFileDesc *fd, PRBool *result) {
sslSocket *ss;

ss = ssl_FindSocket(fd);
if (!ss) {
return SECFailure;
}

*result = ss->ssl3.hs.shortHeaders;
return SECSuccess;
}

void SSLInt_SetTicketLifetime(uint32_t lifetime) {
ssl_ticket_lifetime = lifetime;
}
Expand Down
2 changes: 0 additions & 2 deletions gtests/ssl_gtest/libssl_internals.h
Expand Up @@ -48,8 +48,6 @@ PK11SymKey *SSLInt_CipherSpecToKey(PRBool isServer, ssl3CipherSpec *spec);
SSLCipherAlgorithm SSLInt_CipherSpecToAlgorithm(PRBool isServer,
ssl3CipherSpec *spec);
unsigned char *SSLInt_CipherSpecToIv(PRBool isServer, ssl3CipherSpec *spec);
SECStatus SSLInt_EnableShortHeaders(PRFileDesc *fd);
SECStatus SSLInt_UsingShortHeaders(PRFileDesc *fd, PRBool *result);
void SSLInt_SetTicketLifetime(uint32_t lifetime);
void SSLInt_SetMaxEarlyDataSize(uint32_t size);
SECStatus SSLInt_SetSocketMaxEarlyDataSize(PRFileDesc *fd, uint32_t size);
Expand Down
8 changes: 0 additions & 8 deletions gtests/ssl_gtest/ssl_loopback_unittest.cc
Expand Up @@ -315,14 +315,6 @@ TEST_F(TlsConnectStreamTls13, Tls13FailedWriteSecondFlight) {
client_->CheckErrorCode(SSL_ERROR_SOCKET_WRITE_FAILURE);
}

TEST_F(TlsConnectStreamTls13, NegotiateShortHeaders) {
client_->SetShortHeadersEnabled();
server_->SetShortHeadersEnabled();
client_->ExpectShortHeaders();
server_->ExpectShortHeaders();
Connect();
}

INSTANTIATE_TEST_CASE_P(
GenericStream, TlsConnectGeneric,
::testing::Combine(TlsConnectTestBase::kTlsVariantsStream,
Expand Down
14 changes: 0 additions & 14 deletions gtests/ssl_gtest/tls_agent.cc
Expand Up @@ -73,7 +73,6 @@ TlsAgent::TlsAgent(const std::string& name, Role role,
handshake_callback_(),
auth_certificate_callback_(),
sni_callback_(),
expect_short_headers_(false),
skip_version_checks_(false) {
memset(&info_, 0, sizeof(info_));
memset(&csinfo_, 0, sizeof(csinfo_));
Expand Down Expand Up @@ -407,13 +406,6 @@ void TlsAgent::SetFallbackSCSVEnabled(bool en) {
EXPECT_EQ(SECSuccess, rv);
}

void TlsAgent::SetShortHeadersEnabled() {
EXPECT_TRUE(EnsureTlsSetup());

SECStatus rv = SSLInt_EnableShortHeaders(ssl_fd());
EXPECT_EQ(SECSuccess, rv);
}

void TlsAgent::SetVersionRange(uint16_t minver, uint16_t maxver) {
vrange_.min = minver;
vrange_.max = maxver;
Expand All @@ -437,8 +429,6 @@ void TlsAgent::SetServerKeyBits(uint16_t bits) { server_key_bits_ = bits; }

void TlsAgent::ExpectReadWriteError() { expect_readwrite_error_ = true; }

void TlsAgent::ExpectShortHeaders() { expect_short_headers_ = true; }

void TlsAgent::SkipVersionChecks() { skip_version_checks_ = true; }

void TlsAgent::SetSignatureSchemes(const SSLSignatureScheme* schemes,
Expand Down Expand Up @@ -764,10 +754,6 @@ void TlsAgent::Connected() {
}
}

PRBool short_headers;
rv = SSLInt_UsingShortHeaders(ssl_fd(), &short_headers);
EXPECT_EQ(SECSuccess, rv);
EXPECT_EQ((PRBool)expect_short_headers_, short_headers);
SetState(STATE_CONNECTED);
}

Expand Down
3 changes: 0 additions & 3 deletions gtests/ssl_gtest/tls_agent.h
Expand Up @@ -126,7 +126,6 @@ class TlsAgent : public PollTarget {
void SetSessionCacheEnabled(bool en);
void Set0RttEnabled(bool en);
void SetFallbackSCSVEnabled(bool en);
void SetShortHeadersEnabled();
void SetVersionRange(uint16_t minver, uint16_t maxver);
void GetVersionRange(uint16_t* minver, uint16_t* maxver);
void CheckPreliminaryInfo();
Expand All @@ -136,7 +135,6 @@ class TlsAgent : public PollTarget {
void ExpectReadWriteError();
void EnableFalseStart();
void ExpectResumption();
void ExpectShortHeaders();
void SkipVersionChecks();
void SetSignatureSchemes(const SSLSignatureScheme* schemes, size_t count);
void EnableAlpn(const uint8_t* val, size_t len);
Expand Down Expand Up @@ -388,7 +386,6 @@ class TlsAgent : public PollTarget {
HandshakeCallbackFunction handshake_callback_;
AuthCertificateCallbackFunction auth_certificate_callback_;
SniCallbackFunction sni_callback_;
bool expect_short_headers_;
bool skip_version_checks_;
};

Expand Down
4 changes: 2 additions & 2 deletions lib/ssl/dtlscon.c
Expand Up @@ -346,7 +346,7 @@ dtls_HandleHandshake(sslSocket *ss, sslBuffer *origBuf)
(fragment_offset == 0) &&
(fragment_length == message_length)) {
/* Complete next message. Process immediately */
ss->ssl3.hs.msg_type = (SSL3HandshakeType)type;
ss->ssl3.hs.msg_type = (SSLHandshakeType)type;
ss->ssl3.hs.msg_len = message_length;

rv = dtls_HandleHandshakeMessage(ss, buf.buf,
Expand Down Expand Up @@ -391,7 +391,7 @@ dtls_HandleHandshake(sslSocket *ss, sslBuffer *origBuf)
ss->ssl3.hs.recvdHighWater = 0;
PORT_Memset(ss->ssl3.hs.recvdFragments.buf, 0,
ss->ssl3.hs.recvdFragments.space);
ss->ssl3.hs.msg_type = (SSL3HandshakeType)type;
ss->ssl3.hs.msg_type = (SSLHandshakeType)type;
ss->ssl3.hs.msg_len = message_length;
}

Expand Down
2 changes: 1 addition & 1 deletion lib/ssl/manifest.mn
Expand Up @@ -25,7 +25,7 @@ CSRCS = \
sslauth.c \
sslcon.c \
ssldef.c \
ssl3encode.c \
sslencode.c \
sslenum.c \
sslerr.c \
sslerrstrs.c \
Expand Down
2 changes: 1 addition & 1 deletion lib/ssl/selfencrypt.c
Expand Up @@ -11,7 +11,7 @@
#include "pk11func.h"
#include "ssl.h"
#include "sslt.h"
#include "ssl3encode.h"
#include "sslencode.h"
#include "sslimpl.h"
#include "selfencrypt.h"

Expand Down
2 changes: 1 addition & 1 deletion lib/ssl/ssl.gyp
Expand Up @@ -17,14 +17,14 @@
'selfencrypt.c',
'ssl3con.c',
'ssl3ecc.c',
'ssl3encode.c',
'ssl3ext.c',
'ssl3exthandle.c',
'ssl3gthr.c',
'sslauth.c',
'sslcert.c',
'sslcon.c',
'ssldef.c',
'sslencode.c',
'sslenum.c',
'sslerr.c',
'sslerrstrs.c',
Expand Down

0 comments on commit 793a2fc

Please sign in to comment.