Skip to content

Commit

Permalink
WiFiClientSecure: don't trash unread decrypted data when writing
Browse files Browse the repository at this point in the history
When application requests to write data, check if there is any unread
decrypted data left. If there is, don't write immediately, but save the
data to be written. When all decrypted data has been consumed by the
application, send out the saved outgoing data.

Fixes #2256.
  • Loading branch information
igrr committed Dec 26, 2017
1 parent a6922dc commit 02bc538
Showing 1 changed file with 101 additions and 1 deletion.
102 changes: 101 additions & 1 deletion libraries/ESP8266WiFi/src/WiFiClientSecure.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,7 @@ extern "C"
#include "osapi.h"
#include "ets_sys.h"
}
#include <list>
#include <errno.h>
#include "debug.h"
#include "ESP8266WiFi.h"
Expand All @@ -50,6 +51,26 @@ extern "C"
#define SSL_DEBUG_OPTS 0
#endif


typedef struct BufferItem
{
BufferItem(const uint8_t* data_, size_t size_)
: size(size_), data(new uint8_t[size])
{
if (data.get() != nullptr) {
memcpy(data.get(), data_, size);
} else {
DEBUGV(":wcs alloc %d failed\r\n", size_);
size = 0;
}
}

size_t size;
std::unique_ptr<uint8_t[]> data;
} BufferItem;

typedef std::list<BufferItem> BufferList;

class SSLContext
{
public:
Expand Down Expand Up @@ -139,6 +160,10 @@ class SSLContext
_available -= will_copy;
if (_available == 0) {
_read_ptr = nullptr;
/* Send pending outgoing data, if any */
if (_hasWriteBuffers()) {
_writeBuffersSend();
}
}
return will_copy;
}
Expand All @@ -155,10 +180,34 @@ class SSLContext
--_available;
if (_available == 0) {
_read_ptr = nullptr;
/* Send pending outgoing data, if any */
if (_hasWriteBuffers()) {
_writeBuffersSend();
}
}
return result;
}

int write(const uint8_t* src, size_t size)
{
if (!_available) {
if (_hasWriteBuffers()) {
int rc = _writeBuffersSend();
if (rc < 0) {
return rc;
}
}
return _write(src, size);
}
/* Some received data is still present in the axtls fragment buffer.
We can't call ssl_write now, as that will overwrite the contents of
the fragment buffer, corrupting the received data.
Save a copy of the outgoing data, and call ssl_write when all
recevied data has been consumed by the application.
*/
return _writeBufferAdd(src, size);
}

int peek()
{
if (!_available) {
Expand Down Expand Up @@ -288,12 +337,63 @@ class SSLContext
return _available;
}

int _write(const uint8_t* src, size_t size)
{
if (!_ssl) {
return 0;
}

int rc = ssl_write(_ssl, src, size);
if (rc >= 0) {
return rc;
}
DEBUGV(":wcs write rc=%d\r\n", rc);
return rc;
}

int _writeBufferAdd(const uint8_t* data, size_t size)
{
if (!_ssl) {
return 0;
}

_writeBuffers.emplace_back(data, size);
if (_writeBuffers.back().data.get() == nullptr) {
_writeBuffers.pop_back();
return 0;
}
return size;
}

int _writeBuffersSend()
{
while (!_writeBuffers.empty()) {
auto& first = _writeBuffers.front();
int rc = _write(first.data.get(), first.size);
_writeBuffers.pop_front();
if (rc < 0) {
if (_hasWriteBuffers()) {
DEBUGV(":wcs _writeBuffersSend dropping unsent data\r\n");
_writeBuffers.clear();
}
return rc;
}
}
return 0;
}

bool _hasWriteBuffers()
{
return !_writeBuffers.empty();
}

static SSL_CTX* _ssl_ctx;
static int _ssl_ctx_refcnt;
SSL* _ssl = nullptr;
int _refcnt = 0;
const uint8_t* _read_ptr = nullptr;
size_t _available = 0;
BufferList _writeBuffers;
bool _allowSelfSignedCerts = false;
static ClientContext* s_io_ctx;
};
Expand Down Expand Up @@ -377,7 +477,7 @@ size_t WiFiClientSecure::write(const uint8_t *buf, size_t size)
return 0;
}

int rc = ssl_write(*_ssl, buf, size);
int rc = _ssl->write(buf, size);
if (rc >= 0) {
return rc;
}
Expand Down

0 comments on commit 02bc538

Please sign in to comment.