Adress review comments
Change Code styles
Add test cases
Change-Id: I022bfc66fe509fe767319c4fe5f2541ee05e96fd
Signed-off-by: XiaokangQian <xiaokang.qian@arm.com>
diff --git a/library/ssl_misc.h b/library/ssl_misc.h
index 20e94dc..119826f 100644
--- a/library/ssl_misc.h
+++ b/library/ssl_misc.h
@@ -2289,7 +2289,7 @@
int mbedtls_ssl_write_alpn_ext( mbedtls_ssl_context *ssl,
unsigned char *buf,
unsigned char *end,
- size_t *olen );
+ size_t *out_len );
#endif /* MBEDTLS_SSL_ALPN */
#endif /* ssl_misc.h */
diff --git a/library/ssl_tls.c b/library/ssl_tls.c
index 6fa169f..faf807f 100644
--- a/library/ssl_tls.c
+++ b/library/ssl_tls.c
@@ -8291,36 +8291,42 @@
const unsigned char *end )
{
const unsigned char *p = buf;
- size_t list_len;
+ size_t protocol_name_list_len;
- const unsigned char *cur_alpn;
- size_t cur_alpn_len;
+ const unsigned char *protocol_name;
+ size_t protocol_name_len;
/* If ALPN not configured, just ignore the extension */
if( ssl->conf->alpn_list == NULL )
return( 0 );
/*
- * opaque ProtocolName<1..2^8-1>;
+ * RFC7301, section 3.1
+ * opaque ProtocolName<1..2^8-1>;
*
- * struct {
- * ProtocolName protocol_name_list<2..2^16-1>
- * } ProtocolNameList;
+ * struct {
+ * ProtocolName protocol_name_list<2..2^16-1>
+ * } ProtocolNameList;
*/
- /* Min length is 2 ( list_len ) + 1 ( name_len ) + 1 ( name ) */
+ /*
+ * protocal_name_list_len 2 bytes
+ * protocal_name_len 1 bytes
+ * protocal_name >=1 byte
+ */
MBEDTLS_SSL_CHK_BUF_READ_PTR( p, end, 4 );
- list_len = MBEDTLS_GET_UINT16_BE( p, 0 );
+ protocol_name_list_len = MBEDTLS_GET_UINT16_BE( p, 0 );
p += 2;
- MBEDTLS_SSL_CHK_BUF_READ_PTR( p, end, list_len );
+ MBEDTLS_SSL_CHK_BUF_READ_PTR( p, end, protocol_name_list_len );
/* Validate peer's list (lengths) */
- for( cur_alpn = p; cur_alpn != end; cur_alpn += cur_alpn_len )
+ for( protocol_name = p; protocol_name != end;
+ protocol_name += protocol_name_len )
{
- cur_alpn_len = *cur_alpn++;
- MBEDTLS_SSL_CHK_BUF_READ_PTR( cur_alpn, end, cur_alpn_len );
- if( cur_alpn_len == 0 )
+ protocol_name_len = *protocol_name++;
+ MBEDTLS_SSL_CHK_BUF_READ_PTR( protocol_name, end, protocol_name_len );
+ if( protocol_name_len == 0 )
return( MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER );
}
@@ -8328,12 +8334,13 @@
for( const char **alpn = ssl->conf->alpn_list; *alpn != NULL; alpn++ )
{
size_t const alpn_len = strlen( *alpn );
- for( cur_alpn = p; cur_alpn != end; cur_alpn += cur_alpn_len )
+ for( protocol_name = p; protocol_name != end;
+ protocol_name += protocol_name_len )
{
- cur_alpn_len = *cur_alpn++;
+ protocol_name_len = *protocol_name++;
- if( cur_alpn_len == alpn_len &&
- memcmp( cur_alpn, *alpn, alpn_len ) == 0 )
+ if( protocol_name_len == alpn_len &&
+ memcmp( protocol_name, *alpn, alpn_len ) == 0 )
{
ssl->alpn_chosen = *alpn;
return( 0 );
@@ -8351,10 +8358,10 @@
int mbedtls_ssl_write_alpn_ext( mbedtls_ssl_context *ssl,
unsigned char *buf,
unsigned char *end,
- size_t *olen )
+ size_t *out_len )
{
unsigned char *p = buf;
- *olen = 0;
+ *out_len = 0;
if( ssl->alpn_chosen == NULL )
{
@@ -8373,14 +8380,14 @@
*/
MBEDTLS_PUT_UINT16_BE( MBEDTLS_TLS_EXT_ALPN, p, 0 );
- *olen = 7 + strlen( ssl->alpn_chosen );
+ *out_len = 7 + strlen( ssl->alpn_chosen );
- MBEDTLS_PUT_UINT16_BE( *olen - 4, p, 2 );
- MBEDTLS_PUT_UINT16_BE( *olen - 6, p, 4 );
- p[6] = MBEDTLS_BYTE_0( *olen - 7 );
+ MBEDTLS_PUT_UINT16_BE( *out_len - 4, p, 2 );
+ MBEDTLS_PUT_UINT16_BE( *out_len - 6, p, 4 );
+ p[6] = MBEDTLS_BYTE_0( *out_len - 7 );
p += 7;
- memcpy( p, ssl->alpn_chosen, *olen - 7 );
+ memcpy( p, ssl->alpn_chosen, *out_len - 7 );
return ( 0 );
}
#endif /* MBEDTLS_SSL_ALPN */
diff --git a/tests/ssl-opt.sh b/tests/ssl-opt.sh
index 0791823..0178e7e 100755
--- a/tests/ssl-opt.sh
+++ b/tests/ssl-opt.sh
@@ -10520,16 +10520,22 @@
"$P_SRV debug_level=3 tickets=0 crt_file=data_files/server5.crt key_file=data_files/server5.key force_version=tls13 alpn=h2" \
"$O_NEXT_CLI -msg -tls1_3 -no_middlebox -alpn h2" \
0 \
- -s "server state: MBEDTLS_SSL_HELLO_REQUEST" \
- -s "server state: MBEDTLS_SSL_SERVER_HELLO" \
- -s "server state: MBEDTLS_SSL_ENCRYPTED_EXTENSIONS" \
- -s "server state: MBEDTLS_SSL_CERTIFICATE_REQUEST" \
- -s "server state: MBEDTLS_SSL_SERVER_CERTIFICATE" \
- -s "server state: MBEDTLS_SSL_CERTIFICATE_VERIFY" \
- -s "server state: MBEDTLS_SSL_SERVER_FINISHED" \
- -s "server state: MBEDTLS_SSL_CLIENT_FINISHED" \
- -s "server state: MBEDTLS_SSL_HANDSHAKE_WRAPUP" \
- -s "<= parse client hello" \
+ -s "found alpn extension" \
+ -s "server side, adding alpn extension" \
+ -s "Protocol is TLSv1.3" \
+ -s "HTTP/1.0 200 OK" \
+ -s "Application Layer Protocol is h2"
+
+requires_gnutls_tls1_3
+requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
+requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
+requires_config_enabled MBEDTLS_DEBUG_C
+requires_config_enabled MBEDTLS_SSL_CLI_C
+requires_config_enabled MBEDTLS_SSL_ALPN
+run_test "TLS 1.3: server alpn - gnutls" \
+ "$P_SRV debug_level=3 tickets=0 crt_file=data_files/server5.crt key_file=data_files/server5.key force_version=tls13 alpn=h2" \
+ "$G_NEXT_CLI localhost -d 4 --priority=NORMAL:-VERS-ALL:+VERS-TLS1.3:%NO_TICKETS:%DISABLE_TLS13_COMPAT_MODE -V --alpn h2" \
+ 0 \
-s "found alpn extension" \
-s "server side, adding alpn extension" \
-s "Protocol is TLSv1.3" \