if (s->version >= TLS1_VERSION && s->tls_session_secret_cb &&
s->session->tlsext_tick) {
SSL_CIPHER *pref_cipher = NULL;
- size_t bookm;
- if (!PACKET_get_bookmark(&pkt, &bookm)
- || !PACKET_forward(&pkt, j)
- || !PACKET_get_bytes(&pkt, &cipherchars, ciphercharlen)) {
+ PACKET bookmark = pkt;
+ if (!PACKET_forward(&pkt, j)
+ || !PACKET_get_bytes(&pkt, &cipherchars, ciphercharlen)) {
SSLerr(SSL_F_SSL3_GET_SERVER_HELLO, SSL_R_LENGTH_MISMATCH);
al = SSL_AD_DECODE_ERROR;
goto f_err;
al = SSL_AD_INTERNAL_ERROR;
goto f_err;
}
- if (!PACKET_goto_bookmark(&pkt, bookm)) {
- SSLerr(SSL_F_SSL3_GET_SERVER_HELLO, ERR_R_INTERNAL_ERROR);
- al = SSL_AD_INTERNAL_ERROR;
- goto f_err;
- }
+ pkt = bookmark;
}
/* Get the session id */
int curve_nid = 0;
unsigned int encoded_pt_len = 0;
#endif
- PACKET pkt;
+ PACKET pkt, save_param_start;
unsigned char *data, *param;
- size_t startparam, endparam;
+ size_t param_len;
EVP_MD_CTX_init(&md_ctx);
return (1);
}
- if (!PACKET_buf_init(&pkt, s->init_msg, n)
- || !PACKET_get_bookmark(&pkt, &startparam)) {
+ if (!PACKET_buf_init(&pkt, s->init_msg, n)) {
SSLerr(SSL_F_SSL3_GET_KEY_EXCHANGE, ERR_R_INTERNAL_ERROR);
al = SSL_AD_INTERNAL_ERROR;
goto f_err;
}
+ save_param_start = pkt;
#ifndef OPENSSL_NO_RSA
RSA_free(s->s3->peer_rsa_tmp);
}
#endif /* !OPENSSL_NO_EC */
- if (!PACKET_get_bookmark(&pkt, &endparam)) {
- SSLerr(SSL_F_SSL3_GET_KEY_EXCHANGE, ERR_R_INTERNAL_ERROR);
- goto f_err;
- }
+ /*
+ * |pkt| now points to the beginning of the signature, so the difference
+ * equals the length of the parameters.
+ */
+ param_len = PACKET_remaining(&save_param_start) - PACKET_remaining(&pkt);
/* if it was signed, check the signature */
if (pkey != NULL) {
SSLerr(SSL_F_SSL3_GET_KEY_EXCHANGE, SSL_R_WRONG_SIGNATURE_LENGTH);
goto f_err;
}
- if (!PACKET_goto_bookmark(&pkt, startparam)
- || !PACKET_get_bytes(&pkt, ¶m, endparam - startparam)) {
+ pkt = save_param_start;
+ if (!PACKET_get_bytes(&pkt, ¶m, param_len)) {
al = SSL_AD_INTERNAL_ERROR;
SSLerr(SSL_F_SSL3_GET_KEY_EXCHANGE, ERR_R_INTERNAL_ERROR);
goto f_err;
SSL3_RANDOM_SIZE);
EVP_DigestUpdate(&md_ctx, &(s->s3->server_random[0]),
SSL3_RANDOM_SIZE);
- EVP_DigestUpdate(&md_ctx, param, endparam - startparam);
+ EVP_DigestUpdate(&md_ctx, param, param_len);
EVP_DigestFinal_ex(&md_ctx, q, &size);
q += size;
j += size;
SSL3_RANDOM_SIZE);
EVP_VerifyUpdate(&md_ctx, &(s->s3->server_random[0]),
SSL3_RANDOM_SIZE);
- EVP_VerifyUpdate(&md_ctx, param, endparam - startparam);
+ EVP_VerifyUpdate(&md_ctx, param, param_len);
if (EVP_VerifyFinal(&md_ctx, data, (int)i, pkey) <= 0) {
/* bad signature */
al = SSL_AD_DECRYPT_ERROR;
#define BUF_LEN 255
-static int test_PACKET_remaining(PACKET *pkt)
+static int test_PACKET_remaining(unsigned char buf[BUF_LEN])
{
- if ( PACKET_remaining(pkt) != BUF_LEN
- || !PACKET_forward(pkt, BUF_LEN - 1)
- || PACKET_remaining(pkt) != 1
- || !PACKET_forward(pkt, 1)
- || PACKET_remaining(pkt) != 0) {
+ PACKET pkt;
+
+ if ( !PACKET_buf_init(&pkt, buf, BUF_LEN)
+ || PACKET_remaining(&pkt) != BUF_LEN
+ || !PACKET_forward(&pkt, BUF_LEN - 1)
+ || PACKET_remaining(&pkt) != 1
+ || !PACKET_forward(&pkt, 1)
+ || PACKET_remaining(&pkt) != 0) {
fprintf(stderr, "test_PACKET_remaining() failed\n");
return 0;
}
return 1;
}
-static int test_PACKET_get_1(PACKET *pkt, size_t start)
+static int test_PACKET_get_1(unsigned char buf[BUF_LEN])
{
unsigned int i;
+ PACKET pkt;
- if ( !PACKET_goto_bookmark(pkt, start)
- || !PACKET_get_1(pkt, &i)
+ if ( !PACKET_buf_init(&pkt, buf, BUF_LEN)
+ || !PACKET_get_1(&pkt, &i)
|| i != 0x02
- || !PACKET_forward(pkt, BUF_LEN - 2)
- || !PACKET_get_1(pkt, &i)
+ || !PACKET_forward(&pkt, BUF_LEN - 2)
+ || !PACKET_get_1(&pkt, &i)
|| i != 0xfe
- || PACKET_get_1(pkt, &i)) {
+ || PACKET_get_1(&pkt, &i)) {
fprintf(stderr, "test_PACKET_get_1() failed\n");
return 0;
}
return 1;
}
-static int test_PACKET_get_4(PACKET *pkt, size_t start)
+static int test_PACKET_get_4(unsigned char buf[BUF_LEN])
{
unsigned long i;
+ PACKET pkt;
- if ( !PACKET_goto_bookmark(pkt, start)
- || !PACKET_get_4(pkt, &i)
+ if ( !PACKET_buf_init(&pkt, buf, BUF_LEN)
+ || !PACKET_get_4(&pkt, &i)
|| i != 0x08060402UL
- || !PACKET_forward(pkt, BUF_LEN - 8)
- || !PACKET_get_4(pkt, &i)
+ || !PACKET_forward(&pkt, BUF_LEN - 8)
+ || !PACKET_get_4(&pkt, &i)
|| i != 0xfefcfaf8UL
- || PACKET_get_4(pkt, &i)) {
+ || PACKET_get_4(&pkt, &i)) {
fprintf(stderr, "test_PACKET_get_4() failed\n");
return 0;
}
return 1;
}
-static int test_PACKET_get_net_2(PACKET *pkt, size_t start)
+static int test_PACKET_get_net_2(unsigned char buf[BUF_LEN])
{
unsigned int i;
+ PACKET pkt;
- if ( !PACKET_goto_bookmark(pkt, start)
- || !PACKET_get_net_2(pkt, &i)
+ if ( !PACKET_buf_init(&pkt, buf, BUF_LEN)
+ || !PACKET_get_net_2(&pkt, &i)
|| i != 0x0204
- || !PACKET_forward(pkt, BUF_LEN - 4)
- || !PACKET_get_net_2(pkt, &i)
+ || !PACKET_forward(&pkt, BUF_LEN - 4)
+ || !PACKET_get_net_2(&pkt, &i)
|| i != 0xfcfe
- || PACKET_get_net_2(pkt, &i)) {
+ || PACKET_get_net_2(&pkt, &i)) {
fprintf(stderr, "test_PACKET_get_net_2() failed\n");
return 0;
}
return 1;
}
-static int test_PACKET_get_net_3(PACKET *pkt, size_t start)
+static int test_PACKET_get_net_3(unsigned char buf[BUF_LEN])
{
unsigned long i;
+ PACKET pkt;
- if ( !PACKET_goto_bookmark(pkt, start)
- || !PACKET_get_net_3(pkt, &i)
+ if ( !PACKET_buf_init(&pkt, buf, BUF_LEN)
+ || !PACKET_get_net_3(&pkt, &i)
|| i != 0x020406UL
- || !PACKET_forward(pkt, BUF_LEN - 6)
- || !PACKET_get_net_3(pkt, &i)
+ || !PACKET_forward(&pkt, BUF_LEN - 6)
+ || !PACKET_get_net_3(&pkt, &i)
|| i != 0xfafcfeUL
- || PACKET_get_net_3(pkt, &i)) {
+ || PACKET_get_net_3(&pkt, &i)) {
fprintf(stderr, "test_PACKET_get_net_3() failed\n");
return 0;
}
return 1;
}
-static int test_PACKET_get_net_4(PACKET *pkt, size_t start)
+static int test_PACKET_get_net_4(unsigned char buf[BUF_LEN])
{
unsigned long i;
+ PACKET pkt;
- if ( !PACKET_goto_bookmark(pkt, start)
- || !PACKET_get_net_4(pkt, &i)
+ if ( !PACKET_buf_init(&pkt, buf, BUF_LEN)
+ || !PACKET_get_net_4(&pkt, &i)
|| i != 0x02040608UL
- || !PACKET_forward(pkt, BUF_LEN - 8)
- || !PACKET_get_net_4(pkt, &i)
+ || !PACKET_forward(&pkt, BUF_LEN - 8)
+ || !PACKET_get_net_4(&pkt, &i)
|| i != 0xf8fafcfeUL
- || PACKET_get_net_4(pkt, &i)) {
+ || PACKET_get_net_4(&pkt, &i)) {
fprintf(stderr, "test_PACKET_get_net_4() failed\n");
return 0;
}
return 1;
}
-static int test_PACKET_get_sub_packet(PACKET *pkt, size_t start)
+static int test_PACKET_get_sub_packet(unsigned char buf[BUF_LEN])
{
- PACKET subpkt;
+ PACKET pkt, subpkt;
unsigned long i;
- if ( !PACKET_goto_bookmark(pkt, start)
- || !PACKET_get_sub_packet(pkt, &subpkt, 4)
+ if ( !PACKET_buf_init(&pkt, buf, BUF_LEN)
+ || !PACKET_get_sub_packet(&pkt, &subpkt, 4)
|| !PACKET_get_net_4(&subpkt, &i)
|| i != 0x02040608UL
|| PACKET_remaining(&subpkt)
- || !PACKET_forward(pkt, BUF_LEN - 8)
- || !PACKET_get_sub_packet(pkt, &subpkt, 4)
+ || !PACKET_forward(&pkt, BUF_LEN - 8)
+ || !PACKET_get_sub_packet(&pkt, &subpkt, 4)
|| !PACKET_get_net_4(&subpkt, &i)
|| i != 0xf8fafcfeUL
|| PACKET_remaining(&subpkt)
- || PACKET_get_sub_packet(pkt, &subpkt, 4)) {
+ || PACKET_get_sub_packet(&pkt, &subpkt, 4)) {
fprintf(stderr, "test_PACKET_get_sub_packet() failed\n");
return 0;
}
return 1;
}
-static int test_PACKET_get_bytes(PACKET *pkt, size_t start)
+static int test_PACKET_get_bytes(unsigned char buf[BUF_LEN])
{
unsigned char *bytes;
+ PACKET pkt;
- if ( !PACKET_goto_bookmark(pkt, start)
- || !PACKET_get_bytes(pkt, &bytes, 4)
+ if ( !PACKET_buf_init(&pkt, buf, BUF_LEN)
+ || !PACKET_get_bytes(&pkt, &bytes, 4)
|| bytes[0] != 2 || bytes[1] != 4
|| bytes[2] != 6 || bytes[3] != 8
- || PACKET_remaining(pkt) != BUF_LEN -4
- || !PACKET_forward(pkt, BUF_LEN - 8)
- || !PACKET_get_bytes(pkt, &bytes, 4)
+ || PACKET_remaining(&pkt) != BUF_LEN -4
+ || !PACKET_forward(&pkt, BUF_LEN - 8)
+ || !PACKET_get_bytes(&pkt, &bytes, 4)
|| bytes[0] != 0xf8 || bytes[1] != 0xfa
|| bytes[2] != 0xfc || bytes[3] != 0xfe
- || PACKET_remaining(pkt)) {
+ || PACKET_remaining(&pkt)) {
fprintf(stderr, "test_PACKET_get_bytes() failed\n");
return 0;
}
return 1;
}
-static int test_PACKET_copy_bytes(PACKET *pkt, size_t start)
+static int test_PACKET_copy_bytes(unsigned char buf[BUF_LEN])
{
unsigned char bytes[4];
+ PACKET pkt;
- if ( !PACKET_goto_bookmark(pkt, start)
- || !PACKET_copy_bytes(pkt, bytes, 4)
+ if ( !PACKET_buf_init(&pkt, buf, BUF_LEN)
+ || !PACKET_copy_bytes(&pkt, bytes, 4)
|| bytes[0] != 2 || bytes[1] != 4
|| bytes[2] != 6 || bytes[3] != 8
- || PACKET_remaining(pkt) != BUF_LEN - 4
- || !PACKET_forward(pkt, BUF_LEN - 8)
- || !PACKET_copy_bytes(pkt, bytes, 4)
+ || PACKET_remaining(&pkt) != BUF_LEN - 4
+ || !PACKET_forward(&pkt, BUF_LEN - 8)
+ || !PACKET_copy_bytes(&pkt, bytes, 4)
|| bytes[0] != 0xf8 || bytes[1] != 0xfa
|| bytes[2] != 0xfc || bytes[3] != 0xfe
- || PACKET_remaining(pkt)) {
+ || PACKET_remaining(&pkt)) {
fprintf(stderr, "test_PACKET_copy_bytes() failed\n");
return 0;
}
return 1;
}
-static int test_PACKET_memdup(PACKET *pkt, size_t start)
+static int test_PACKET_memdup(unsigned char buf[BUF_LEN])
{
unsigned char *data = NULL;
size_t len;
- if ( !PACKET_goto_bookmark(pkt, start)
- || !PACKET_memdup(pkt, &data, &len)
+ PACKET pkt;
+
+ if ( !PACKET_buf_init(&pkt, buf, BUF_LEN)
+ || !PACKET_memdup(&pkt, &data, &len)
|| len != BUF_LEN
- || memcmp(data, PACKET_data(pkt), len)
- || !PACKET_forward(pkt, 10)
- || !PACKET_memdup(pkt, &data, &len)
+ || memcmp(data, PACKET_data(&pkt), len)
+ || !PACKET_forward(&pkt, 10)
+ || !PACKET_memdup(&pkt, &data, &len)
|| len != BUF_LEN - 10
- || memcmp(data, PACKET_data(pkt), len)
- || !PACKET_back(pkt, 1)
- || !PACKET_memdup(pkt, &data, &len)
+ || memcmp(data, PACKET_data(&pkt), len)
+ || !PACKET_back(&pkt, 1)
+ || !PACKET_memdup(&pkt, &data, &len)
|| len != BUF_LEN - 9
- || memcmp(data, PACKET_data(pkt), len)) {
+ || memcmp(data, PACKET_data(&pkt), len)) {
fprintf(stderr, "test_PACKET_memdup() failed\n");
OPENSSL_free(data);
return 0;
return 1;
}
-static int test_PACKET_move_funcs(PACKET *pkt, size_t start)
+static int test_PACKET_move_funcs(unsigned char buf[BUF_LEN])
{
unsigned char *byte;
- size_t bm;
+ PACKET pkt;
- if ( !PACKET_goto_bookmark(pkt, start)
- || PACKET_back(pkt, 1)
- || !PACKET_forward(pkt, 1)
- || !PACKET_get_bytes(pkt, &byte, 1)
+ if ( !PACKET_buf_init(&pkt, buf, BUF_LEN)
+ || PACKET_back(&pkt, 1)
+ || !PACKET_forward(&pkt, 1)
+ || !PACKET_get_bytes(&pkt, &byte, 1)
|| byte[0] != 4
- || !PACKET_get_bookmark(pkt, &bm)
- || !PACKET_forward(pkt, BUF_LEN - 2)
- || PACKET_forward(pkt, 1)
- || !PACKET_back(pkt, 1)
- || !PACKET_get_bytes(pkt, &byte, 1)
- || byte[0] != 0xfe
- || !PACKET_goto_bookmark(pkt, bm)
- || !PACKET_get_bytes(pkt, &byte, 1)
- || byte[0] != 6) {
+ || !PACKET_forward(&pkt, BUF_LEN - 2)
+ || PACKET_forward(&pkt, 1)
+ || !PACKET_back(&pkt, 1)
+ || !PACKET_get_bytes(&pkt, &byte, 1)
+ || byte[0] != 0xfe) {
fprintf(stderr, "test_PACKET_move_funcs() failed\n");
return 0;
}
{
unsigned char buf[BUF_LEN];
unsigned int i;
- size_t start = 0;
- PACKET pkt;
for (i=1; i<=BUF_LEN; i++) {
buf[i-1] = (i * 2) & 0xff;
}
i = 0;
- if ( !PACKET_buf_init(&pkt, buf, BUF_LEN)
- || !PACKET_get_bookmark(&pkt, &start)) {
- fprintf(stderr, "setup failed\n");
- return 0;
- }
-
if ( !test_PACKET_buf_init()
- || !test_PACKET_remaining(&pkt)
- || !test_PACKET_get_1(&pkt, start)
- || !test_PACKET_get_4(&pkt, start)
- || !test_PACKET_get_net_2(&pkt, start)
- || !test_PACKET_get_net_3(&pkt, start)
- || !test_PACKET_get_net_4(&pkt, start)
- || !test_PACKET_get_sub_packet(&pkt, start)
- || !test_PACKET_get_bytes(&pkt, start)
- || !test_PACKET_copy_bytes(&pkt, start)
- || !test_PACKET_memdup(&pkt, start)
+ || !test_PACKET_remaining(buf)
+ || !test_PACKET_get_1(buf)
+ || !test_PACKET_get_4(buf)
+ || !test_PACKET_get_net_2(buf)
+ || !test_PACKET_get_net_3(buf)
+ || !test_PACKET_get_net_4(buf)
+ || !test_PACKET_get_sub_packet(buf)
+ || !test_PACKET_get_bytes(buf)
+ || !test_PACKET_copy_bytes(buf)
+ || !test_PACKET_memdup(buf)
|| !test_PACKET_strndup()
- || !test_PACKET_move_funcs(&pkt, start)
+ || !test_PACKET_move_funcs(buf)
|| !test_PACKET_get_length_prefixed_1()
|| !test_PACKET_get_length_prefixed_2()
|| !test_PACKET_get_length_prefixed_3()) {