Replace open_close_notify with open_app_data.

While a fairly small hook, open_close_notify is pretty weird. It
processes things at the record level and not above. Notably, this will
break if it skips past a TLS 1.3 KeyUpdate.

Instead, it can share the core part of SSL_read/SSL_peek, with slight
tweaks to post-handshake processing. Note this does require some tweaks
to that code. Notably, to retain the current semantics that SSL_shutdown
does not call funny callbacks, we suppress tickets.

Change-Id: Ia0cbd0b9f4527f1b091dd2083a5d8c7efb2bac65
Reviewed-on: https://boringssl-review.googlesource.com/21885
Commit-Queue: Steven Valdez <svaldez@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
Reviewed-by: Steven Valdez <svaldez@google.com>
diff --git a/ssl/ssl_lib.cc b/ssl/ssl_lib.cc
index 8e06c49..ee7406d 100644
--- a/ssl/ssl_lib.cc
+++ b/ssl/ssl_lib.cc
@@ -884,7 +884,8 @@
   // protocol, namely in HTTPS, just before reading the HTTP response. Require
   // the record-layer be idle and avoid complexities of sending a handshake
   // record while an application_data record is being written.
-  if (ssl_write_buffer_is_pending(ssl)) {
+  if (ssl_write_buffer_is_pending(ssl) ||
+      ssl->s3->write_shutdown != ssl_shutdown_none) {
     goto no_renegotiation;
   }
 
@@ -902,12 +903,12 @@
   return 1;
 
 no_renegotiation:
-  ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_NO_RENEGOTIATION);
   OPENSSL_PUT_ERROR(SSL, SSL_R_NO_RENEGOTIATION);
+  ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_NO_RENEGOTIATION);
   return 0;
 }
 
-static int ssl_read_impl(SSL *ssl, void *buf, int num, bool peek) {
+static int ssl_read_impl(SSL *ssl) {
   ssl_reset_error_state(ssl);
 
   if (ssl->do_handshake == NULL) {
@@ -915,7 +916,7 @@
     return -1;
   }
 
-  for (;;) {
+  while (ssl->s3->pending_app_data.empty()) {
     // Complete the current handshake, if any. False Start will cause
     // |SSL_do_handshake| to return mid-handshake, so this may require multiple
     // iterations.
@@ -941,48 +942,52 @@
       continue;  // Loop again. We may have begun a new handshake.
     }
 
-    if (ssl->s3->pending_app_data.empty()) {
-      uint8_t alert = SSL_AD_DECODE_ERROR;
-      size_t consumed = 0;
-      auto ret =
-          ssl->method->open_app_data(ssl, &ssl->s3->pending_app_data, &consumed,
-                                     &alert, ssl_read_buffer(ssl));
-      bool retry;
-      int bio_ret = ssl_handle_open_record(ssl, &retry, ret, consumed, alert);
-      if (bio_ret <= 0) {
-        return bio_ret;
-      }
-      if (retry) {
-        continue;
-      }
+    uint8_t alert = SSL_AD_DECODE_ERROR;
+    size_t consumed = 0;
+    auto ret =
+        ssl->method->open_app_data(ssl, &ssl->s3->pending_app_data, &consumed,
+                                   &alert, ssl_read_buffer(ssl));
+    bool retry;
+    int bio_ret = ssl_handle_open_record(ssl, &retry, ret, consumed, alert);
+    if (bio_ret <= 0) {
+      return bio_ret;
+    }
+    if (!retry) {
+      assert(!ssl->s3->pending_app_data.empty());
       ssl->s3->key_update_count = 0;
     }
-
-    if (num <= 0) {
-      return num;
-    }
-
-    size_t todo =
-        std::min(ssl->s3->pending_app_data.size(), static_cast<size_t>(num));
-    OPENSSL_memcpy(buf, ssl->s3->pending_app_data.data(), todo);
-    if (!peek) {
-      // TODO(davidben): In DTLS, should the rest of the record be discarded?
-      // DTLS is not a stream. See https://crbug.com/boringssl/65.
-      ssl->s3->pending_app_data = ssl->s3->pending_app_data.subspan(todo);
-      if (ssl->s3->pending_app_data.empty()) {
-        ssl_read_buffer_discard(ssl);
-      }
-    }
-    return static_cast<int>(todo);
   }
+
+  return 1;
 }
 
 int SSL_read(SSL *ssl, void *buf, int num) {
-  return ssl_read_impl(ssl, buf, num, false /* consume bytes */);
+  int ret = SSL_peek(ssl, buf, num);
+  if (ret <= 0) {
+    return ret;
+  }
+  // TODO(davidben): In DTLS, should the rest of the record be discarded?  DTLS
+  // is not a stream. See https://crbug.com/boringssl/65.
+  ssl->s3->pending_app_data =
+      ssl->s3->pending_app_data.subspan(static_cast<size_t>(ret));
+  if (ssl->s3->pending_app_data.empty()) {
+    ssl_read_buffer_discard(ssl);
+  }
+  return ret;
 }
 
 int SSL_peek(SSL *ssl, void *buf, int num) {
-  return ssl_read_impl(ssl, buf, num, true /* peek */);
+  int ret = ssl_read_impl(ssl);
+  if (ret <= 0) {
+    return ret;
+  }
+  if (num <= 0) {
+    return num;
+  }
+  size_t todo =
+      std::min(ssl->s3->pending_app_data.size(), static_cast<size_t>(num));
+  OPENSSL_memcpy(buf, ssl->s3->pending_app_data.data(), todo);
+  return static_cast<int>(todo);
 }
 
 int SSL_write(SSL *ssl, const void *buf, int num) {
@@ -1056,21 +1061,28 @@
       return -1;
     }
   } else if (ssl->s3->read_shutdown != ssl_shutdown_close_notify) {
-    ssl->s3->pending_app_data = Span<uint8_t>();
-    for (;;) {
-      uint8_t alert = SSL_AD_DECODE_ERROR;
-      size_t consumed = 0;
-      auto ret = ssl->method->open_close_notify(ssl, &consumed, &alert,
-                                                ssl_read_buffer(ssl));
-      bool retry;
-      int bio_ret = ssl_handle_open_record(ssl, &retry, ret, consumed, alert);
-      if (bio_ret <= 0) {
-        break;
+    if (SSL_is_dtls(ssl)) {
+      // Bidirectional shutdown doesn't make sense for an unordered
+      // transport. DTLS alerts also aren't delivered reliably, so we may even
+      // time out because the peer never received our close_notify. Report to
+      // the caller that the channel has fully shut down.
+      if (ssl->s3->read_shutdown == ssl_shutdown_error) {
+        ERR_restore_state(ssl->s3->read_error);
+        return -1;
       }
-      assert(retry);  // open_close_notify never reports success.
-    }
-    if (ssl->s3->read_shutdown != ssl_shutdown_close_notify) {
-      return -1;
+      ssl->s3->read_shutdown = ssl_shutdown_close_notify;
+    } else {
+      // Keep discarding data until we see a close_notify.
+      for (;;) {
+        ssl->s3->pending_app_data = Span<uint8_t>();
+        int ret = ssl_read_impl(ssl);
+        if (ret <= 0) {
+          break;
+        }
+      }
+      if (ssl->s3->read_shutdown != ssl_shutdown_close_notify) {
+        return -1;
+      }
     }
   }