mirror of
https://github.com/mozilla/gecko-dev.git
synced 2025-04-03 04:52:54 +00:00
Bug 710176, Part 3: Abort the connection during send or recv when we time out assuming TLS intolerance, r=kaie
This commit is contained in:
parent
e003344ea0
commit
1ec254c20b
@ -1599,8 +1599,14 @@ nsHandleSSLError(nsNSSSocketInfo *socketInfo, PRErrorCode err)
|
|||||||
|
|
||||||
namespace {
|
namespace {
|
||||||
|
|
||||||
|
enum Operation { reading, writing, not_reading_or_writing };
|
||||||
|
|
||||||
|
PRInt32 checkHandshake(PRInt32 bytesTransfered, bool wasReading,
|
||||||
|
PRFileDesc* ssl_layer_fd,
|
||||||
|
nsNSSSocketInfo *socketInfo);
|
||||||
|
|
||||||
nsNSSSocketInfo *
|
nsNSSSocketInfo *
|
||||||
getSocketInfoIfRunning(PRFileDesc * fd,
|
getSocketInfoIfRunning(PRFileDesc * fd, Operation op,
|
||||||
const nsNSSShutDownPreventionLock & /*proofOfLock*/)
|
const nsNSSShutDownPreventionLock & /*proofOfLock*/)
|
||||||
{
|
{
|
||||||
if (!fd || !fd->lower || !fd->secret ||
|
if (!fd || !fd->lower || !fd->secret ||
|
||||||
@ -1619,9 +1625,15 @@ getSocketInfoIfRunning(PRFileDesc * fd,
|
|||||||
|
|
||||||
if (socketInfo->GetErrorCode()) {
|
if (socketInfo->GetErrorCode()) {
|
||||||
PRErrorCode err = socketInfo->GetErrorCode();
|
PRErrorCode err = socketInfo->GetErrorCode();
|
||||||
|
PR_SetError(err, 0);
|
||||||
|
if (op == reading || op == writing) {
|
||||||
|
// We must do TLS intolerance checks for reads and writes, for timeouts
|
||||||
|
// in particular.
|
||||||
|
(void) checkHandshake(-1, op == reading, fd, socketInfo);
|
||||||
|
}
|
||||||
|
|
||||||
// If we get here, it is probably because cert verification failed and this
|
// If we get here, it is probably because cert verification failed and this
|
||||||
// is the first I/O attempt since that failure.
|
// is the first I/O attempt since that failure.
|
||||||
PR_SetError(err, 0);
|
|
||||||
return nsnull;
|
return nsnull;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1636,7 +1648,7 @@ nsSSLIOLayerConnect(PRFileDesc* fd, const PRNetAddr* addr,
|
|||||||
{
|
{
|
||||||
PR_LOG(gPIPNSSLog, PR_LOG_DEBUG, ("[%p] connecting SSL socket\n", (void*)fd));
|
PR_LOG(gPIPNSSLog, PR_LOG_DEBUG, ("[%p] connecting SSL socket\n", (void*)fd));
|
||||||
nsNSSShutDownPreventionLock locker;
|
nsNSSShutDownPreventionLock locker;
|
||||||
if (!getSocketInfoIfRunning(fd, locker))
|
if (!getSocketInfoIfRunning(fd, not_reading_or_writing, locker))
|
||||||
return PR_FAILURE;
|
return PR_FAILURE;
|
||||||
|
|
||||||
PRStatus status = fd->lower->methods->connect(fd->lower, addr, timeout);
|
PRStatus status = fd->lower->methods->connect(fd->lower, addr, timeout);
|
||||||
@ -1956,6 +1968,8 @@ class SSLErrorRunnable : public SyncRunnableBase
|
|||||||
const PRErrorCode mErrorCode;
|
const PRErrorCode mErrorCode;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
namespace {
|
||||||
|
|
||||||
PRInt32 checkHandshake(PRInt32 bytesTransfered, bool wasReading,
|
PRInt32 checkHandshake(PRInt32 bytesTransfered, bool wasReading,
|
||||||
PRFileDesc* ssl_layer_fd,
|
PRFileDesc* ssl_layer_fd,
|
||||||
nsNSSSocketInfo *socketInfo)
|
nsNSSSocketInfo *socketInfo)
|
||||||
@ -2059,6 +2073,8 @@ PRInt32 checkHandshake(PRInt32 bytesTransfered, bool wasReading,
|
|||||||
return bytesTransfered;
|
return bytesTransfered;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
static PRInt16 PR_CALLBACK
|
static PRInt16 PR_CALLBACK
|
||||||
nsSSLIOLayerPoll(PRFileDesc * fd, PRInt16 in_flags, PRInt16 *out_flags)
|
nsSSLIOLayerPoll(PRFileDesc * fd, PRInt16 in_flags, PRInt16 *out_flags)
|
||||||
{
|
{
|
||||||
@ -2072,7 +2088,9 @@ nsSSLIOLayerPoll(PRFileDesc * fd, PRInt16 in_flags, PRInt16 *out_flags)
|
|||||||
|
|
||||||
*out_flags = 0;
|
*out_flags = 0;
|
||||||
|
|
||||||
nsNSSSocketInfo * socketInfo = getSocketInfoIfRunning(fd, locker);
|
nsNSSSocketInfo * socketInfo =
|
||||||
|
getSocketInfoIfRunning(fd, not_reading_or_writing, locker);
|
||||||
|
|
||||||
if (!socketInfo) {
|
if (!socketInfo) {
|
||||||
// If we get here, it is probably because certificate validation failed
|
// If we get here, it is probably because certificate validation failed
|
||||||
// and this is the first I/O operation after the failure.
|
// and this is the first I/O operation after the failure.
|
||||||
@ -2098,9 +2116,12 @@ nsSSLIOLayerPoll(PRFileDesc * fd, PRInt16 in_flags, PRInt16 *out_flags)
|
|||||||
|
|
||||||
// See comments in HandshakeTimeout before moving and/or changing this block
|
// See comments in HandshakeTimeout before moving and/or changing this block
|
||||||
if (socketInfo->HandshakeTimeout()) {
|
if (socketInfo->HandshakeTimeout()) {
|
||||||
|
NS_WARNING("SSL handshake timed out");
|
||||||
|
PR_LOG(gPIPNSSLog, PR_LOG_DEBUG, ("[%p] handshake timed out\n", fd));
|
||||||
NS_ASSERTION(in_flags & PR_POLL_EXCEPT,
|
NS_ASSERTION(in_flags & PR_POLL_EXCEPT,
|
||||||
"caller did not poll for EXCEPT (handshake timeout)");
|
"caller did not poll for EXCEPT (handshake timeout)");
|
||||||
*out_flags = in_flags | PR_POLL_EXCEPT;
|
*out_flags = in_flags | PR_POLL_EXCEPT;
|
||||||
|
socketInfo->SetCanceled(PR_CONNECT_RESET_ERROR, PlainErrorMessage);
|
||||||
return in_flags;
|
return in_flags;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2156,7 +2177,7 @@ static PRFileDesc *_PSM_InvalidDesc(void)
|
|||||||
static PRStatus PR_CALLBACK PSMGetsockname(PRFileDesc *fd, PRNetAddr *addr)
|
static PRStatus PR_CALLBACK PSMGetsockname(PRFileDesc *fd, PRNetAddr *addr)
|
||||||
{
|
{
|
||||||
nsNSSShutDownPreventionLock locker;
|
nsNSSShutDownPreventionLock locker;
|
||||||
if (!getSocketInfoIfRunning(fd, locker))
|
if (!getSocketInfoIfRunning(fd, not_reading_or_writing, locker))
|
||||||
return PR_FAILURE;
|
return PR_FAILURE;
|
||||||
|
|
||||||
return fd->lower->methods->getsockname(fd->lower, addr);
|
return fd->lower->methods->getsockname(fd->lower, addr);
|
||||||
@ -2165,7 +2186,7 @@ static PRStatus PR_CALLBACK PSMGetsockname(PRFileDesc *fd, PRNetAddr *addr)
|
|||||||
static PRStatus PR_CALLBACK PSMGetpeername(PRFileDesc *fd, PRNetAddr *addr)
|
static PRStatus PR_CALLBACK PSMGetpeername(PRFileDesc *fd, PRNetAddr *addr)
|
||||||
{
|
{
|
||||||
nsNSSShutDownPreventionLock locker;
|
nsNSSShutDownPreventionLock locker;
|
||||||
if (!getSocketInfoIfRunning(fd, locker))
|
if (!getSocketInfoIfRunning(fd, not_reading_or_writing, locker))
|
||||||
return PR_FAILURE;
|
return PR_FAILURE;
|
||||||
|
|
||||||
return fd->lower->methods->getpeername(fd->lower, addr);
|
return fd->lower->methods->getpeername(fd->lower, addr);
|
||||||
@ -2175,7 +2196,7 @@ static PRStatus PR_CALLBACK PSMGetsocketoption(PRFileDesc *fd,
|
|||||||
PRSocketOptionData *data)
|
PRSocketOptionData *data)
|
||||||
{
|
{
|
||||||
nsNSSShutDownPreventionLock locker;
|
nsNSSShutDownPreventionLock locker;
|
||||||
if (!getSocketInfoIfRunning(fd, locker))
|
if (!getSocketInfoIfRunning(fd, not_reading_or_writing, locker))
|
||||||
return PR_FAILURE;
|
return PR_FAILURE;
|
||||||
|
|
||||||
return fd->lower->methods->getsocketoption(fd, data);
|
return fd->lower->methods->getsocketoption(fd, data);
|
||||||
@ -2185,7 +2206,7 @@ static PRStatus PR_CALLBACK PSMSetsocketoption(PRFileDesc *fd,
|
|||||||
const PRSocketOptionData *data)
|
const PRSocketOptionData *data)
|
||||||
{
|
{
|
||||||
nsNSSShutDownPreventionLock locker;
|
nsNSSShutDownPreventionLock locker;
|
||||||
if (!getSocketInfoIfRunning(fd, locker))
|
if (!getSocketInfoIfRunning(fd, not_reading_or_writing, locker))
|
||||||
return PR_FAILURE;
|
return PR_FAILURE;
|
||||||
|
|
||||||
return fd->lower->methods->setsocketoption(fd, data);
|
return fd->lower->methods->setsocketoption(fd, data);
|
||||||
@ -2195,7 +2216,7 @@ static PRInt32 PR_CALLBACK PSMRecv(PRFileDesc *fd, void *buf, PRInt32 amount,
|
|||||||
PRIntn flags, PRIntervalTime timeout)
|
PRIntn flags, PRIntervalTime timeout)
|
||||||
{
|
{
|
||||||
nsNSSShutDownPreventionLock locker;
|
nsNSSShutDownPreventionLock locker;
|
||||||
nsNSSSocketInfo *socketInfo = getSocketInfoIfRunning(fd, locker);
|
nsNSSSocketInfo *socketInfo = getSocketInfoIfRunning(fd, reading, locker);
|
||||||
if (!socketInfo)
|
if (!socketInfo)
|
||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
@ -2220,7 +2241,7 @@ static PRInt32 PR_CALLBACK PSMSend(PRFileDesc *fd, const void *buf, PRInt32 amou
|
|||||||
PRIntn flags, PRIntervalTime timeout)
|
PRIntn flags, PRIntervalTime timeout)
|
||||||
{
|
{
|
||||||
nsNSSShutDownPreventionLock locker;
|
nsNSSShutDownPreventionLock locker;
|
||||||
nsNSSSocketInfo *socketInfo = getSocketInfoIfRunning(fd, locker);
|
nsNSSSocketInfo *socketInfo = getSocketInfoIfRunning(fd, writing, locker);
|
||||||
if (!socketInfo)
|
if (!socketInfo)
|
||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
@ -2257,7 +2278,7 @@ nsSSLIOLayerWrite(PRFileDesc* fd, const void* buf, PRInt32 amount)
|
|||||||
static PRStatus PR_CALLBACK PSMConnectcontinue(PRFileDesc *fd, PRInt16 out_flags)
|
static PRStatus PR_CALLBACK PSMConnectcontinue(PRFileDesc *fd, PRInt16 out_flags)
|
||||||
{
|
{
|
||||||
nsNSSShutDownPreventionLock locker;
|
nsNSSShutDownPreventionLock locker;
|
||||||
if (!getSocketInfoIfRunning(fd, locker)) {
|
if (!getSocketInfoIfRunning(fd, not_reading_or_writing, locker)) {
|
||||||
return PR_FAILURE;
|
return PR_FAILURE;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user