• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * This file is part of the openHiTLS project.
3  *
4  * openHiTLS is licensed under the Mulan PSL v2.
5  * You can use this software according to the terms and conditions of the Mulan PSL v2.
6  * You may obtain a copy of Mulan PSL v2 at:
7  *
8  *     http://license.coscl.org.cn/MulanPSL2
9  *
10  * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
11  * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
12  * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
13  * See the Mulan PSL v2 for more details.
14  */
15 #include "hitls_build.h"
16 #ifdef HITLS_TLS_HOST_CLIENT
17 #include "securec.h"
18 #include "tls_binlog_id.h"
19 #include "bsl_log_internal.h"
20 #include "bsl_log.h"
21 #include "bsl_sal.h"
22 #include "bsl_err_internal.h"
23 #include "bsl_bytes.h"
24 #include "hitls_error.h"
25 #include "hs_msg.h"
26 #include "parse_common.h"
27 #include "parse_extensions.h"
28 #include "parse_msg.h"
29 
ParseHelloVerifyRequest(TLS_Ctx * ctx,const uint8_t * buf,uint32_t bufLen,HS_Msg * hsMsg)30 int32_t ParseHelloVerifyRequest(TLS_Ctx *ctx, const uint8_t *buf, uint32_t bufLen, HS_Msg *hsMsg)
31 {
32     int32_t ret = HITLS_SUCCESS;
33     HelloVerifyRequestMsg *msg = &hsMsg->body.helloVerifyReq;
34     uint32_t bufOffset = 0;
35 
36     ParsePacket pkt = {.ctx = ctx, .buf = buf, .bufLen = bufLen, .bufOffset = &bufOffset};
37     ret = ParseVersion(&pkt, &msg->version);
38     if (ret != HITLS_SUCCESS) {
39         return ret;
40     }
41     ret = ParseCookie(&pkt, &msg->cookieLen, &msg->cookie);
42     if (ret != HITLS_SUCCESS) {
43         CleanHelloVerifyRequest(msg);
44         return ret;
45     }
46 
47     // The cookie content is the last field of the helloVerifyRequest message. No other data should follow.
48     if (bufLen != bufOffset) {
49         return ParseErrorProcess(ctx, HITLS_PARSE_INVALID_MSG_LEN, BINLOG_ID17335,
50             BINGLOG_STR("hello verify request packet length error."), ALERT_DECODE_ERROR);
51     }
52 
53     return HITLS_SUCCESS;
54 }
55 
CleanHelloVerifyRequest(HelloVerifyRequestMsg * msg)56 void CleanHelloVerifyRequest(HelloVerifyRequestMsg *msg)
57 {
58     if (msg == NULL) {
59         return;
60     }
61 
62     BSL_SAL_FREE(msg->cookie);
63     return;
64 }
65 #endif /* HITLS_TLS_HOST_CLIENT */