On Aug 12, 2009, at 3:23 PM, Stephen Henson via RT wrote:

>> [seggelm...@fh-muenster.de - Wed Aug 12 08:34:27 2009]:
>>
>>
>> Ok, here's an updated version. Internally is dtls1_get_timeout() and
>> dtls1_handle_timeout() used. They can be called externally using
>> SSL_ctrl() with DTLS_CTRL_GET_TIMEOUT and DTLS_CTRL_HANDLE_TIMEOUT or
>> with the corresponding macros DTLSv1_get_timeout() and
>> DTLSv1_handle_timeout() for simplicity.
>>
>
> OK, I've applied a slightly modified version to 1.0 and HEAD (to  
> avoid a
> shadow warning on the timeout variable). Patch doesn't apply cleanly  
> to
> 0.9.8, please include a version for that and I'll apply it.
>
> Steve.

Here is a version for 0.9.8.



--- apps/s_client.c     17 May 2009 16:48:19 -0000      1.76.2.25
+++ apps/s_client.c     13 Aug 2009 09:13:38 -0000
@@ -318,6 +318,7 @@
        BIO *sbio;
        char *inrand=NULL;
        int mbuf_len=0;
+       struct timeval timeout, *timeoutp;
  #ifndef OPENSSL_NO_ENGINE
        char *engine_id=NULL;
        char *ssl_client_engine_id=NULL;
@@ -819,7 +820,6 @@

        if ( SSL_version(con) == DTLS1_VERSION)
                {
-               struct timeval timeout;

                sbio=BIO_new_dgram(s,BIO_NOCLOSE);
                if (getsockname(s, &peer, (void *)&peerlen) < 0)
@@ -1036,6 +1036,12 @@
                FD_ZERO(&readfds);
                FD_ZERO(&writefds);

+               if ((SSL_version(con) == DTLS1_VERSION) &&
+                       DTLSv1_get_timeout(con, &timeout))
+                       timeoutp = &timeout;
+               else
+                       timeoutp = NULL;
+
                if (SSL_in_init(con) && !SSL_total_renegotiations(con))
                        {
                        in_init=1;
@@ -1132,7 +1138,7 @@
                                        if(!i && (!((_kbhit()) || 
(WAIT_OBJECT_0 ==  
WaitForSingleObject(GetStdHandle(STD_INPUT_HANDLE), 0))) || ! 
read_tty) ) continue;
  #endif
                                } else  i=select(width,(void *)&readfds,(void 
*)&writefds,
-                                        NULL,NULL);
+                                        NULL,timeoutp);
                        }
  #elif defined(OPENSSL_SYS_NETWARE)
                        if(!write_tty) {
@@ -1142,11 +1148,11 @@
                                        i=select(width,(void *)&readfds,(void 
*)&writefds,
                                                NULL,&tv);
                                } else  i=select(width,(void *)&readfds,(void 
*)&writefds,
-                                       NULL,NULL);
+                                       NULL,timeoutp);
                        }
  #else
                        i=select(width,(void *)&readfds,(void *)&writefds,
-                                NULL,NULL);
+                                NULL,timeoutp);
  #endif
                        if ( i < 0)
                                {
@@ -1157,6 +1163,11 @@
                                }
                        }

+               if ((SSL_version(con) == DTLS1_VERSION) &&  
DTLSv1_handle_timeout(con) > 0)
+                       {
+                       BIO_printf(bio_err,"TIMEOUT occured\n");
+                       }
+
                if (!ssl_pending && FD_ISSET(SSL_get_fd(con),&writefds))
                        {
                        k=SSL_write(con,&(cbuf[cbuf_off]),

--- apps/s_server.c     5 Jun 2009 15:05:08 -0000       1.97.2.16
+++ apps/s_server.c     13 Aug 2009 09:13:38 -0000
@@ -1590,6 +1590,7 @@
        unsigned long l;
        SSL *con=NULL;
        BIO *sbio;
+       struct timeval timeout, *timeoutp;
  #if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS) ||  
defined(OPENSSL_SYS_NETWARE)
        struct timeval tv;
  #endif
@@ -1643,7 +1644,6 @@

        if (SSL_version(con) == DTLS1_VERSION)
                {
-               struct timeval timeout;

                sbio=BIO_new_dgram(s,BIO_NOCLOSE);

@@ -1744,7 +1744,19 @@
                        if(_kbhit())
                                read_from_terminal = 1;
  #else
-                       i=select(width,(void *)&readfds,NULL,NULL,NULL);
+                       if ((SSL_version(con) == DTLS1_VERSION) &&
+                               DTLSv1_get_timeout(con, &timeout))
+                               timeoutp = &timeout;
+                       else
+                               timeoutp = NULL;
+
+                       i=select(width,(void *)&readfds,NULL,NULL,timeoutp);
+
+                       if ((SSL_version(con) == DTLS1_VERSION) &&  
DTLSv1_handle_timeout(con) > 0)
+                               {
+                               BIO_printf(bio_err,"TIMEOUT occured\n");
+                               }
+
                        if (i <= 0) continue;
                        if (FD_ISSET(fileno(stdin),&readfds))
                                read_from_terminal = 1;

--- ssl/d1_both.c       6 Aug 2009 16:23:17 -0000       1.4.2.18
+++ ssl/d1_both.c       13 Aug 2009 09:13:38 -0000
@@ -892,9 +892,6 @@

  int dtls1_read_failed(SSL *s, int code)
        {
-       DTLS1_STATE *state;
-       int send_alert = 0;
-
        if ( code > 0)
                {
                fprintf( stderr, "invalid state reached %s:%d", __FILE__, 
__LINE__);
@@ -914,24 +911,6 @@
                return code;
                }

-       dtls1_double_timeout(s);
-       state = s->d1;
-       state->timeout.num_alerts++;
-       if ( state->timeout.num_alerts > DTLS1_TMO_ALERT_COUNT)
-               {
-               /* fail the connection, enough alerts have been sent */
-               SSLerr(SSL_F_DTLS1_READ_FAILED,SSL_R_READ_TIMEOUT_EXPIRED);
-               return 0;
-               }
-
-       state->timeout.read_timeouts++;
-       if ( state->timeout.read_timeouts > DTLS1_TMO_READ_COUNT)
-               {
-               send_alert = 1;
-               state->timeout.read_timeouts = 1;
-               }
-
-
  #if 0 /* for now, each alert contains only one record number */
        item = pqueue_peek(state->rcvd_records);
        if ( item )
@@ -942,12 +921,12 @@
  #endif

  #if 0  /* no more alert sending, just retransmit the last set of  
messages */
-               if ( send_alert)
-                       ssl3_send_alert(s,SSL3_AL_WARNING,
-                               DTLS1_AD_MISSING_HANDSHAKE_MESSAGE);
+       if ( state->timeout.read_timeouts >= DTLS1_TMO_READ_COUNT)
+               ssl3_send_alert(s,SSL3_AL_WARNING,
+                       DTLS1_AD_MISSING_HANDSHAKE_MESSAGE);
  #endif

-       return dtls1_retransmit_buffered_messages(s) ;
+       return dtls1_handle_timeout(s);
        }

  int

--- ssl/d1_lib.c        16 May 2009 15:51:59 -0000      1.1.2.9
+++ ssl/d1_lib.c        13 Aug 2009 09:13:38 -0000
@@ -210,6 +210,29 @@
                s->version=DTLS1_VERSION;
        }

+long dtls1_ctrl(SSL *s, int cmd, long larg, void *parg)
+       {
+       int ret=0;
+
+       switch (cmd)
+               {
+       case DTLS_CTRL_GET_TIMEOUT:
+               if (dtls1_get_timeout(s, (struct timeval*) parg) != NULL)
+                       {
+                       ret = 1;
+                       }
+               break;
+       case DTLS_CTRL_HANDLE_TIMEOUT:
+               ret = dtls1_handle_timeout(s);
+               break;
+
+       default:
+               ret = ssl3_ctrl(s, cmd, larg, parg);
+               break;
+               }
+       return(ret);
+       }
+
  /*
   * As it's impossible to use stream ciphers in "datagram" mode, this
   * simple filter is designed to disengage them in DTLS. Unfortunately
@@ -317,6 +340,36 @@
        BIO_ctrl(SSL_get_rbio(s), BIO_CTRL_DGRAM_SET_NEXT_TIMEOUT, 0, &(s- 
 >d1->next_timeout));
        }

+int dtls1_handle_timeout(SSL *s)
+       {
+       DTLS1_STATE *state;
+
+       /* if no timer is expired, don't do anything */
+       if (!dtls1_is_timer_expired(s))
+               {
+               return 0;
+               }
+
+       dtls1_double_timeout(s);
+       state = s->d1;
+       state->timeout.num_alerts++;
+       if ( state->timeout.num_alerts > DTLS1_TMO_ALERT_COUNT)
+               {
+               /* fail the connection, enough alerts have been sent */
+               SSLerr(SSL_F_DTLS1_READ_FAILED,SSL_R_READ_TIMEOUT_EXPIRED);
+               return 0;
+               }
+
+       state->timeout.read_timeouts++;
+       if ( state->timeout.read_timeouts > DTLS1_TMO_READ_COUNT)
+               {
+               state->timeout.read_timeouts = 1;
+               }
+
+       dtls1_start_timer(s);
+       return dtls1_retransmit_buffered_messages(s);
+       }
+
  static void get_current_time(struct timeval *t)
  {
  #ifdef OPENSSL_SYS_WIN32

--- ssl/d1_pkt.c        24 Jul 2009 11:50:51 -0000      1.4.2.24
+++ ssl/d1_pkt.c        13 Aug 2009 09:13:38 -0000
@@ -730,11 +730,8 @@
                }

        /* Check for timeout */
-       if (dtls1_is_timer_expired(s))
-               {
-               if (dtls1_read_failed(s, -1) > 0)
-                       goto start;
-               }
+       if (dtls1_handle_timeout(s) > 0)
+               goto start;

        /* get new packet if necessary */
        if ((rr->length == 0) || (s->rstate == SSL_ST_READ_BODY))

--- ssl/ssl.h   6 Aug 2009 16:23:17 -0000       1.161.2.23
+++ ssl/ssl.h   13 Aug 2009 09:13:38 -0000
@@ -1271,6 +1271,14 @@
  #define SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB     72
  #endif

+#define DTLS_CTRL_GET_TIMEOUT          73
+#define DTLS_CTRL_HANDLE_TIMEOUT       74
+
+#define DTLSv1_get_timeout(ssl, arg) \
+       SSL_ctrl(ssl,DTLS_CTRL_GET_TIMEOUT,0, (void *)arg)
+#define DTLSv1_handle_timeout(ssl) \
+       SSL_ctrl(ssl,DTLS_CTRL_HANDLE_TIMEOUT,0, NULL)
+
  #define SSL_session_reused(ssl) \
        SSL_ctrl((ssl),SSL_CTRL_GET_SESSION_REUSED,0,NULL)
  #define SSL_num_renegotiations(ssl) \

--- ssl/ssl_locl.h      16 May 2009 15:51:59 -0000      1.63.2.16
+++ ssl/ssl_locl.h      13 Aug 2009 09:13:38 -0000
@@ -694,7 +694,7 @@
                dtls1_read_bytes, \
                dtls1_write_app_data_bytes, \
                dtls1_dispatch_alert, \
-               ssl3_ctrl, \
+               dtls1_ctrl, \
                ssl3_ctx_ctrl, \
                ssl3_get_cipher_by_char, \
                ssl3_put_cipher_by_char, \
@@ -870,6 +870,7 @@
  void dtls1_reset_seq_numbers(SSL *s, int rw);
  long dtls1_default_timeout(void);
  struct timeval* dtls1_get_timeout(SSL *s, struct timeval* timeleft);
+int dtls1_handle_timeout(SSL *s);
  SSL_CIPHER *dtls1_get_cipher(unsigned int u);
  void dtls1_start_timer(SSL *s);
  void dtls1_stop_timer(SSL *s);




Attachment: dtls-timeout-handling-bug-0.9.8.patch
Description: Binary data



Reply via email to