blob: a8253b940417ec0c4e252409ea5db604199ac2ce [file] [log] [blame]
Matt Caswellc103c7e2015-02-02 10:05:09 +00001/*
Rich Salz846e33c2016-05-17 14:18:30 -04002 * Copyright 2005-2016 The OpenSSL Project Authors. All Rights Reserved.
Matt Caswellc103c7e2015-02-02 10:05:09 +00003 *
Rich Salz846e33c2016-05-17 14:18:30 -04004 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
Matt Caswellc103c7e2015-02-02 10:05:09 +00008 */
9
10#define USE_SOCKETS
11#include "ssl_locl.h"
FdaSilvaYY0485d542016-06-28 22:51:27 +020012
Matt Caswell7ee86272016-09-07 11:34:39 +010013int dtls1_write_app_data_bytes(SSL *s, int type, const void *buf_, size_t len,
14 size_t *written)
Matt Caswellc103c7e2015-02-02 10:05:09 +000015{
16 int i;
17
18#ifndef OPENSSL_NO_SCTP
19 /*
20 * Check if we have to continue an interrupted handshake for reading
21 * belated app data with SCTP.
22 */
Matt Caswell024f5432015-10-22 13:57:18 +010023 if ((SSL_in_init(s) && !ossl_statem_get_in_handshake(s)) ||
Matt Caswellc103c7e2015-02-02 10:05:09 +000024 (BIO_dgram_is_sctp(SSL_get_wbio(s)) &&
Matt Caswellfe3a3292015-10-05 10:39:54 +010025 ossl_statem_in_sctp_read_sock(s)))
Matt Caswellc103c7e2015-02-02 10:05:09 +000026#else
Matt Caswell024f5432015-10-22 13:57:18 +010027 if (SSL_in_init(s) && !ossl_statem_get_in_handshake(s))
Matt Caswellc103c7e2015-02-02 10:05:09 +000028#endif
29 {
30 i = s->handshake_func(s);
31 if (i < 0)
32 return (i);
33 if (i == 0) {
34 SSLerr(SSL_F_DTLS1_WRITE_APP_DATA_BYTES,
35 SSL_R_SSL_HANDSHAKE_FAILURE);
36 return -1;
37 }
38 }
39
40 if (len > SSL3_RT_MAX_PLAIN_LENGTH) {
41 SSLerr(SSL_F_DTLS1_WRITE_APP_DATA_BYTES, SSL_R_DTLS_MESSAGE_TOO_BIG);
42 return -1;
43 }
44
Matt Caswell7ee86272016-09-07 11:34:39 +010045 return dtls1_write_bytes(s, type, buf_, len, written);
Matt Caswellc103c7e2015-02-02 10:05:09 +000046}
47
48int dtls1_dispatch_alert(SSL *s)
49{
50 int i, j;
51 void (*cb) (const SSL *ssl, int type, int val) = NULL;
52 unsigned char buf[DTLS1_AL_HEADER_LENGTH];
53 unsigned char *ptr = &buf[0];
Matt Caswell7ee86272016-09-07 11:34:39 +010054 size_t written;
Matt Caswellc103c7e2015-02-02 10:05:09 +000055
56 s->s3->alert_dispatch = 0;
57
Rich Salz16f8d4e2015-05-04 18:00:15 -040058 memset(buf, 0, sizeof(buf));
Matt Caswellc103c7e2015-02-02 10:05:09 +000059 *ptr++ = s->s3->send_alert[0];
60 *ptr++ = s->s3->send_alert[1];
61
Matt Caswell7ee86272016-09-07 11:34:39 +010062 i = do_dtls1_write(s, SSL3_RT_ALERT, &buf[0], sizeof(buf), 0, &written);
Matt Caswellc103c7e2015-02-02 10:05:09 +000063 if (i <= 0) {
64 s->s3->alert_dispatch = 1;
65 /* fprintf( stderr, "not done with alert\n" ); */
66 } else {
Emilia Kasper2f0ca542017-02-28 14:13:40 +010067 if (s->s3->send_alert[0] == SSL3_AL_FATAL)
Matt Caswellc103c7e2015-02-02 10:05:09 +000068 (void)BIO_flush(s->wbio);
69
70 if (s->msg_callback)
71 s->msg_callback(1, s->version, SSL3_RT_ALERT, s->s3->send_alert,
72 2, s, s->msg_callback_arg);
73
74 if (s->info_callback != NULL)
75 cb = s->info_callback;
76 else if (s->ctx->info_callback != NULL)
77 cb = s->ctx->info_callback;
78
79 if (cb != NULL) {
80 j = (s->s3->send_alert[0] << 8) | s->s3->send_alert[1];
81 cb(s, SSL_CB_WRITE_ALERT, j);
82 }
83 }
Matt Caswell7ee86272016-09-07 11:34:39 +010084 return i;
Matt Caswellc103c7e2015-02-02 10:05:09 +000085}