Skip to content

Conversation

@skmcgrail
Copy link
Member

@skmcgrail skmcgrail commented Aug 15, 2025

Issues:

Addresses CryptoAlg-3221, CryptoAlg-3220, CryptoAlg-3219, CryptoAlg-3218, CryptoAlg-3217, CryptoAlg-3216, CryptoAlg-3215, CryptoAlg-3214, CryptoAlg-3212, CryptoAlg-3211

Description of changes:

This pull request addresses and improves the experimental TLS transfer serialization feature. Primarily focusing on performance of restored connections for the SSLBuffer by improving the serialization format, and hardens the checking of the data structures on deserialization.

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license and the ISC license.

Copy link
Contributor

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

clang-tidy made some suggestions

There were too many comments to post at once. Showing the first 10 out of 13. Check the log or trigger a new build to see more.

@codecov-commenter
Copy link

codecov-commenter commented Aug 15, 2025

Codecov Report

❌ Patch coverage is 73.09783% with 99 lines in your changes missing coverage. Please review.
✅ Project coverage is 78.73%. Comparing base (765955a) to head (28b0b1a).
⚠️ Report is 1 commits behind head on main.

Files with missing lines Patch % Lines
ssl/ssl_buffer.cc 60.86% 90 Missing ⚠️
ssl/ssl_transfer_asn1.cc 90.00% 9 Missing ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##             main    #2616      +/-   ##
==========================================
- Coverage   78.75%   78.73%   -0.02%     
==========================================
  Files         663      663              
  Lines      113346   113622     +276     
  Branches    15946    15974      +28     
==========================================
+ Hits        89264    89464     +200     
- Misses      23304    23381      +77     
+ Partials      778      777       -1     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@skmcgrail skmcgrail force-pushed the tls-transfer branch 2 times, most recently from 85b387d to 530f170 Compare August 18, 2025 22:41
Copy link
Contributor

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

clang-tidy made some suggestions

@skmcgrail skmcgrail force-pushed the tls-transfer branch 2 times, most recently from 17967b3 to 68f4ff2 Compare August 18, 2025 23:51
@skmcgrail skmcgrail marked this pull request as ready for review August 19, 2025 21:22
@skmcgrail skmcgrail requested a review from a team as a code owner August 19, 2025 21:22
Comment on lines +233 to +235
if (data_start_ > end_ptr || data_start_ < start_ptr ||
data_end_ptr > end_ptr || data_end_ptr < start_ptr || size_ > cap_ ||
remaining_ptr > end_ptr || remaining_ptr < start_ptr) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can any of these potentially be equal?

Comment on lines +171 to +177
#define GUARD_SUSPENDED_STATE(ptr,code) \
do { \
if (ptr->is_suspended_state) { \
OPENSSL_PUT_ERROR(SSL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); \
return code; \
} \
} while (0)
Copy link
Contributor

@justsmth justsmth Sep 4, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

NP: Use parentheses: (ptr)->is_suspended_state.

@skmcgrail skmcgrail merged commit 26da017 into aws:main Sep 4, 2025
131 of 139 checks passed
@skmcgrail skmcgrail deleted the tls-transfer branch September 4, 2025 18:32
skmcgrail added a commit to skmcgrail/aws-lc that referenced this pull request Sep 9, 2025
Addresses CryptoAlg-3221, CryptoAlg-3220, CryptoAlg-3219,
CryptoAlg-3218, CryptoAlg-3217, CryptoAlg-3216, CryptoAlg-3215,
CryptoAlg-3214, CryptoAlg-3212, CryptoAlg-3211

This pull request addresses and improves the experimental TLS transfer
serialization feature. Primarily focusing on performance of restored
connections for the SSLBuffer by improving the serialization format, and
hardens the checking of the data structures on deserialization.

By submitting this pull request, I confirm that my contribution is made
under the terms of the Apache 2.0 license and the ISC license.

(cherry picked from commit 26da017)
@justsmth justsmth mentioned this pull request Sep 12, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants