Merge pull request #8882 from rizlik/dtls13_always_transmit_explicit_ack

dtls13: always send ACKs on detected retransmission
This commit is contained in:
David Garske
2025-06-17 11:35:07 -07:00
committed by GitHub
5 changed files with 90 additions and 4 deletions

View File

@@ -905,7 +905,7 @@ static int Dtls13RtxMsgRecvd(WOLFSSL* ssl, enum HandShakeType hs,
/* the other peer may have retransmitted because an ACK for a flight /* the other peer may have retransmitted because an ACK for a flight
that needs explicit ACK was lost.*/ that needs explicit ACK was lost.*/
if (ssl->dtls13Rtx.seenRecords != NULL) if (ssl->dtls13Rtx.seenRecords != NULL)
ssl->dtls13Rtx.sendAcks = (byte)ssl->options.dtls13SendMoreAcks; ssl->dtls13Rtx.sendAcks = 1;
} }
if (ssl->keys.dtls_peer_handshake_number == if (ssl->keys.dtls_peer_handshake_number ==

View File

@@ -12817,6 +12817,13 @@ cleanup:
if (ssl == NULL) if (ssl == NULL)
return 0; return 0;
#if defined(WOLFSSL_DTLS13) && !defined(WOLFSSL_NO_CLIENT)
if (ssl->options.side == WOLFSSL_CLIENT_END && ssl->options.dtls
&& IsAtLeastTLSv1_3(ssl->version)) {
return ssl->options.serverState == SERVER_FINISHED_ACKED;
}
#endif /* WOLFSSL_DTLS13 && !WOLFSSL_NO_CLIENT */
/* Can't use ssl->options.connectState and ssl->options.acceptState /* Can't use ssl->options.connectState and ssl->options.acceptState
* because they differ in meaning for TLS <=1.2 and 1.3 */ * because they differ in meaning for TLS <=1.2 and 1.3 */
if (ssl->options.handShakeState == HANDSHAKE_DONE) if (ssl->options.handShakeState == HANDSHAKE_DONE)
@@ -26762,4 +26769,3 @@ void wolfSSL_FIPS_drbg_set_app_data(WOLFSSL_DRBG_CTX *ctx, void *app_data)
#endif /* !WOLFCRYPT_ONLY */ #endif /* !WOLFCRYPT_ONLY */

View File

@@ -66090,8 +66090,7 @@ static int test_dtls13_missing_finished_server(void)
ExpectIntEQ(wolfSSL_get_error(ssl_c, -1), WOLFSSL_ERROR_WANT_READ); ExpectIntEQ(wolfSSL_get_error(ssl_c, -1), WOLFSSL_ERROR_WANT_READ);
/* Let's clear the output */ /* Let's clear the output */
test_memio_clear_buffer(&test_ctx, 0); test_memio_clear_buffer(&test_ctx, 0);
/* We should signal that the handshake is done */ ExpectFalse(wolfSSL_is_init_finished(ssl_c));
ExpectTrue(wolfSSL_is_init_finished(ssl_c));
/* Let's send some app data */ /* Let's send some app data */
ExpectIntEQ(wolfSSL_write(ssl_c, test_str, sizeof(test_str)), ExpectIntEQ(wolfSSL_write(ssl_c, test_str, sizeof(test_str)),
sizeof(test_str)); sizeof(test_str));
@@ -68496,6 +68495,7 @@ TEST_CASE testCases[] = {
TEST_DECL(test_wolfSSL_dtls_cid_parse), TEST_DECL(test_wolfSSL_dtls_cid_parse),
TEST_DECL(test_dtls13_epochs), TEST_DECL(test_dtls13_epochs),
TEST_DECL(test_dtls_rtx_across_epoch_change), TEST_DECL(test_dtls_rtx_across_epoch_change),
TEST_DECL(test_dtls_drop_client_ack),
TEST_DECL(test_dtls13_ack_order), TEST_DECL(test_dtls13_ack_order),
TEST_DECL(test_dtls_version_checking), TEST_DECL(test_dtls_version_checking),
TEST_DECL(test_ocsp_status_callback), TEST_DECL(test_ocsp_status_callback),

View File

@@ -1383,3 +1383,82 @@ int test_dtls_rtx_across_epoch_change(void)
defined(WOLFSSL_DTLS13) */ defined(WOLFSSL_DTLS13) */
return EXPECT_RESULT(); return EXPECT_RESULT();
} }
int test_dtls_drop_client_ack(void)
{
EXPECT_DECLS;
#if defined(HAVE_MANUAL_MEMIO_TESTS_DEPENDENCIES) && \
defined(WOLFSSL_DTLS13) && defined(WOLFSSL_DTLS)
WOLFSSL_CTX *ctx_c = NULL, *ctx_s = NULL;
WOLFSSL *ssl_c = NULL, *ssl_s = NULL;
struct test_memio_ctx test_ctx;
char data[32];
XMEMSET(&test_ctx, 0, sizeof(test_ctx));
/* Setup DTLS contexts */
ExpectIntEQ(test_memio_setup(&test_ctx, &ctx_c, &ctx_s, &ssl_c, &ssl_s,
wolfDTLSv1_3_client_method, wolfDTLSv1_3_server_method),
0);
/* disable new session ticket to simplify testing */
ExpectIntEQ(wolfSSL_no_ticket_TLSv13(ssl_s), 0);
/* CH0 */
wolfSSL_SetLoggingPrefix("client:");
ExpectIntEQ(wolfSSL_connect(ssl_c), -1);
ExpectIntEQ(wolfSSL_get_error(ssl_c, -1), WOLFSSL_ERROR_WANT_READ);
/* HRR */
wolfSSL_SetLoggingPrefix("server:");
ExpectIntEQ(wolfSSL_accept(ssl_s), -1);
ExpectIntEQ(wolfSSL_get_error(ssl_s, -1), WOLFSSL_ERROR_WANT_READ);
/* CH1 */
wolfSSL_SetLoggingPrefix("client:");
ExpectIntEQ(wolfSSL_connect(ssl_c), -1);
ExpectIntEQ(wolfSSL_get_error(ssl_c, -1), WOLFSSL_ERROR_WANT_READ);
/* SH ... FINISHED */
wolfSSL_SetLoggingPrefix("server:");
ExpectIntEQ(wolfSSL_accept(ssl_s), -1);
ExpectIntEQ(wolfSSL_get_error(ssl_s, -1), WOLFSSL_ERROR_WANT_READ);
/* ... FINISHED */
wolfSSL_SetLoggingPrefix("client:");
ExpectIntEQ(wolfSSL_connect(ssl_c), -1);
ExpectIntEQ(wolfSSL_get_error(ssl_c, -1), WOLFSSL_ERROR_WANT_READ);
/* init is finished should return false at this point */
ExpectFalse(wolfSSL_is_init_finished(ssl_c));
/* ACK */
ExpectIntEQ(wolfSSL_accept(ssl_s), WOLFSSL_SUCCESS);
/* Drop the ack */
test_memio_clear_buffer(&test_ctx, 1);
/* trigger client timeout, finished should be rtx */
ExpectIntEQ(wolfSSL_dtls_got_timeout(ssl_c), WOLFSSL_SUCCESS);
ExpectIntEQ(wolfSSL_dtls_got_timeout(ssl_c), WOLFSSL_SUCCESS);
/* this should have triggered a rtx */
ExpectIntGT(test_ctx.s_msg_count, 0);
/* this should re-send the ack immediately */
ExpectIntEQ(wolfSSL_read(ssl_s, data, 32), -1);
ExpectIntEQ(wolfSSL_get_error(ssl_s, -1), WOLFSSL_ERROR_WANT_READ);
ExpectIntEQ(test_ctx.c_msg_count, 1);
/* This should advance the connection on the client */
ExpectIntEQ(wolfSSL_negotiate(ssl_c), WOLFSSL_SUCCESS);
/* Test communication works correctly */
ExpectIntEQ(test_dtls_communication(ssl_s, ssl_c), TEST_SUCCESS);
/* Cleanup */
wolfSSL_free(ssl_c);
wolfSSL_CTX_free(ctx_c);
wolfSSL_free(ssl_s);
wolfSSL_CTX_free(ctx_s);
#endif /* defined(HAVE_MANUAL_MEMIO_TESTS_DEPENDENCIES) && \
defined(WOLFSSL_DTLS13) */
return EXPECT_RESULT();
}

View File

@@ -37,4 +37,5 @@ int test_dtls13_short_read(void);
int test_records_span_network_boundaries(void); int test_records_span_network_boundaries(void);
int test_dtls_record_cross_boundaries(void); int test_dtls_record_cross_boundaries(void);
int test_dtls_rtx_across_epoch_change(void); int test_dtls_rtx_across_epoch_change(void);
int test_dtls_drop_client_ack(void);
#endif /* TESTS_API_DTLS_H */ #endif /* TESTS_API_DTLS_H */