| 1 | /* | 
|---|
| 2 | * Copyright 2005-2016 The OpenSSL Project Authors. All Rights Reserved. | 
|---|
| 3 | * | 
|---|
| 4 | * Licensed under the Apache License 2.0 (the "License").  You may not use | 
|---|
| 5 | * this file except in compliance with the License.  You can obtain a copy | 
|---|
| 6 | * in the file LICENSE in the source distribution or at | 
|---|
| 7 | * https://www.openssl.org/source/license.html | 
|---|
| 8 | */ | 
|---|
| 9 |  | 
|---|
| 10 | #include "ssl_local.h" | 
|---|
| 11 |  | 
|---|
| 12 | int dtls1_write_app_data_bytes(SSL *s, int type, const void *buf_, size_t len, | 
|---|
| 13 | size_t *written) | 
|---|
| 14 | { | 
|---|
| 15 | int i; | 
|---|
| 16 |  | 
|---|
| 17 | if (SSL_in_init(s) && !ossl_statem_get_in_handshake(s)) { | 
|---|
| 18 | i = s->handshake_func(s); | 
|---|
| 19 | if (i < 0) | 
|---|
| 20 | return i; | 
|---|
| 21 | if (i == 0) { | 
|---|
| 22 | SSLerr(SSL_F_DTLS1_WRITE_APP_DATA_BYTES, | 
|---|
| 23 | SSL_R_SSL_HANDSHAKE_FAILURE); | 
|---|
| 24 | return -1; | 
|---|
| 25 | } | 
|---|
| 26 | } | 
|---|
| 27 |  | 
|---|
| 28 | if (len > SSL3_RT_MAX_PLAIN_LENGTH) { | 
|---|
| 29 | SSLerr(SSL_F_DTLS1_WRITE_APP_DATA_BYTES, SSL_R_DTLS_MESSAGE_TOO_BIG); | 
|---|
| 30 | return -1; | 
|---|
| 31 | } | 
|---|
| 32 |  | 
|---|
| 33 | return dtls1_write_bytes(s, type, buf_, len, written); | 
|---|
| 34 | } | 
|---|
| 35 |  | 
|---|
| 36 | int dtls1_dispatch_alert(SSL *s) | 
|---|
| 37 | { | 
|---|
| 38 | int i, j; | 
|---|
| 39 | void (*cb) (const SSL *ssl, int type, int val) = NULL; | 
|---|
| 40 | unsigned char buf[DTLS1_AL_HEADER_LENGTH]; | 
|---|
| 41 | unsigned char *ptr = &buf[0]; | 
|---|
| 42 | size_t written; | 
|---|
| 43 |  | 
|---|
| 44 | s->s3.alert_dispatch = 0; | 
|---|
| 45 |  | 
|---|
| 46 | memset(buf, 0, sizeof(buf)); | 
|---|
| 47 | *ptr++ = s->s3.send_alert[0]; | 
|---|
| 48 | *ptr++ = s->s3.send_alert[1]; | 
|---|
| 49 |  | 
|---|
| 50 | i = do_dtls1_write(s, SSL3_RT_ALERT, &buf[0], sizeof(buf), 0, &written); | 
|---|
| 51 | if (i <= 0) { | 
|---|
| 52 | s->s3.alert_dispatch = 1; | 
|---|
| 53 | /* fprintf( stderr, "not done with alert\n" ); */ | 
|---|
| 54 | } else { | 
|---|
| 55 | (void)BIO_flush(s->wbio); | 
|---|
| 56 |  | 
|---|
| 57 | if (s->msg_callback) | 
|---|
| 58 | s->msg_callback(1, s->version, SSL3_RT_ALERT, s->s3.send_alert, | 
|---|
| 59 | 2, s, s->msg_callback_arg); | 
|---|
| 60 |  | 
|---|
| 61 | if (s->info_callback != NULL) | 
|---|
| 62 | cb = s->info_callback; | 
|---|
| 63 | else if (s->ctx->info_callback != NULL) | 
|---|
| 64 | cb = s->ctx->info_callback; | 
|---|
| 65 |  | 
|---|
| 66 | if (cb != NULL) { | 
|---|
| 67 | j = (s->s3.send_alert[0] << 8) | s->s3.send_alert[1]; | 
|---|
| 68 | cb(s, SSL_CB_WRITE_ALERT, j); | 
|---|
| 69 | } | 
|---|
| 70 | } | 
|---|
| 71 | return i; | 
|---|
| 72 | } | 
|---|
| 73 |  | 
|---|