From 2dbc39deacf9d5850eecef515cbc50331750dd22 Mon Sep 17 00:00:00 2001 From: Hugo Landau Date: Tue, 18 Apr 2023 19:30:54 +0100 Subject: QUIC APL: Add stream creation APIs Reviewed-by: Matt Caswell Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/20765) --- ssl/quic/quic_impl.c | 58 +++++++++++++++++++++++++++++++++++++++++++++++++--- 1 file changed, 55 insertions(+), 3 deletions(-) (limited to 'ssl/quic/quic_impl.c') diff --git a/ssl/quic/quic_impl.c b/ssl/quic/quic_impl.c index c02efed5f8..0dd6576633 100644 --- a/ssl/quic/quic_impl.c +++ b/ssl/quic/quic_impl.c @@ -257,10 +257,16 @@ SSL *ossl_quic_new(SSL_CTX *ctx) if (!create_channel(qc)) goto err; + if ((qc->default_xso = (QUIC_XSO *)ossl_quic_conn_stream_new(&qc->ssl, 0)) == NULL) + goto err; + return ssl_base; err: - SSL_free(qc->tls); + if (qc != NULL) { + ossl_quic_channel_free(qc->ch); + SSL_free(qc->tls); + } OPENSSL_free(qc); return NULL; } @@ -275,8 +281,39 @@ void ossl_quic_free(SSL *s) if (!expect_quic(s, &ctx)) return; + if (ctx.is_stream) { + /* + * When a QSSO is freed, the XSO is freed immediately, because the XSO + * itself only contains API personality layer data. However the + * underlying QUIC_STREAM is not freed immediately but is instead marked + * as deleted for later collection. + */ + + quic_lock(ctx.qc); + + assert(ctx.qc->num_xso > 0); + --ctx.qc->num_xso; + + ctx.xso->stream->deleted = 1; + + quic_unlock(ctx.qc); + + /* Note: SSL_free calls OPENSSL_free(xso) for us */ + return; + } + quic_lock(ctx.qc); + /* + * Free the default XSO, if any. The QUIC_STREAM is not deleted at this + * stage, but is freed during the channel free when the whole QSM is freed. + */ + if (ctx.qc->default_xso != NULL) + SSL_free(&ctx.qc->default_xso->ssl); + + /* Ensure we have no remaining XSOs. */ + assert(ctx.qc->num_xso == 0); + if (ctx.qc->is_thread_assisted && ctx.qc->started) { ossl_quic_thread_assist_wait_stopped(&ctx.qc->thread_assist); ossl_quic_thread_assist_cleanup(&ctx.qc->thread_assist); @@ -1047,12 +1084,20 @@ SSL *ossl_quic_conn_stream_new(SSL *s, uint64_t flags) { QCTX ctx; QUIC_XSO *xso = NULL; + int is_uni = ((flags & SSL_STREAM_FLAG_UNI) != 0); if (!expect_quic_conn_only(s, &ctx)) return NULL; + quic_lock(ctx.qc); + + if (ossl_quic_channel_is_term_any(ctx.qc->ch)) { + QUIC_RAISE_NON_NORMAL_ERROR(ctx.qc, SSL_R_PROTOCOL_IS_SHUTDOWN, NULL); + goto err; + } + if ((xso = OPENSSL_zalloc(sizeof(*xso))) == NULL) - return NULL; + goto err; if (!ossl_ssl_init(&xso->ssl, s->ctx, s->method, SSL_TYPE_QUIC_XSO)) goto err; @@ -1061,11 +1106,18 @@ SSL *ossl_quic_conn_stream_new(SSL *s, uint64_t flags) xso->blocking = ctx.qc->default_blocking; xso->ssl_mode = ctx.qc->default_ssl_mode; - xso->stream = NULL; /* TODO XXX ossl_quic_channel_new_stream */ + xso->stream = ossl_quic_channel_new_stream(ctx.qc->ch, is_uni); + if (xso->stream == NULL) + goto err; + + ++ctx.qc->num_xso; + + quic_unlock(ctx.qc); return &xso->ssl; err: OPENSSL_free(xso); + quic_unlock(ctx.qc); return NULL; } -- cgit v1.2.3