123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524 |
- /*
- * Copyright (c) 2009-2012 Niels Provos and Nick Mathewson
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- * 3. The name of the author may not be used to endorse or promote products
- * derived from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
- * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
- * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
- * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
- * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
- * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
- * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
- // Get rid of OSX 10.7 and greater deprecation warnings.
- #if defined(__APPLE__) && defined(__clang__)
- #pragma clang diagnostic ignored "-Wdeprecated-declarations"
- #endif
- #include "event2/event-config.h"
- #include "evconfig-private.h"
- #include <sys/types.h>
- #ifdef EVENT__HAVE_SYS_TIME_H
- #include <sys/time.h>
- #endif
- #include <errno.h>
- #include <stdio.h>
- #include <stdlib.h>
- #include <string.h>
- #ifdef EVENT__HAVE_STDARG_H
- #include <stdarg.h>
- #endif
- #ifdef EVENT__HAVE_UNISTD_H
- #include <unistd.h>
- #endif
- #ifdef _WIN32
- #include <winsock2.h>
- #endif
- #include "event2/bufferevent.h"
- #include "event2/bufferevent_struct.h"
- #include "event2/bufferevent_ssl.h"
- #include "event2/buffer.h"
- #include "event2/event.h"
- #include "mm-internal.h"
- #include "bufferevent-internal.h"
- #include "log-internal.h"
- #include <openssl/ssl.h>
- #include <openssl/err.h>
- #include "openssl-compat.h"
- /*
- * Define an OpenSSL bio that targets a bufferevent.
- */
- /* --------------------
- A BIO is an OpenSSL abstraction that handles reading and writing data. The
- library will happily speak SSL over anything that implements a BIO
- interface.
- Here we define a BIO implementation that directs its output to a
- bufferevent. We'll want to use this only when none of OpenSSL's built-in
- IO mechanisms work for us.
- -------------------- */
- /* every BIO type needs its own integer type value. */
- #define BIO_TYPE_LIBEVENT 57
- /* ???? Arguably, we should set BIO_TYPE_FILTER or BIO_TYPE_SOURCE_SINK on
- * this. */
- #if 0
- static void
- print_err(int val)
- {
- int err;
- printf("Error was %d\n", val);
- while ((err = ERR_get_error())) {
- const char *msg = (const char*)ERR_reason_error_string(err);
- const char *lib = (const char*)ERR_lib_error_string(err);
- const char *func = (const char*)ERR_func_error_string(err);
- printf("%s in %s %s\n", msg, lib, func);
- }
- }
- #else
- #define print_err(v) ((void)0)
- #endif
- /* Called to initialize a new BIO */
- static int
- bio_bufferevent_new(BIO *b)
- {
- BIO_set_init(b, 0);
- BIO_set_data(b, NULL); /* We'll be putting the bufferevent in this field.*/
- return 1;
- }
- /* Called to uninitialize the BIO. */
- static int
- bio_bufferevent_free(BIO *b)
- {
- if (!b)
- return 0;
- if (BIO_get_shutdown(b)) {
- if (BIO_get_init(b) && BIO_get_data(b))
- bufferevent_free(BIO_get_data(b));
- BIO_free(b);
- }
- return 1;
- }
- /* Called to extract data from the BIO. */
- static int
- bio_bufferevent_read(BIO *b, char *out, int outlen)
- {
- int r = 0;
- struct evbuffer *input;
- BIO_clear_retry_flags(b);
- if (!out)
- return 0;
- if (!BIO_get_data(b))
- return -1;
- input = bufferevent_get_input(BIO_get_data(b));
- if (evbuffer_get_length(input) == 0) {
- /* If there's no data to read, say so. */
- BIO_set_retry_read(b);
- return -1;
- } else {
- r = evbuffer_remove(input, out, outlen);
- }
- return r;
- }
- /* Called to write data into the BIO */
- static int
- bio_bufferevent_write(BIO *b, const char *in, int inlen)
- {
- struct bufferevent *bufev = BIO_get_data(b);
- struct evbuffer *output;
- size_t outlen;
- BIO_clear_retry_flags(b);
- if (!BIO_get_data(b))
- return -1;
- output = bufferevent_get_output(bufev);
- outlen = evbuffer_get_length(output);
- /* Copy only as much data onto the output buffer as can fit under the
- * high-water mark. */
- if (bufev->wm_write.high && bufev->wm_write.high <= (outlen+inlen)) {
- if (bufev->wm_write.high <= outlen) {
- /* If no data can fit, we'll need to retry later. */
- BIO_set_retry_write(b);
- return -1;
- }
- inlen = bufev->wm_write.high - outlen;
- }
- EVUTIL_ASSERT(inlen > 0);
- evbuffer_add(output, in, inlen);
- return inlen;
- }
- /* Called to handle various requests */
- static long
- bio_bufferevent_ctrl(BIO *b, int cmd, long num, void *ptr)
- {
- struct bufferevent *bufev = BIO_get_data(b);
- long ret = 1;
- switch (cmd) {
- case BIO_CTRL_GET_CLOSE:
- ret = BIO_get_shutdown(b);
- break;
- case BIO_CTRL_SET_CLOSE:
- BIO_set_shutdown(b, (int)num);
- break;
- case BIO_CTRL_PENDING:
- ret = evbuffer_get_length(bufferevent_get_input(bufev)) != 0;
- break;
- case BIO_CTRL_WPENDING:
- ret = evbuffer_get_length(bufferevent_get_output(bufev)) != 0;
- break;
- /* XXXX These two are given a special-case treatment because
- * of cargo-cultism. I should come up with a better reason. */
- case BIO_CTRL_DUP:
- case BIO_CTRL_FLUSH:
- ret = 1;
- break;
- default:
- ret = 0;
- break;
- }
- return ret;
- }
- /* Called to write a string to the BIO */
- static int
- bio_bufferevent_puts(BIO *b, const char *s)
- {
- return bio_bufferevent_write(b, s, strlen(s));
- }
- /* Method table for the bufferevent BIO */
- static BIO_METHOD *methods_bufferevent;
- /* Return the method table for the bufferevents BIO */
- static BIO_METHOD *
- BIO_s_bufferevent(void)
- {
- if (methods_bufferevent == NULL) {
- methods_bufferevent = BIO_meth_new(BIO_TYPE_LIBEVENT, "bufferevent");
- if (methods_bufferevent == NULL)
- return NULL;
- BIO_meth_set_write(methods_bufferevent, bio_bufferevent_write);
- BIO_meth_set_read(methods_bufferevent, bio_bufferevent_read);
- BIO_meth_set_puts(methods_bufferevent, bio_bufferevent_puts);
- BIO_meth_set_ctrl(methods_bufferevent, bio_bufferevent_ctrl);
- BIO_meth_set_create(methods_bufferevent, bio_bufferevent_new);
- BIO_meth_set_destroy(methods_bufferevent, bio_bufferevent_free);
- }
- return methods_bufferevent;
- }
- /* Create a new BIO to wrap communication around a bufferevent. If close_flag
- * is true, the bufferevent will be freed when the BIO is closed. */
- static BIO *
- BIO_new_bufferevent(struct bufferevent *bufferevent)
- {
- BIO *result;
- if (!bufferevent)
- return NULL;
- if (!(result = BIO_new(BIO_s_bufferevent())))
- return NULL;
- BIO_set_init(result, 1);
- BIO_set_data(result, bufferevent);
- /* We don't tell the BIO to close the bufferevent; we do it ourselves on
- * be_openssl_destruct() */
- BIO_set_shutdown(result, 0);
- return result;
- }
- /* --------------------
- Now, here's the OpenSSL-based implementation of bufferevent.
- The implementation comes in two flavors: one that connects its SSL object
- to an underlying bufferevent using a BIO_bufferevent, and one that has the
- SSL object connect to a socket directly. The latter should generally be
- faster, except on Windows, where your best bet is using a
- bufferevent_async.
- (OpenSSL supports many other BIO types, too. But we can't use any unless
- we have a good way to get notified when they become readable/writable.)
- -------------------- */
- struct bio_data_counts {
- unsigned long n_written;
- unsigned long n_read;
- };
- struct bufferevent_openssl {
- /* Shared fields with common bufferevent implementation code.
- If we were set up with an underlying bufferevent, we use the
- events here as timers only. If we have an SSL, then we use
- the events as socket events.
- */
- struct bufferevent_private bev;
- /* An underlying bufferevent that we're directing our output to.
- If it's NULL, then we're connected to an fd, not an evbuffer. */
- struct bufferevent *underlying;
- /* The SSL object doing our encryption. */
- SSL *ssl;
- /* A callback that's invoked when data arrives on our outbuf so we
- know to write data to the SSL. */
- struct evbuffer_cb_entry *outbuf_cb;
- /* A count of how much data the bios have read/written total. Used
- for rate-limiting. */
- struct bio_data_counts counts;
- /* If this value is greater than 0, then the last SSL_write blocked,
- * and we need to try it again with this many bytes. */
- ev_ssize_t last_write;
- #define NUM_ERRORS 3
- ev_uint32_t errors[NUM_ERRORS];
- /* When we next get available space, we should say "read" instead of
- "write". This can happen if there's a renegotiation during a read
- operation. */
- unsigned read_blocked_on_write : 1;
- /* When we next get data, we should say "write" instead of "read". */
- unsigned write_blocked_on_read : 1;
- /* Treat TCP close before SSL close on SSL >= v3 as clean EOF. */
- unsigned allow_dirty_shutdown : 1;
- /* XXX */
- unsigned n_errors : 2;
- /* Are we currently connecting, accepting, or doing IO? */
- unsigned state : 2;
- /* If we reset fd, we sould reset state too */
- unsigned old_state : 2;
- };
- static int be_openssl_enable(struct bufferevent *, short);
- static int be_openssl_disable(struct bufferevent *, short);
- static void be_openssl_unlink(struct bufferevent *);
- static void be_openssl_destruct(struct bufferevent *);
- static int be_openssl_adj_timeouts(struct bufferevent *);
- static int be_openssl_flush(struct bufferevent *bufev,
- short iotype, enum bufferevent_flush_mode mode);
- static int be_openssl_ctrl(struct bufferevent *, enum bufferevent_ctrl_op, union bufferevent_ctrl_data *);
- const struct bufferevent_ops bufferevent_ops_openssl = {
- "ssl",
- evutil_offsetof(struct bufferevent_openssl, bev.bev),
- be_openssl_enable,
- be_openssl_disable,
- be_openssl_unlink,
- be_openssl_destruct,
- be_openssl_adj_timeouts,
- be_openssl_flush,
- be_openssl_ctrl,
- };
- /* Given a bufferevent, return a pointer to the bufferevent_openssl that
- * contains it, if any. */
- static inline struct bufferevent_openssl *
- upcast(struct bufferevent *bev)
- {
- struct bufferevent_openssl *bev_o;
- if (!BEV_IS_OPENSSL(bev))
- return NULL;
- bev_o = (void*)( ((char*)bev) -
- evutil_offsetof(struct bufferevent_openssl, bev.bev));
- EVUTIL_ASSERT(BEV_IS_OPENSSL(&bev_o->bev.bev));
- return bev_o;
- }
- static inline void
- put_error(struct bufferevent_openssl *bev_ssl, unsigned long err)
- {
- if (bev_ssl->n_errors == NUM_ERRORS)
- return;
- /* The error type according to openssl is "unsigned long", but
- openssl never uses more than 32 bits of it. It _can't_ use more
- than 32 bits of it, since it needs to report errors on systems
- where long is only 32 bits.
- */
- bev_ssl->errors[bev_ssl->n_errors++] = (ev_uint32_t) err;
- }
- /* Have the base communications channel (either the underlying bufferevent or
- * ev_read and ev_write) start reading. Take the read-blocked-on-write flag
- * into account. */
- static int
- start_reading(struct bufferevent_openssl *bev_ssl)
- {
- if (bev_ssl->underlying) {
- bufferevent_unsuspend_read_(bev_ssl->underlying,
- BEV_SUSPEND_FILT_READ);
- return 0;
- } else {
- struct bufferevent *bev = &bev_ssl->bev.bev;
- int r;
- r = bufferevent_add_event_(&bev->ev_read, &bev->timeout_read);
- if (r == 0 && bev_ssl->read_blocked_on_write)
- r = bufferevent_add_event_(&bev->ev_write,
- &bev->timeout_write);
- return r;
- }
- }
- /* Have the base communications channel (either the underlying bufferevent or
- * ev_read and ev_write) start writing. Take the write-blocked-on-read flag
- * into account. */
- static int
- start_writing(struct bufferevent_openssl *bev_ssl)
- {
- int r = 0;
- if (bev_ssl->underlying) {
- if (bev_ssl->write_blocked_on_read) {
- bufferevent_unsuspend_read_(bev_ssl->underlying,
- BEV_SUSPEND_FILT_READ);
- }
- } else {
- struct bufferevent *bev = &bev_ssl->bev.bev;
- r = bufferevent_add_event_(&bev->ev_write, &bev->timeout_write);
- if (!r && bev_ssl->write_blocked_on_read)
- r = bufferevent_add_event_(&bev->ev_read,
- &bev->timeout_read);
- }
- return r;
- }
- static void
- stop_reading(struct bufferevent_openssl *bev_ssl)
- {
- if (bev_ssl->write_blocked_on_read)
- return;
- if (bev_ssl->underlying) {
- bufferevent_suspend_read_(bev_ssl->underlying,
- BEV_SUSPEND_FILT_READ);
- } else {
- struct bufferevent *bev = &bev_ssl->bev.bev;
- event_del(&bev->ev_read);
- }
- }
- static void
- stop_writing(struct bufferevent_openssl *bev_ssl)
- {
- if (bev_ssl->read_blocked_on_write)
- return;
- if (bev_ssl->underlying) {
- bufferevent_unsuspend_read_(bev_ssl->underlying,
- BEV_SUSPEND_FILT_READ);
- } else {
- struct bufferevent *bev = &bev_ssl->bev.bev;
- event_del(&bev->ev_write);
- }
- }
- static int
- set_rbow(struct bufferevent_openssl *bev_ssl)
- {
- if (!bev_ssl->underlying)
- stop_reading(bev_ssl);
- bev_ssl->read_blocked_on_write = 1;
- return start_writing(bev_ssl);
- }
- static int
- set_wbor(struct bufferevent_openssl *bev_ssl)
- {
- if (!bev_ssl->underlying)
- stop_writing(bev_ssl);
- bev_ssl->write_blocked_on_read = 1;
- return start_reading(bev_ssl);
- }
- static int
- clear_rbow(struct bufferevent_openssl *bev_ssl)
- {
- struct bufferevent *bev = &bev_ssl->bev.bev;
- int r = 0;
- bev_ssl->read_blocked_on_write = 0;
- if (!(bev->enabled & EV_WRITE))
- stop_writing(bev_ssl);
- if (bev->enabled & EV_READ)
- r = start_reading(bev_ssl);
- return r;
- }
- static int
- clear_wbor(struct bufferevent_openssl *bev_ssl)
- {
- struct bufferevent *bev = &bev_ssl->bev.bev;
- int r = 0;
- bev_ssl->write_blocked_on_read = 0;
- if (!(bev->enabled & EV_READ))
- stop_reading(bev_ssl);
- if (bev->enabled & EV_WRITE)
- r = start_writing(bev_ssl);
- return r;
- }
- static void
- conn_closed(struct bufferevent_openssl *bev_ssl, int when, int errcode, int ret)
- {
- int event = BEV_EVENT_ERROR;
- int dirty_shutdown = 0;
- unsigned long err;
- switch (errcode) {
- case SSL_ERROR_ZERO_RETURN:
- /* Possibly a clean shutdown. */
- if (SSL_get_shutdown(bev_ssl->ssl) & SSL_RECEIVED_SHUTDOWN)
- event = BEV_EVENT_EOF;
- else
- dirty_shutdown = 1;
- break;
- case SSL_ERROR_SYSCALL:
- /* IO error; possibly a dirty shutdown. */
- if ((ret == 0 || ret == -1) && ERR_peek_error() == 0)
- dirty_shutdown = 1;
- put_error(bev_ssl, errcode);
- break;
- case SSL_ERROR_SSL:
- /* Protocol error. */
- put_error(bev_ssl, errcode);
- break;
- case SSL_ERROR_WANT_X509_LOOKUP:
- /* XXXX handle this. */
- put_error(bev_ssl, errcode);
- break;
- case SSL_ERROR_NONE:
- case SSL_ERROR_WANT_READ:
- case SSL_ERROR_WANT_WRITE:
- case SSL_ERROR_WANT_CONNECT:
- case SSL_ERROR_WANT_ACCEPT:
- default:
- /* should be impossible; treat as normal error. */
- event_warnx("BUG: Unexpected OpenSSL error code %d", errcode);
- break;
- }
- while ((err = ERR_get_error())) {
- put_error(bev_ssl, err);
- }
- if (dirty_shutdown && bev_ssl->allow_dirty_shutdown)
- event = BEV_EVENT_EOF;
- stop_reading(bev_ssl);
- stop_writing(bev_ssl);
- /* when is BEV_EVENT_{READING|WRITING} */
- event = when | event;
- bufferevent_run_eventcb_(&bev_ssl->bev.bev, event, 0);
- }
- static void
- init_bio_counts(struct bufferevent_openssl *bev_ssl)
- {
- BIO *rbio, *wbio;
- wbio = SSL_get_wbio(bev_ssl->ssl);
- bev_ssl->counts.n_written = wbio ? BIO_number_written(wbio) : 0;
- rbio = SSL_get_rbio(bev_ssl->ssl);
- bev_ssl->counts.n_read = rbio ? BIO_number_read(rbio) : 0;
- }
- static inline void
- decrement_buckets(struct bufferevent_openssl *bev_ssl)
- {
- unsigned long num_w = BIO_number_written(SSL_get_wbio(bev_ssl->ssl));
- unsigned long num_r = BIO_number_read(SSL_get_rbio(bev_ssl->ssl));
- /* These next two subtractions can wrap around. That's okay. */
- unsigned long w = num_w - bev_ssl->counts.n_written;
- unsigned long r = num_r - bev_ssl->counts.n_read;
- if (w)
- bufferevent_decrement_write_buckets_(&bev_ssl->bev, w);
- if (r)
- bufferevent_decrement_read_buckets_(&bev_ssl->bev, r);
- bev_ssl->counts.n_written = num_w;
- bev_ssl->counts.n_read = num_r;
- }
- #define OP_MADE_PROGRESS 1
- #define OP_BLOCKED 2
- #define OP_ERR 4
- /* Return a bitmask of OP_MADE_PROGRESS (if we read anything); OP_BLOCKED (if
- we're now blocked); and OP_ERR (if an error occurred). */
- static int
- do_read(struct bufferevent_openssl *bev_ssl, int n_to_read) {
- /* Requires lock */
- struct bufferevent *bev = &bev_ssl->bev.bev;
- struct evbuffer *input = bev->input;
- int r, n, i, n_used = 0, atmost;
- struct evbuffer_iovec space[2];
- int result = 0;
- if (bev_ssl->bev.read_suspended)
- return 0;
- atmost = bufferevent_get_read_max_(&bev_ssl->bev);
- if (n_to_read > atmost)
- n_to_read = atmost;
- n = evbuffer_reserve_space(input, n_to_read, space, 2);
- if (n < 0)
- return OP_ERR;
- for (i=0; i<n; ++i) {
- if (bev_ssl->bev.read_suspended)
- break;
- ERR_clear_error();
- r = SSL_read(bev_ssl->ssl, space[i].iov_base, space[i].iov_len);
- if (r>0) {
- result |= OP_MADE_PROGRESS;
- if (bev_ssl->read_blocked_on_write)
- if (clear_rbow(bev_ssl) < 0)
- return OP_ERR | result;
- ++n_used;
- space[i].iov_len = r;
- decrement_buckets(bev_ssl);
- } else {
- int err = SSL_get_error(bev_ssl->ssl, r);
- print_err(err);
- switch (err) {
- case SSL_ERROR_WANT_READ:
- /* Can't read until underlying has more data. */
- if (bev_ssl->read_blocked_on_write)
- if (clear_rbow(bev_ssl) < 0)
- return OP_ERR | result;
- break;
- case SSL_ERROR_WANT_WRITE:
- /* This read operation requires a write, and the
- * underlying is full */
- if (!bev_ssl->read_blocked_on_write)
- if (set_rbow(bev_ssl) < 0)
- return OP_ERR | result;
- break;
- default:
- conn_closed(bev_ssl, BEV_EVENT_READING, err, r);
- break;
- }
- result |= OP_BLOCKED;
- break; /* out of the loop */
- }
- }
- if (n_used) {
- evbuffer_commit_space(input, space, n_used);
- if (bev_ssl->underlying)
- BEV_RESET_GENERIC_READ_TIMEOUT(bev);
- }
- return result;
- }
- /* Return a bitmask of OP_MADE_PROGRESS (if we wrote anything); OP_BLOCKED (if
- we're now blocked); and OP_ERR (if an error occurred). */
- static int
- do_write(struct bufferevent_openssl *bev_ssl, int atmost)
- {
- int i, r, n, n_written = 0;
- struct bufferevent *bev = &bev_ssl->bev.bev;
- struct evbuffer *output = bev->output;
- struct evbuffer_iovec space[8];
- int result = 0;
- if (bev_ssl->last_write > 0)
- atmost = bev_ssl->last_write;
- else
- atmost = bufferevent_get_write_max_(&bev_ssl->bev);
- n = evbuffer_peek(output, atmost, NULL, space, 8);
- if (n < 0)
- return OP_ERR | result;
- if (n > 8)
- n = 8;
- for (i=0; i < n; ++i) {
- if (bev_ssl->bev.write_suspended)
- break;
- /* SSL_write will (reasonably) return 0 if we tell it to
- send 0 data. Skip this case so we don't interpret the
- result as an error */
- if (space[i].iov_len == 0)
- continue;
- ERR_clear_error();
- r = SSL_write(bev_ssl->ssl, space[i].iov_base,
- space[i].iov_len);
- if (r > 0) {
- result |= OP_MADE_PROGRESS;
- if (bev_ssl->write_blocked_on_read)
- if (clear_wbor(bev_ssl) < 0)
- return OP_ERR | result;
- n_written += r;
- bev_ssl->last_write = -1;
- decrement_buckets(bev_ssl);
- } else {
- int err = SSL_get_error(bev_ssl->ssl, r);
- print_err(err);
- switch (err) {
- case SSL_ERROR_WANT_WRITE:
- /* Can't read until underlying has more data. */
- if (bev_ssl->write_blocked_on_read)
- if (clear_wbor(bev_ssl) < 0)
- return OP_ERR | result;
- bev_ssl->last_write = space[i].iov_len;
- break;
- case SSL_ERROR_WANT_READ:
- /* This read operation requires a write, and the
- * underlying is full */
- if (!bev_ssl->write_blocked_on_read)
- if (set_wbor(bev_ssl) < 0)
- return OP_ERR | result;
- bev_ssl->last_write = space[i].iov_len;
- break;
- default:
- conn_closed(bev_ssl, BEV_EVENT_WRITING, err, r);
- bev_ssl->last_write = -1;
- break;
- }
- result |= OP_BLOCKED;
- break;
- }
- }
- if (n_written) {
- evbuffer_drain(output, n_written);
- if (bev_ssl->underlying)
- BEV_RESET_GENERIC_WRITE_TIMEOUT(bev);
- bufferevent_trigger_nolock_(bev, EV_WRITE, BEV_OPT_DEFER_CALLBACKS);
- }
- return result;
- }
- #define WRITE_FRAME 15000
- #define READ_DEFAULT 4096
- /* Try to figure out how many bytes to read; return 0 if we shouldn't be
- * reading. */
- static int
- bytes_to_read(struct bufferevent_openssl *bev)
- {
- struct evbuffer *input = bev->bev.bev.input;
- struct event_watermark *wm = &bev->bev.bev.wm_read;
- int result = READ_DEFAULT;
- ev_ssize_t limit;
- /* XXX 99% of this is generic code that nearly all bufferevents will
- * want. */
- if (bev->write_blocked_on_read) {
- return 0;
- }
- if (! (bev->bev.bev.enabled & EV_READ)) {
- return 0;
- }
- if (bev->bev.read_suspended) {
- return 0;
- }
- if (wm->high) {
- if (evbuffer_get_length(input) >= wm->high) {
- return 0;
- }
- result = wm->high - evbuffer_get_length(input);
- } else {
- result = READ_DEFAULT;
- }
- /* Respect the rate limit */
- limit = bufferevent_get_read_max_(&bev->bev);
- if (result > limit) {
- result = limit;
- }
- return result;
- }
- /* Things look readable. If write is blocked on read, write till it isn't.
- * Read from the underlying buffer until we block or we hit our high-water
- * mark.
- */
- static void
- consider_reading(struct bufferevent_openssl *bev_ssl)
- {
- int r;
- int n_to_read;
- int all_result_flags = 0;
- while (bev_ssl->write_blocked_on_read) {
- r = do_write(bev_ssl, WRITE_FRAME);
- if (r & (OP_BLOCKED|OP_ERR))
- break;
- }
- if (bev_ssl->write_blocked_on_read)
- return;
- n_to_read = bytes_to_read(bev_ssl);
- while (n_to_read) {
- r = do_read(bev_ssl, n_to_read);
- all_result_flags |= r;
- if (r & (OP_BLOCKED|OP_ERR))
- break;
- if (bev_ssl->bev.read_suspended)
- break;
- /* Read all pending data. This won't hit the network
- * again, and will (most importantly) put us in a state
- * where we don't need to read anything else until the
- * socket is readable again. It'll potentially make us
- * overrun our read high-watermark (somewhat
- * regrettable). The damage to the rate-limit has
- * already been done, since OpenSSL went and read a
- * whole SSL record anyway. */
- n_to_read = SSL_pending(bev_ssl->ssl);
- /* XXX This if statement is actually a bad bug, added to avoid
- * XXX a worse bug.
- *
- * The bad bug: It can potentially cause resource unfairness
- * by reading too much data from the underlying bufferevent;
- * it can potentially cause read looping if the underlying
- * bufferevent is a bufferevent_pair and deferred callbacks
- * aren't used.
- *
- * The worse bug: If we didn't do this, then we would
- * potentially not read any more from bev_ssl->underlying
- * until more data arrived there, which could lead to us
- * waiting forever.
- */
- if (!n_to_read && bev_ssl->underlying)
- n_to_read = bytes_to_read(bev_ssl);
- }
- if (all_result_flags & OP_MADE_PROGRESS) {
- struct bufferevent *bev = &bev_ssl->bev.bev;
- bufferevent_trigger_nolock_(bev, EV_READ, 0);
- }
- if (!bev_ssl->underlying) {
- /* Should be redundant, but let's avoid busy-looping */
- if (bev_ssl->bev.read_suspended ||
- !(bev_ssl->bev.bev.enabled & EV_READ)) {
- event_del(&bev_ssl->bev.bev.ev_read);
- }
- }
- }
- static void
- consider_writing(struct bufferevent_openssl *bev_ssl)
- {
- int r;
- struct evbuffer *output = bev_ssl->bev.bev.output;
- struct evbuffer *target = NULL;
- struct event_watermark *wm = NULL;
- while (bev_ssl->read_blocked_on_write) {
- r = do_read(bev_ssl, 1024); /* XXXX 1024 is a hack */
- if (r & OP_MADE_PROGRESS) {
- struct bufferevent *bev = &bev_ssl->bev.bev;
- bufferevent_trigger_nolock_(bev, EV_READ, 0);
- }
- if (r & (OP_ERR|OP_BLOCKED))
- break;
- }
- if (bev_ssl->read_blocked_on_write)
- return;
- if (bev_ssl->underlying) {
- target = bev_ssl->underlying->output;
- wm = &bev_ssl->underlying->wm_write;
- }
- while ((bev_ssl->bev.bev.enabled & EV_WRITE) &&
- (! bev_ssl->bev.write_suspended) &&
- evbuffer_get_length(output) &&
- (!target || (! wm->high || evbuffer_get_length(target) < wm->high))) {
- int n_to_write;
- if (wm && wm->high)
- n_to_write = wm->high - evbuffer_get_length(target);
- else
- n_to_write = WRITE_FRAME;
- r = do_write(bev_ssl, n_to_write);
- if (r & (OP_BLOCKED|OP_ERR))
- break;
- }
- if (!bev_ssl->underlying) {
- if (evbuffer_get_length(output) == 0) {
- event_del(&bev_ssl->bev.bev.ev_write);
- } else if (bev_ssl->bev.write_suspended ||
- !(bev_ssl->bev.bev.enabled & EV_WRITE)) {
- /* Should be redundant, but let's avoid busy-looping */
- event_del(&bev_ssl->bev.bev.ev_write);
- }
- }
- }
- static void
- be_openssl_readcb(struct bufferevent *bev_base, void *ctx)
- {
- struct bufferevent_openssl *bev_ssl = ctx;
- consider_reading(bev_ssl);
- }
- static void
- be_openssl_writecb(struct bufferevent *bev_base, void *ctx)
- {
- struct bufferevent_openssl *bev_ssl = ctx;
- consider_writing(bev_ssl);
- }
- static void
- be_openssl_eventcb(struct bufferevent *bev_base, short what, void *ctx)
- {
- struct bufferevent_openssl *bev_ssl = ctx;
- int event = 0;
- if (what & BEV_EVENT_EOF) {
- if (bev_ssl->allow_dirty_shutdown)
- event = BEV_EVENT_EOF;
- else
- event = BEV_EVENT_ERROR;
- } else if (what & BEV_EVENT_TIMEOUT) {
- /* We sure didn't set this. Propagate it to the user. */
- event = what;
- } else if (what & BEV_EVENT_ERROR) {
- /* An error occurred on the connection. Propagate it to the user. */
- event = what;
- } else if (what & BEV_EVENT_CONNECTED) {
- /* Ignore it. We're saying SSL_connect() already, which will
- eat it. */
- }
- if (event)
- bufferevent_run_eventcb_(&bev_ssl->bev.bev, event, 0);
- }
- static void
- be_openssl_readeventcb(evutil_socket_t fd, short what, void *ptr)
- {
- struct bufferevent_openssl *bev_ssl = ptr;
- bufferevent_incref_and_lock_(&bev_ssl->bev.bev);
- if (what == EV_TIMEOUT) {
- bufferevent_run_eventcb_(&bev_ssl->bev.bev,
- BEV_EVENT_TIMEOUT|BEV_EVENT_READING, 0);
- } else {
- consider_reading(bev_ssl);
- }
- bufferevent_decref_and_unlock_(&bev_ssl->bev.bev);
- }
- static void
- be_openssl_writeeventcb(evutil_socket_t fd, short what, void *ptr)
- {
- struct bufferevent_openssl *bev_ssl = ptr;
- bufferevent_incref_and_lock_(&bev_ssl->bev.bev);
- if (what == EV_TIMEOUT) {
- bufferevent_run_eventcb_(&bev_ssl->bev.bev,
- BEV_EVENT_TIMEOUT|BEV_EVENT_WRITING, 0);
- } else {
- consider_writing(bev_ssl);
- }
- bufferevent_decref_and_unlock_(&bev_ssl->bev.bev);
- }
- static evutil_socket_t
- be_openssl_auto_fd(struct bufferevent_openssl *bev_ssl, evutil_socket_t fd)
- {
- if (!bev_ssl->underlying) {
- struct bufferevent *bev = &bev_ssl->bev.bev;
- if (event_initialized(&bev->ev_read) && fd < 0) {
- fd = event_get_fd(&bev->ev_read);
- }
- }
- return fd;
- }
- static int
- set_open_callbacks(struct bufferevent_openssl *bev_ssl, evutil_socket_t fd)
- {
- if (bev_ssl->underlying) {
- bufferevent_setcb(bev_ssl->underlying,
- be_openssl_readcb, be_openssl_writecb, be_openssl_eventcb,
- bev_ssl);
- return 0;
- } else {
- struct bufferevent *bev = &bev_ssl->bev.bev;
- int rpending=0, wpending=0, r1=0, r2=0;
- if (event_initialized(&bev->ev_read)) {
- rpending = event_pending(&bev->ev_read, EV_READ, NULL);
- wpending = event_pending(&bev->ev_write, EV_WRITE, NULL);
- event_del(&bev->ev_read);
- event_del(&bev->ev_write);
- }
- event_assign(&bev->ev_read, bev->ev_base, fd,
- EV_READ|EV_PERSIST|EV_FINALIZE,
- be_openssl_readeventcb, bev_ssl);
- event_assign(&bev->ev_write, bev->ev_base, fd,
- EV_WRITE|EV_PERSIST|EV_FINALIZE,
- be_openssl_writeeventcb, bev_ssl);
- if (rpending)
- r1 = bufferevent_add_event_(&bev->ev_read, &bev->timeout_read);
- if (wpending)
- r2 = bufferevent_add_event_(&bev->ev_write, &bev->timeout_write);
- return (r1<0 || r2<0) ? -1 : 0;
- }
- }
- static int
- do_handshake(struct bufferevent_openssl *bev_ssl)
- {
- int r;
- switch (bev_ssl->state) {
- default:
- case BUFFEREVENT_SSL_OPEN:
- EVUTIL_ASSERT(0);
- return -1;
- case BUFFEREVENT_SSL_CONNECTING:
- case BUFFEREVENT_SSL_ACCEPTING:
- ERR_clear_error();
- r = SSL_do_handshake(bev_ssl->ssl);
- break;
- }
- decrement_buckets(bev_ssl);
- if (r==1) {
- evutil_socket_t fd = event_get_fd(&bev_ssl->bev.bev.ev_read);
- /* We're done! */
- bev_ssl->state = BUFFEREVENT_SSL_OPEN;
- set_open_callbacks(bev_ssl, fd); /* XXXX handle failure */
- /* Call do_read and do_write as needed */
- bufferevent_enable(&bev_ssl->bev.bev, bev_ssl->bev.bev.enabled);
- bufferevent_run_eventcb_(&bev_ssl->bev.bev,
- BEV_EVENT_CONNECTED, 0);
- return 1;
- } else {
- int err = SSL_get_error(bev_ssl->ssl, r);
- print_err(err);
- switch (err) {
- case SSL_ERROR_WANT_WRITE:
- stop_reading(bev_ssl);
- return start_writing(bev_ssl);
- case SSL_ERROR_WANT_READ:
- stop_writing(bev_ssl);
- return start_reading(bev_ssl);
- default:
- conn_closed(bev_ssl, BEV_EVENT_READING, err, r);
- return -1;
- }
- }
- }
- static void
- be_openssl_handshakecb(struct bufferevent *bev_base, void *ctx)
- {
- struct bufferevent_openssl *bev_ssl = ctx;
- do_handshake(bev_ssl);/* XXX handle failure */
- }
- static void
- be_openssl_handshakeeventcb(evutil_socket_t fd, short what, void *ptr)
- {
- struct bufferevent_openssl *bev_ssl = ptr;
- bufferevent_incref_and_lock_(&bev_ssl->bev.bev);
- if (what & EV_TIMEOUT) {
- bufferevent_run_eventcb_(&bev_ssl->bev.bev, BEV_EVENT_TIMEOUT, 0);
- } else
- do_handshake(bev_ssl);/* XXX handle failure */
- bufferevent_decref_and_unlock_(&bev_ssl->bev.bev);
- }
- static int
- set_handshake_callbacks(struct bufferevent_openssl *bev_ssl, evutil_socket_t fd)
- {
- if (bev_ssl->underlying) {
- bufferevent_setcb(bev_ssl->underlying,
- be_openssl_handshakecb, be_openssl_handshakecb,
- be_openssl_eventcb,
- bev_ssl);
- if (fd < 0)
- return 0;
- if (bufferevent_setfd(bev_ssl->underlying, fd))
- return 1;
- return do_handshake(bev_ssl);
- } else {
- struct bufferevent *bev = &bev_ssl->bev.bev;
- if (event_initialized(&bev->ev_read)) {
- event_del(&bev->ev_read);
- event_del(&bev->ev_write);
- }
- event_assign(&bev->ev_read, bev->ev_base, fd,
- EV_READ|EV_PERSIST|EV_FINALIZE,
- be_openssl_handshakeeventcb, bev_ssl);
- event_assign(&bev->ev_write, bev->ev_base, fd,
- EV_WRITE|EV_PERSIST|EV_FINALIZE,
- be_openssl_handshakeeventcb, bev_ssl);
- if (fd >= 0)
- bufferevent_enable(bev, bev->enabled);
- return 0;
- }
- }
- int
- bufferevent_ssl_renegotiate(struct bufferevent *bev)
- {
- struct bufferevent_openssl *bev_ssl = upcast(bev);
- if (!bev_ssl)
- return -1;
- if (SSL_renegotiate(bev_ssl->ssl) < 0)
- return -1;
- bev_ssl->state = BUFFEREVENT_SSL_CONNECTING;
- if (set_handshake_callbacks(bev_ssl, be_openssl_auto_fd(bev_ssl, -1)) < 0)
- return -1;
- if (!bev_ssl->underlying)
- return do_handshake(bev_ssl);
- return 0;
- }
- static void
- be_openssl_outbuf_cb(struct evbuffer *buf,
- const struct evbuffer_cb_info *cbinfo, void *arg)
- {
- struct bufferevent_openssl *bev_ssl = arg;
- int r = 0;
- /* XXX need to hold a reference here. */
- if (cbinfo->n_added && bev_ssl->state == BUFFEREVENT_SSL_OPEN) {
- if (cbinfo->orig_size == 0)
- r = bufferevent_add_event_(&bev_ssl->bev.bev.ev_write,
- &bev_ssl->bev.bev.timeout_write);
- if (bev_ssl->underlying)
- consider_writing(bev_ssl);
- }
- /* XXX Handle r < 0 */
- (void)r;
- }
- static int
- be_openssl_enable(struct bufferevent *bev, short events)
- {
- struct bufferevent_openssl *bev_ssl = upcast(bev);
- int r1 = 0, r2 = 0;
- if (events & EV_READ)
- r1 = start_reading(bev_ssl);
- if (events & EV_WRITE)
- r2 = start_writing(bev_ssl);
- if (bev_ssl->underlying) {
- if (events & EV_READ)
- BEV_RESET_GENERIC_READ_TIMEOUT(bev);
- if (events & EV_WRITE)
- BEV_RESET_GENERIC_WRITE_TIMEOUT(bev);
- if (events & EV_READ)
- consider_reading(bev_ssl);
- if (events & EV_WRITE)
- consider_writing(bev_ssl);
- }
- return (r1 < 0 || r2 < 0) ? -1 : 0;
- }
- static int
- be_openssl_disable(struct bufferevent *bev, short events)
- {
- struct bufferevent_openssl *bev_ssl = upcast(bev);
- if (events & EV_READ)
- stop_reading(bev_ssl);
- if (events & EV_WRITE)
- stop_writing(bev_ssl);
- if (bev_ssl->underlying) {
- if (events & EV_READ)
- BEV_DEL_GENERIC_READ_TIMEOUT(bev);
- if (events & EV_WRITE)
- BEV_DEL_GENERIC_WRITE_TIMEOUT(bev);
- }
- return 0;
- }
- static void
- be_openssl_unlink(struct bufferevent *bev)
- {
- struct bufferevent_openssl *bev_ssl = upcast(bev);
- if (bev_ssl->bev.options & BEV_OPT_CLOSE_ON_FREE) {
- if (bev_ssl->underlying) {
- if (BEV_UPCAST(bev_ssl->underlying)->refcnt < 2) {
- event_warnx("BEV_OPT_CLOSE_ON_FREE set on an "
- "bufferevent with too few references");
- } else {
- bufferevent_free(bev_ssl->underlying);
- /* We still have a reference to it, via our
- * BIO. So we don't drop this. */
- // bev_ssl->underlying = NULL;
- }
- }
- } else {
- if (bev_ssl->underlying) {
- if (bev_ssl->underlying->errorcb == be_openssl_eventcb)
- bufferevent_setcb(bev_ssl->underlying,
- NULL,NULL,NULL,NULL);
- bufferevent_unsuspend_read_(bev_ssl->underlying,
- BEV_SUSPEND_FILT_READ);
- }
- }
- }
- static void
- be_openssl_destruct(struct bufferevent *bev)
- {
- struct bufferevent_openssl *bev_ssl = upcast(bev);
- if (bev_ssl->bev.options & BEV_OPT_CLOSE_ON_FREE) {
- if (! bev_ssl->underlying) {
- evutil_socket_t fd = EVUTIL_INVALID_SOCKET;
- BIO *bio = SSL_get_wbio(bev_ssl->ssl);
- if (bio)
- fd = BIO_get_fd(bio, NULL);
- if (fd >= 0)
- evutil_closesocket(fd);
- }
- SSL_free(bev_ssl->ssl);
- }
- }
- static int
- be_openssl_adj_timeouts(struct bufferevent *bev)
- {
- struct bufferevent_openssl *bev_ssl = upcast(bev);
- if (bev_ssl->underlying) {
- return bufferevent_generic_adj_timeouts_(bev);
- } else {
- return bufferevent_generic_adj_existing_timeouts_(bev);
- }
- }
- static int
- be_openssl_flush(struct bufferevent *bufev,
- short iotype, enum bufferevent_flush_mode mode)
- {
- /* XXXX Implement this. */
- return 0;
- }
- static int
- be_openssl_set_fd(struct bufferevent_openssl *bev_ssl,
- enum bufferevent_ssl_state state, evutil_socket_t fd)
- {
- bev_ssl->state = state;
- switch (state) {
- case BUFFEREVENT_SSL_ACCEPTING:
- if (!SSL_clear(bev_ssl->ssl))
- return -1;
- SSL_set_accept_state(bev_ssl->ssl);
- if (set_handshake_callbacks(bev_ssl, fd) < 0)
- return -1;
- break;
- case BUFFEREVENT_SSL_CONNECTING:
- if (!SSL_clear(bev_ssl->ssl))
- return -1;
- SSL_set_connect_state(bev_ssl->ssl);
- if (set_handshake_callbacks(bev_ssl, fd) < 0)
- return -1;
- break;
- case BUFFEREVENT_SSL_OPEN:
- if (set_open_callbacks(bev_ssl, fd) < 0)
- return -1;
- break;
- default:
- return -1;
- }
- return 0;
- }
- static int
- be_openssl_ctrl(struct bufferevent *bev,
- enum bufferevent_ctrl_op op, union bufferevent_ctrl_data *data)
- {
- struct bufferevent_openssl *bev_ssl = upcast(bev);
- switch (op) {
- case BEV_CTRL_SET_FD:
- if (!bev_ssl->underlying) {
- BIO *bio;
- bio = BIO_new_socket((int)data->fd, 0);
- SSL_set_bio(bev_ssl->ssl, bio, bio);
- } else {
- BIO *bio;
- if (!(bio = BIO_new_bufferevent(bev_ssl->underlying)))
- return -1;
- SSL_set_bio(bev_ssl->ssl, bio, bio);
- }
- return be_openssl_set_fd(bev_ssl, bev_ssl->old_state, data->fd);
- case BEV_CTRL_GET_FD:
- if (bev_ssl->underlying) {
- data->fd = event_get_fd(&bev_ssl->underlying->ev_read);
- } else {
- data->fd = event_get_fd(&bev->ev_read);
- }
- return 0;
- case BEV_CTRL_GET_UNDERLYING:
- data->ptr = bev_ssl->underlying;
- return 0;
- case BEV_CTRL_CANCEL_ALL:
- default:
- return -1;
- }
- }
- SSL *
- bufferevent_openssl_get_ssl(struct bufferevent *bufev)
- {
- struct bufferevent_openssl *bev_ssl = upcast(bufev);
- if (!bev_ssl)
- return NULL;
- return bev_ssl->ssl;
- }
- static struct bufferevent *
- bufferevent_openssl_new_impl(struct event_base *base,
- struct bufferevent *underlying,
- evutil_socket_t fd,
- SSL *ssl,
- enum bufferevent_ssl_state state,
- int options)
- {
- struct bufferevent_openssl *bev_ssl = NULL;
- struct bufferevent_private *bev_p = NULL;
- int tmp_options = options & ~BEV_OPT_THREADSAFE;
- /* Only one can be set. */
- if (underlying != NULL && fd >= 0)
- goto err;
- if (!(bev_ssl = mm_calloc(1, sizeof(struct bufferevent_openssl))))
- goto err;
- bev_p = &bev_ssl->bev;
- if (bufferevent_init_common_(bev_p, base,
- &bufferevent_ops_openssl, tmp_options) < 0)
- goto err;
- /* Don't explode if we decide to realloc a chunk we're writing from in
- * the output buffer. */
- SSL_set_mode(ssl, SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER);
- bev_ssl->underlying = underlying;
- bev_ssl->ssl = ssl;
- bev_ssl->outbuf_cb = evbuffer_add_cb(bev_p->bev.output,
- be_openssl_outbuf_cb, bev_ssl);
- if (options & BEV_OPT_THREADSAFE)
- bufferevent_enable_locking_(&bev_ssl->bev.bev, NULL);
- if (underlying) {
- bufferevent_init_generic_timeout_cbs_(&bev_ssl->bev.bev);
- bufferevent_incref_(underlying);
- }
- bev_ssl->old_state = state;
- bev_ssl->last_write = -1;
- init_bio_counts(bev_ssl);
- fd = be_openssl_auto_fd(bev_ssl, fd);
- if (be_openssl_set_fd(bev_ssl, state, fd))
- goto err;
- if (underlying) {
- bufferevent_setwatermark(underlying, EV_READ, 0, 0);
- bufferevent_enable(underlying, EV_READ|EV_WRITE);
- if (state == BUFFEREVENT_SSL_OPEN)
- bufferevent_suspend_read_(underlying,
- BEV_SUSPEND_FILT_READ);
- }
- return &bev_ssl->bev.bev;
- err:
- if (options & BEV_OPT_CLOSE_ON_FREE)
- SSL_free(ssl);
- if (bev_ssl) {
- bev_ssl->ssl = NULL;
- bufferevent_free(&bev_ssl->bev.bev);
- }
- return NULL;
- }
- struct bufferevent *
- bufferevent_openssl_filter_new(struct event_base *base,
- struct bufferevent *underlying,
- SSL *ssl,
- enum bufferevent_ssl_state state,
- int options)
- {
- BIO *bio;
- struct bufferevent *bev;
- if (!underlying)
- goto err;
- if (!(bio = BIO_new_bufferevent(underlying)))
- goto err;
- SSL_set_bio(ssl, bio, bio);
- bev = bufferevent_openssl_new_impl(
- base, underlying, -1, ssl, state, options);
- return bev;
- err:
- if (options & BEV_OPT_CLOSE_ON_FREE)
- SSL_free(ssl);
- return NULL;
- }
- struct bufferevent *
- bufferevent_openssl_socket_new(struct event_base *base,
- evutil_socket_t fd,
- SSL *ssl,
- enum bufferevent_ssl_state state,
- int options)
- {
- /* Does the SSL already have an fd? */
- BIO *bio = SSL_get_wbio(ssl);
- long have_fd = -1;
- if (bio)
- have_fd = BIO_get_fd(bio, NULL);
- if (have_fd >= 0) {
- /* The SSL is already configured with an fd. */
- if (fd < 0) {
- /* We should learn the fd from the SSL. */
- fd = (evutil_socket_t) have_fd;
- } else if (have_fd == (long)fd) {
- /* We already know the fd from the SSL; do nothing */
- } else {
- /* We specified an fd different from that of the SSL.
- This is probably an error on our part. Fail. */
- goto err;
- }
- BIO_set_close(bio, 0);
- } else {
- /* The SSL isn't configured with a BIO with an fd. */
- if (fd >= 0) {
- /* ... and we have an fd we want to use. */
- bio = BIO_new_socket((int)fd, 0);
- SSL_set_bio(ssl, bio, bio);
- } else {
- /* Leave the fd unset. */
- }
- }
- return bufferevent_openssl_new_impl(
- base, NULL, fd, ssl, state, options);
- err:
- if (options & BEV_OPT_CLOSE_ON_FREE)
- SSL_free(ssl);
- return NULL;
- }
- int
- bufferevent_openssl_get_allow_dirty_shutdown(struct bufferevent *bev)
- {
- int allow_dirty_shutdown = -1;
- struct bufferevent_openssl *bev_ssl;
- BEV_LOCK(bev);
- bev_ssl = upcast(bev);
- if (bev_ssl)
- allow_dirty_shutdown = bev_ssl->allow_dirty_shutdown;
- BEV_UNLOCK(bev);
- return allow_dirty_shutdown;
- }
- void
- bufferevent_openssl_set_allow_dirty_shutdown(struct bufferevent *bev,
- int allow_dirty_shutdown)
- {
- struct bufferevent_openssl *bev_ssl;
- BEV_LOCK(bev);
- bev_ssl = upcast(bev);
- if (bev_ssl)
- bev_ssl->allow_dirty_shutdown = !!allow_dirty_shutdown;
- BEV_UNLOCK(bev);
- }
- unsigned long
- bufferevent_get_openssl_error(struct bufferevent *bev)
- {
- unsigned long err = 0;
- struct bufferevent_openssl *bev_ssl;
- BEV_LOCK(bev);
- bev_ssl = upcast(bev);
- if (bev_ssl && bev_ssl->n_errors) {
- err = bev_ssl->errors[--bev_ssl->n_errors];
- }
- BEV_UNLOCK(bev);
- return err;
- }
|