axmol/thirdparty/yasio/core/openssl_impl.hpp

304 lines
9.0 KiB
C++

//////////////////////////////////////////////////////////////////////////////////////////
// A multi-platform support c++11 library with focus on asynchronous socket I/O for any
// client application.
//////////////////////////////////////////////////////////////////////////////////////////
/*
The MIT License (MIT)
Copyright (c) 2012-2023 HALX99
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
*/
#ifndef YASIO__OPENSSL_IMPL_HPP
#define YASIO__OPENSSL_IMPL_HPP
#if YASIO_SSL_BACKEND == 1 // OpenSSL
// The ssl error mask (1 << 31), a little hack, but works
# define YSSL_ERR_MASK 0x80000000
YASIO__DECL yssl_ctx_st* yssl_ctx_new(const yssl_options& opts)
{
auto ctx = ::SSL_CTX_new(opts.client ? ::SSLv23_client_method() : SSLv23_server_method());
auto mode = SSL_CTX_get_mode(ctx);
# if defined(SSL_MODE_RELEASE_BUFFERS)
mode |= SSL_MODE_RELEASE_BUFFERS;
# endif
::SSL_CTX_set_mode(ctx, SSL_MODE_ENABLE_PARTIAL_WRITE | mode);
if (opts.client)
{
int fail_count = -1;
if (yasio__valid_str(opts.crtfile_))
{
fail_count = 0;
yssl_splitpath(opts.crtfile_, [&](char* first, char* last) {
yssl_split_term null_term(last);
# if defined(OPENSSL_VERSION_MAJOR) && (OPENSSL_VERSION_MAJOR >= 3)
/* OpenSSL 3.0.0 has deprecated SSL_CTX_load_verify_locations */
bool ok = ::SSL_CTX_load_verify_file(ctx, first) == 1;
# else
bool ok = ::SSL_CTX_load_verify_locations(ctx, first, nullptr) == 1;
# endif
if (!ok)
{
++fail_count;
YASIO_LOG("[global] load ca certifaction file failed!");
}
return !ok;
});
}
if (!fail_count)
{
::SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, ::SSL_CTX_get_verify_callback(ctx));
# if OPENSSL_VERSION_NUMBER >= 0x10101000L
::SSL_CTX_set_post_handshake_auth(ctx, 1);
# endif
# if defined(X509_V_FLAG_PARTIAL_CHAIN)
/* Have intermediate certificates in the trust store be treated as
trust-anchors, in the same way as self-signed root CA certificates
are. This allows users to verify servers using the intermediate cert
only, instead of needing the whole chain. */
::X509_STORE_set_flags(::SSL_CTX_get_cert_store(ctx), X509_V_FLAG_PARTIAL_CHAIN);
# endif
}
else
::SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, nullptr);
}
else
{
if (yasio__valid_str(opts.crtfile_) && ::SSL_CTX_use_certificate_file(ctx, opts.crtfile_, SSL_FILETYPE_PEM) <= 0)
YASIO_LOG("[gobal] load server cert file failed!");
if (yasio__valid_str(opts.keyfile_) && ::SSL_CTX_use_PrivateKey_file(ctx, opts.keyfile_, SSL_FILETYPE_PEM) <= 0)
YASIO_LOG("[gobal] load server private key file failed!");
}
return ctx;
}
YASIO__DECL void yssl_ctx_free(yssl_ctx_st*& ctx)
{
::SSL_CTX_free((SSL_CTX*)ctx);
ctx = nullptr;
}
YASIO__DECL int yssl_bio_out_write(BIO* bio, const char* buf, int blen)
{
auto backend = reinterpret_cast<yssl_st*>(BIO_get_data(bio));
int nwritten;
int result = 0;
nwritten = ::send(backend->fd, buf, blen, YASIO_MSG_FLAG);
BIO_clear_retry_flags(bio);
if (nwritten < 0)
{
result = yasio::xxsocket::get_last_errno();
if (EAGAIN == result || EWOULDBLOCK == result)
BIO_set_retry_write(bio);
}
return (int)nwritten;
}
YASIO__DECL int yssl_bio_in_read(BIO* bio, char* buf, int blen)
{
auto backend = reinterpret_cast<yssl_st*>(BIO_get_data(bio));
int nread;
if (!buf || !backend)
return 0;
// recv data from kernel
int result = 0;
nread = ::recv(backend->fd, buf, blen, 0);
BIO_clear_retry_flags(bio);
if (nread < 0)
{
result = yasio::xxsocket::get_last_errno();
if (EAGAIN == result || EWOULDBLOCK == result)
BIO_set_retry_read(bio);
}
return (int)nread;
}
YASIO__DECL long yssl_bio_ctrl(BIO* bio, int cmd, long num, void* ptr)
{
long ret = 1;
(void)ptr;
switch (cmd)
{
case BIO_CTRL_GET_CLOSE:
ret = (long)BIO_get_shutdown(bio);
break;
case BIO_CTRL_SET_CLOSE:
BIO_set_shutdown(bio, (int)num);
break;
case BIO_CTRL_FLUSH:
/* we do no delayed writes, but if we ever would, this
* needs to trigger it. */
ret = 1;
break;
case BIO_CTRL_DUP:
ret = 1;
break;
# ifdef BIO_CTRL_EOF
case BIO_CTRL_EOF:
/* EOF has been reached on input? */
return 0;
# endif
default:
ret = 0;
break;
}
return ret;
}
YASIO__DECL int yssl_bio_create(BIO* bio)
{
BIO_set_shutdown(bio, 1);
BIO_set_init(bio, 1);
BIO_set_data(bio, NULL);
return 1;
}
YASIO__DECL int yssl_bio_destroy(BIO* bio)
{
if (!bio)
return 0;
return 1;
}
YASIO__DECL BIO_METHOD* yssl_bio_method_create(void)
{
BIO_METHOD* m = BIO_meth_new(BIO_TYPE_MEM, "OpenSSL CF BIO");
if (m)
{
BIO_meth_set_write(m, &yssl_bio_out_write);
BIO_meth_set_read(m, &yssl_bio_in_read);
BIO_meth_set_ctrl(m, &yssl_bio_ctrl);
BIO_meth_set_create(m, &yssl_bio_create);
BIO_meth_set_destroy(m, &yssl_bio_destroy);
}
return m;
}
YASIO__DECL yssl_st* yssl_new(yssl_ctx_st* ctx, int fd, const char* hostname, bool client)
{
auto ssl = ::SSL_new(ctx);
auto yssl = new yssl_st{ssl, fd, yssl_bio_method_create()};
auto bio = ::BIO_new(yssl->bmth);
::BIO_set_data(bio, yssl);
::SSL_set_bio(ssl, bio, bio);
if (client)
{
::SSL_set_connect_state(ssl);
::SSL_set_tlsext_host_name(ssl, hostname);
}
else
::SSL_set_accept_state(ssl);
return yssl;
}
YASIO__DECL void yssl_shutdown(yssl_st*& ssl, bool /*writable*/)
{
::SSL_shutdown(yssl_unwrap(ssl));
::SSL_free(yssl_unwrap(ssl));
if (ssl->bmth)
::BIO_meth_free(ssl->bmth);
delete ssl;
}
YASIO__DECL int yssl_do_handshake(yssl_st* ssl, int& err)
{
ERR_clear_error();
int ret = ::SSL_do_handshake(yssl_unwrap(ssl));
if (ret == 1) // handshake succeed
return 0;
int sslerr = ::SSL_get_error(yssl_unwrap(ssl), ret);
/*
When using a non-blocking socket, nothing is to be done, but select() can be used to check for
the required condition: https://www.openssl.org/docs/manmaster/man3/SSL_do_handshake.html
*/
if (sslerr == SSL_ERROR_WANT_READ || sslerr == SSL_ERROR_WANT_WRITE)
{
err = EWOULDBLOCK;
return -1;
}
/* ssl handshake fail */
err = yasio::errc::ssl_handshake_failed; // emit ssl handshake failed, continue handle close flow
return (sslerr != SSL_ERROR_SYSCALL) ? static_cast<int>(ERR_get_error() | YSSL_ERR_MASK) : yasio::xxsocket::get_last_errno();
}
YASIO__DECL const char* yssl_strerror(yssl_st* /*ssl*/, int sslerr, char* buf, size_t buflen)
{
if (yasio__testbits(sslerr, YSSL_ERR_MASK))
::ERR_error_string_n((unsigned int)sslerr & ~YSSL_ERR_MASK, buf, buflen);
else
yasio::xxsocket::strerror_r(sslerr, buf, buflen);
return buf;
}
YASIO__DECL int yssl_write(yssl_st* ssl, const void* data, size_t len, int& err)
{
ERR_clear_error();
int n = ::SSL_write(yssl_unwrap(ssl), data, static_cast<int>(len));
if (n > 0)
return n;
int sslerr = ::SSL_get_error(yssl_unwrap(ssl), n);
if (sslerr == SSL_ERROR_ZERO_RETURN)
{ // SSL_ERROR_SYSCALL
err = yasio::xxsocket::get_last_errno();
return 0;
}
switch (sslerr)
{
case SSL_ERROR_WANT_READ:
case SSL_ERROR_WANT_WRITE:
err = EWOULDBLOCK;
break;
default:
err = yasio::errc::ssl_write_failed;
}
return -1;
}
YASIO__DECL int yssl_read(yssl_st* ssl, void* data, size_t len, int& err)
{
ERR_clear_error();
int n = ::SSL_read(yssl_unwrap(ssl), data, static_cast<int>(len));
if (n > 0)
return n;
int sslerr = ::SSL_get_error(yssl_unwrap(ssl), n);
switch (sslerr)
{
case SSL_ERROR_WANT_READ:
case SSL_ERROR_WANT_WRITE:
/* The operation did not complete; the same TLS/SSL I/O function
should be called again later. This is basically an EWOULDBLOCK
equivalent. */
err = EWOULDBLOCK;
break;
default:
err = sslerr == SSL_ERROR_SYSCALL ? yasio::xxsocket::get_last_errno() : yasio::errc::ssl_read_failed;
if (sslerr == SSL_ERROR_ZERO_RETURN || ERR_peek_error() == 0) // peer closed connection in SSL handshake
return 0;
}
return -1;
}
#endif
#endif