2009-08-02 19:37:55 +00:00
|
|
|
/*
|
|
|
|
* uhub - A tiny ADC p2p connection hub
|
|
|
|
* Copyright (C) 2007-2009, Jan Vidar Krey
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "uhub.h"
|
|
|
|
|
2009-08-27 12:15:18 +00:00
|
|
|
#define NET_WANT_READ NET_EVENT_READ
|
|
|
|
#define NET_WANT_WRITE NET_EVENT_WRITE
|
2009-08-23 12:36:52 +00:00
|
|
|
#define NET_WANT_ACCEPT 0x0008
|
|
|
|
#define NET_WANT_SSL_READ 0x0010
|
|
|
|
#define NET_WANT_SSL_WRITE 0x0020
|
|
|
|
#define NET_WANT_SSL_ACCEPT 0x0040
|
|
|
|
#define NET_WANT_SSL_CONNECT 0x0080
|
|
|
|
#define NET_WANT_SSL_X509_LOOKUP 0x0100
|
|
|
|
|
|
|
|
#define NET_PROCESSING_BUSY 0x8000
|
|
|
|
#define NET_CLEANUP 0x4000
|
|
|
|
#define NET_INITIALIZED 0x2000
|
2009-08-27 12:15:18 +00:00
|
|
|
#define NET_TIMER_ENABLED 0x1000
|
2009-08-23 12:36:52 +00:00
|
|
|
|
2009-08-02 19:37:55 +00:00
|
|
|
extern struct hub_info* g_hub;
|
|
|
|
|
2009-08-03 00:50:51 +00:00
|
|
|
static inline int net_con_flag_get(struct net_connection* con, unsigned int flag)
|
|
|
|
{
|
|
|
|
return con->flags & flag;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void net_con_flag_set(struct net_connection* con, unsigned int flag)
|
|
|
|
{
|
|
|
|
con->flags |= flag;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void net_con_flag_unset(struct net_connection* con, unsigned int flag)
|
|
|
|
{
|
|
|
|
con->flags &= ~flag;
|
|
|
|
}
|
|
|
|
|
2009-08-04 02:46:24 +00:00
|
|
|
static inline int net_con_convert_to_libevent_mask(int ev)
|
2009-08-03 00:50:51 +00:00
|
|
|
{
|
2009-08-03 19:57:18 +00:00
|
|
|
int events = 0;
|
2009-08-04 02:46:24 +00:00
|
|
|
if (ev & NET_EVENT_READ) events |= EV_READ;
|
|
|
|
if (ev & NET_EVENT_WRITE) events |= EV_WRITE;
|
|
|
|
return events;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int net_con_convert_from_libevent_mask(int ev)
|
|
|
|
{
|
|
|
|
int events = 0;
|
|
|
|
if (ev & EV_TIMEOUT) events |= NET_EVENT_TIMEOUT;
|
|
|
|
if (ev & EV_READ) events |= NET_EVENT_READ;
|
|
|
|
if (ev & EV_WRITE) events |= NET_EVENT_WRITE;
|
|
|
|
return events;
|
|
|
|
}
|
2009-08-03 19:57:18 +00:00
|
|
|
|
2009-08-27 12:15:18 +00:00
|
|
|
static void net_con_event(int fd, short ev, void *arg);
|
|
|
|
|
|
|
|
void net_con_set(struct net_connection* con)
|
|
|
|
{
|
2009-09-28 21:15:15 +00:00
|
|
|
uhub_assert(con);
|
|
|
|
|
2009-08-27 12:15:18 +00:00
|
|
|
int ev = 0;
|
|
|
|
if (net_con_flag_get(con, NET_WANT_READ | NET_WANT_SSL_READ)) ev |= EV_READ;
|
|
|
|
if (net_con_flag_get(con, NET_WANT_WRITE | NET_WANT_SSL_WRITE)) ev |= EV_WRITE;
|
|
|
|
|
|
|
|
event_set(&con->event, con->sd, ev, net_con_event, con);
|
|
|
|
event_add(&con->event, 0);
|
|
|
|
net_con_flag_set(con, NET_INITIALIZED);
|
|
|
|
}
|
|
|
|
|
2009-09-04 15:18:38 +00:00
|
|
|
#define CALLBACK(CON, EVENTS) \
|
|
|
|
if (CON->callback) \
|
|
|
|
CON->callback(con, EVENTS, CON->ptr);
|
2009-08-04 02:46:24 +00:00
|
|
|
|
|
|
|
static void net_con_event(int fd, short ev, void *arg)
|
|
|
|
{
|
|
|
|
struct net_connection* con = (struct net_connection*) arg;
|
|
|
|
int events = net_con_convert_from_libevent_mask(ev);
|
2009-08-03 19:57:18 +00:00
|
|
|
|
2009-08-23 12:36:52 +00:00
|
|
|
net_con_flag_set(con, NET_PROCESSING_BUSY);
|
|
|
|
|
2009-08-03 00:50:51 +00:00
|
|
|
#ifdef SSL_SUPPORT
|
|
|
|
if (!con->ssl)
|
|
|
|
{
|
|
|
|
#endif
|
2009-09-04 15:18:38 +00:00
|
|
|
CALLBACK(con, events);
|
2009-08-03 00:50:51 +00:00
|
|
|
#ifdef SSL_SUPPORT
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2009-08-04 02:46:24 +00:00
|
|
|
#ifdef NETWORK_DUMP_DEBUG
|
|
|
|
LOG_PROTO("net_con_event: events=%d, con=%p", ev, con);
|
|
|
|
#endif
|
2009-08-03 00:50:51 +00:00
|
|
|
if (ev & (EV_READ | EV_WRITE))
|
|
|
|
{
|
|
|
|
if (net_con_flag_get(con, NET_WANT_SSL_ACCEPT))
|
|
|
|
{
|
2009-08-03 14:20:32 +00:00
|
|
|
if (net_con_ssl_accept(con) < 0)
|
2009-09-04 15:18:38 +00:00
|
|
|
CALLBACK(con, NET_EVENT_SOCKERROR);
|
2009-08-03 00:50:51 +00:00
|
|
|
}
|
|
|
|
else if (net_con_flag_get(con, NET_WANT_SSL_CONNECT))
|
|
|
|
{
|
2009-08-03 14:20:32 +00:00
|
|
|
if (net_con_ssl_connect(con) < 0)
|
2009-09-04 15:18:38 +00:00
|
|
|
CALLBACK(con, NET_EVENT_SOCKERROR);
|
2009-08-03 00:50:51 +00:00
|
|
|
}
|
|
|
|
else if (ev == EV_READ && net_con_flag_get(con, NET_WANT_SSL_READ))
|
|
|
|
{
|
2009-09-04 15:18:38 +00:00
|
|
|
CALLBACK(con, NET_EVENT_WRITE);
|
2009-08-03 00:50:51 +00:00
|
|
|
}
|
|
|
|
else if (ev == EV_WRITE && net_con_flag_get(con, NET_WANT_SSL_WRITE))
|
|
|
|
{
|
2009-09-04 15:18:38 +00:00
|
|
|
CALLBACK(con, events & NET_EVENT_READ);
|
2009-08-03 00:50:51 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2009-09-04 15:18:38 +00:00
|
|
|
CALLBACK((con, events);
|
2009-08-03 00:50:51 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2009-09-04 15:18:38 +00:00
|
|
|
CALLBACK(con, events);
|
2009-08-03 00:50:51 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2009-08-23 12:36:52 +00:00
|
|
|
net_con_flag_unset(con, NET_PROCESSING_BUSY);
|
|
|
|
|
|
|
|
if (net_con_flag_get(con, NET_CLEANUP))
|
|
|
|
{
|
|
|
|
net_con_flag_unset(con, NET_INITIALIZED);
|
2009-09-04 15:18:38 +00:00
|
|
|
CALLBACK(con, NET_EVENT_DESTROYED);
|
2009-08-23 12:36:52 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2009-08-27 12:15:18 +00:00
|
|
|
net_con_set(con);
|
2009-08-23 12:36:52 +00:00
|
|
|
}
|
2009-08-03 00:50:51 +00:00
|
|
|
}
|
|
|
|
|
2009-09-28 21:15:15 +00:00
|
|
|
void net_con_initialize(struct net_connection* con, int sd, net_connection_cb callback, const void* ptr, int ev)
|
2009-08-06 22:22:30 +00:00
|
|
|
{
|
2009-09-28 21:15:15 +00:00
|
|
|
uhub_assert(con);
|
2009-08-06 22:22:30 +00:00
|
|
|
|
2009-08-04 02:46:24 +00:00
|
|
|
int events = net_con_convert_to_libevent_mask(ev);
|
|
|
|
if (ev & NET_EVENT_READ) net_con_flag_set(con, NET_WANT_READ);
|
|
|
|
if (ev & NET_EVENT_WRITE) net_con_flag_set(con, NET_WANT_WRITE);
|
|
|
|
|
2009-08-02 19:37:55 +00:00
|
|
|
con->sd = sd;
|
2009-08-23 12:36:52 +00:00
|
|
|
con->flags = 0;
|
2009-08-02 19:37:55 +00:00
|
|
|
con->ptr = (void*) ptr;
|
2009-08-03 19:57:18 +00:00
|
|
|
con->callback = callback;
|
2009-08-03 00:50:51 +00:00
|
|
|
con->last_send = time(0);
|
|
|
|
con->last_recv = con->last_send;
|
|
|
|
|
2009-08-23 12:36:52 +00:00
|
|
|
if (ev)
|
|
|
|
{
|
|
|
|
event_set(&con->event, con->sd, events, net_con_event, con);
|
|
|
|
event_add(&con->event, 0);
|
|
|
|
net_con_flag_set(con, NET_INITIALIZED);
|
|
|
|
}
|
2009-08-03 14:20:32 +00:00
|
|
|
|
|
|
|
net_set_nonblocking(sd, 1);
|
|
|
|
net_set_nosigpipe(sd, 1);
|
|
|
|
|
|
|
|
#ifdef SSL_SUPPORT
|
|
|
|
con->ssl = NULL;
|
|
|
|
con->write_len = 0;
|
|
|
|
#endif
|
2009-08-02 19:37:55 +00:00
|
|
|
}
|
|
|
|
|
2009-10-07 15:37:31 +00:00
|
|
|
void net_con_reinitialize(struct net_connection* con, net_connection_cb callback, const void* ptr, int events)
|
|
|
|
{
|
|
|
|
uhub_assert(con);
|
|
|
|
con->callback = callback;
|
|
|
|
con->ptr = (void*) ptr;
|
|
|
|
net_con_update(con, events);
|
|
|
|
}
|
2009-08-27 12:15:18 +00:00
|
|
|
|
2009-08-04 02:46:24 +00:00
|
|
|
void net_con_update(struct net_connection* con, int ev)
|
2009-08-02 19:37:55 +00:00
|
|
|
{
|
2009-09-28 21:15:15 +00:00
|
|
|
uhub_assert(con);
|
|
|
|
|
2009-08-23 12:36:52 +00:00
|
|
|
if (ev & NET_EVENT_READ)
|
|
|
|
net_con_flag_set(con, NET_EVENT_READ);
|
|
|
|
else
|
|
|
|
net_con_flag_unset(con, NET_EVENT_READ);
|
2009-08-04 02:46:24 +00:00
|
|
|
|
2009-08-23 12:36:52 +00:00
|
|
|
if (ev & NET_EVENT_WRITE)
|
|
|
|
net_con_flag_set(con, NET_EVENT_WRITE);
|
|
|
|
else
|
|
|
|
net_con_flag_unset(con, NET_EVENT_WRITE);
|
2009-08-28 16:05:58 +00:00
|
|
|
|
|
|
|
if (!net_con_flag_get(con, NET_PROCESSING_BUSY))
|
|
|
|
{
|
|
|
|
net_con_set(con);
|
|
|
|
}
|
2009-08-02 19:37:55 +00:00
|
|
|
}
|
|
|
|
|
2009-10-06 12:36:05 +00:00
|
|
|
int net_con_close(struct net_connection* con)
|
2009-08-02 19:37:55 +00:00
|
|
|
{
|
2009-09-28 21:15:15 +00:00
|
|
|
uhub_assert(con);
|
|
|
|
|
2009-08-11 19:29:51 +00:00
|
|
|
if (net_con_flag_get(con, NET_CLEANUP))
|
|
|
|
{
|
|
|
|
LOG_INFO("Running net_con_close, but we already have closed...");
|
2009-10-06 12:36:05 +00:00
|
|
|
return 0;
|
2009-08-11 19:29:51 +00:00
|
|
|
}
|
|
|
|
|
2009-08-23 12:36:52 +00:00
|
|
|
if (net_con_flag_get(con, NET_PROCESSING_BUSY))
|
|
|
|
{
|
2009-09-04 15:18:38 +00:00
|
|
|
LOG_INFO("Trying to close socket while processing it");
|
|
|
|
net_con_flag_set(con, NET_CLEANUP);
|
2009-10-06 12:36:05 +00:00
|
|
|
return 0;
|
2009-08-23 12:36:52 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (net_con_flag_get(con, NET_INITIALIZED))
|
2009-08-03 21:59:02 +00:00
|
|
|
{
|
|
|
|
event_del(&con->event);
|
2009-08-23 12:36:52 +00:00
|
|
|
net_con_flag_unset(con, NET_INITIALIZED);
|
2009-08-03 21:59:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
net_con_clear_timeout(con);
|
2009-08-02 19:46:57 +00:00
|
|
|
net_close(con->sd);
|
|
|
|
con->sd = -1;
|
2009-08-11 19:29:51 +00:00
|
|
|
|
|
|
|
net_con_flag_set(con, NET_CLEANUP);
|
2009-10-06 12:36:05 +00:00
|
|
|
return 1;
|
2009-08-02 19:37:55 +00:00
|
|
|
}
|
|
|
|
|
2009-08-03 00:50:51 +00:00
|
|
|
#ifdef SSL_SUPPORT
|
|
|
|
static int handle_openssl_error(struct net_connection* con, int ret)
|
|
|
|
{
|
2009-09-28 21:15:15 +00:00
|
|
|
uhub_assert(con);
|
|
|
|
|
2009-08-03 00:50:51 +00:00
|
|
|
int error = SSL_get_error(con->ssl, ret);
|
|
|
|
switch (error)
|
|
|
|
{
|
|
|
|
case SSL_ERROR_ZERO_RETURN:
|
2009-08-04 02:46:24 +00:00
|
|
|
LOG_PROTO("SSL_get_error: ret=%d, error=%d: SSL_ERROR_ZERO_RETURN", ret, error);
|
2009-08-03 16:20:08 +00:00
|
|
|
return -1;
|
2009-08-03 00:50:51 +00:00
|
|
|
|
|
|
|
case SSL_ERROR_WANT_READ:
|
2009-08-04 02:46:24 +00:00
|
|
|
LOG_PROTO("SSL_get_error: ret=%d, error=%d: SSL_ERROR_WANT_READ", ret, error);
|
2009-08-03 00:50:51 +00:00
|
|
|
net_con_update(con, EV_READ);
|
|
|
|
net_con_flag_set(con, NET_WANT_SSL_READ);
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
case SSL_ERROR_WANT_WRITE:
|
2009-08-04 02:46:24 +00:00
|
|
|
LOG_PROTO("SSL_get_error: ret=%d, error=%d: SSL_ERROR_WANT_WRITE", ret, error);
|
2009-08-03 00:50:51 +00:00
|
|
|
net_con_update(con, EV_READ | EV_WRITE);
|
|
|
|
net_con_flag_set(con, NET_WANT_SSL_WRITE);
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
case SSL_ERROR_WANT_CONNECT:
|
2009-08-04 02:46:24 +00:00
|
|
|
LOG_PROTO("SSL_get_error: ret=%d, error=%d: SSL_ERROR_WANT_CONNECT", ret, error);
|
2009-08-03 00:50:51 +00:00
|
|
|
net_con_update(con, EV_READ | EV_WRITE);
|
|
|
|
net_con_flag_set(con, NET_WANT_SSL_CONNECT);
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
case SSL_ERROR_WANT_ACCEPT:
|
2009-08-04 02:46:24 +00:00
|
|
|
LOG_PROTO("SSL_get_error: ret=%d, error=%d: SSL_ERROR_WANT_ACCEPT", ret, error);
|
2009-08-03 00:50:51 +00:00
|
|
|
net_con_update(con, EV_READ | EV_WRITE);
|
|
|
|
net_con_flag_set(con, NET_WANT_SSL_ACCEPT);
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
case SSL_ERROR_WANT_X509_LOOKUP:
|
2009-08-04 02:46:24 +00:00
|
|
|
LOG_PROTO("SSL_get_error: ret=%d, error=%d: SSL_ERROR_WANT_X509_LOOKUP", ret, error);
|
2009-08-03 00:50:51 +00:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
case SSL_ERROR_SYSCALL:
|
2009-08-04 02:46:24 +00:00
|
|
|
LOG_PROTO("SSL_get_error: ret=%d, error=%d: SSL_ERROR_SYSCALL", ret, error);
|
2009-08-03 00:50:51 +00:00
|
|
|
/* if ret == 0, connection closed, if ret == -1, check with errno */
|
2009-08-03 14:20:32 +00:00
|
|
|
if (ret == 0)
|
|
|
|
return -1;
|
|
|
|
else
|
|
|
|
return -net_error();
|
2009-08-03 00:50:51 +00:00
|
|
|
|
|
|
|
case SSL_ERROR_SSL:
|
2009-08-04 02:46:24 +00:00
|
|
|
LOG_PROTO("SSL_get_error: ret=%d, error=%d: SSL_ERROR_SSL", ret, error);
|
2009-08-03 00:50:51 +00:00
|
|
|
/* internal openssl error */
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
ssize_t net_con_send(struct net_connection* con, const void* buf, size_t len)
|
|
|
|
{
|
2009-09-28 21:15:15 +00:00
|
|
|
uhub_assert(con);
|
|
|
|
|
2009-08-03 00:50:51 +00:00
|
|
|
#ifdef SSL_SUPPORT
|
|
|
|
if (!con->ssl)
|
|
|
|
{
|
|
|
|
#endif
|
|
|
|
int ret = net_send(con->sd, buf, len, UHUB_SEND_SIGNAL);
|
2009-08-04 02:46:24 +00:00
|
|
|
#ifdef NETWORK_DUMP_DEBUG
|
|
|
|
LOG_PROTO("net_send: ret=%d", ret);
|
|
|
|
#endif
|
2009-08-03 00:50:51 +00:00
|
|
|
if (ret > 0)
|
|
|
|
{
|
|
|
|
con->last_send = time(0);
|
|
|
|
}
|
|
|
|
else if (ret == -1 && (net_error() == EWOULDBLOCK || net_error() == EINTR))
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
#ifdef SSL_SUPPORT
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2009-08-03 17:54:28 +00:00
|
|
|
if (net_con_flag_get(con, NET_WANT_SSL_READ) && con->write_len)
|
|
|
|
len = con->write_len;
|
|
|
|
|
2009-08-03 00:50:51 +00:00
|
|
|
int ret = SSL_write(con->ssl, buf, len);
|
2009-08-04 02:46:24 +00:00
|
|
|
#ifdef NETWORK_DUMP_DEBUG
|
|
|
|
LOG_PROTO("net_send: ret=%d", ret);
|
|
|
|
#endif
|
2009-08-03 00:50:51 +00:00
|
|
|
if (ret > 0)
|
|
|
|
{
|
|
|
|
con->last_send = time(0);
|
|
|
|
net_con_flag_unset(con, NET_WANT_SSL_READ);
|
2009-08-03 17:54:28 +00:00
|
|
|
con->write_len = 0;
|
2009-08-03 00:50:51 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2009-08-03 17:54:28 +00:00
|
|
|
con->write_len = len;
|
2009-08-03 00:50:51 +00:00
|
|
|
return handle_openssl_error(con, ret);
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
ssize_t net_con_recv(struct net_connection* con, void* buf, size_t len)
|
|
|
|
{
|
2009-09-28 21:15:15 +00:00
|
|
|
uhub_assert(con);
|
|
|
|
|
2009-08-03 00:50:51 +00:00
|
|
|
#ifdef SSL_SUPPORT
|
|
|
|
if (!con->ssl)
|
|
|
|
{
|
|
|
|
#endif
|
|
|
|
int ret = net_recv(con->sd, buf, len, 0);
|
2009-08-04 02:46:24 +00:00
|
|
|
#ifdef NETWORK_DUMP_DEBUG
|
|
|
|
LOG_PROTO("net_recv: ret=%d", ret);
|
|
|
|
#endif
|
2009-08-03 00:50:51 +00:00
|
|
|
if (ret > 0)
|
|
|
|
{
|
|
|
|
con->last_recv = time(0);
|
|
|
|
}
|
|
|
|
else if (ret == -1 && (net_error() == EWOULDBLOCK || net_error() == EINTR))
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
#ifdef SSL_SUPPORT
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
int ret = SSL_read(con->ssl, buf, len);
|
2009-08-04 02:46:24 +00:00
|
|
|
#ifdef NETWORK_DUMP_DEBUG
|
|
|
|
LOG_PROTO("net_recv: ret=%d", ret);
|
|
|
|
#endif
|
2009-08-03 00:50:51 +00:00
|
|
|
if (ret > 0)
|
|
|
|
{
|
|
|
|
con->last_recv = time(0);
|
|
|
|
net_con_flag_unset(con, NET_WANT_SSL_WRITE);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
return handle_openssl_error(con, ret);
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2009-10-07 15:37:31 +00:00
|
|
|
ssize_t net_con_peek(struct net_connection* con, void* buf, size_t len)
|
|
|
|
{
|
|
|
|
uhub_assert(con);
|
|
|
|
|
|
|
|
#ifdef SSL_SUPPORT
|
|
|
|
if (!con->ssl)
|
|
|
|
{
|
|
|
|
#endif
|
|
|
|
int ret = net_recv(con->sd, buf, len, MSG_PEEK);
|
|
|
|
#ifdef NETWORK_DUMP_DEBUG
|
|
|
|
LOG_PROTO("net_recv: ret=%d (MSG_PEEK)", ret);
|
|
|
|
#endif
|
|
|
|
if (ret > 0)
|
|
|
|
{
|
|
|
|
con->last_recv = time(0);
|
|
|
|
}
|
|
|
|
else if (ret == -1 && (net_error() == EWOULDBLOCK || net_error() == EINTR))
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
#ifdef SSL_SUPPORT
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
// FIXME: Not able to do this!
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2009-08-03 19:57:18 +00:00
|
|
|
void net_con_set_timeout(struct net_connection* con, int seconds)
|
|
|
|
{
|
2009-09-28 21:15:15 +00:00
|
|
|
uhub_assert(con);
|
|
|
|
|
2009-08-03 19:57:18 +00:00
|
|
|
struct timeval timeout = { seconds, 0 };
|
2009-08-27 12:15:18 +00:00
|
|
|
net_con_clear_timeout(con);
|
|
|
|
|
2009-08-03 19:57:18 +00:00
|
|
|
evtimer_set(&con->timeout, net_con_event, con);
|
|
|
|
evtimer_add(&con->timeout, &timeout);
|
2009-08-27 12:15:18 +00:00
|
|
|
net_con_flag_set(con, NET_TIMER_ENABLED);
|
2009-08-03 19:57:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void net_con_clear_timeout(struct net_connection* con)
|
|
|
|
{
|
2009-09-28 21:15:15 +00:00
|
|
|
uhub_assert(con);
|
|
|
|
|
2009-08-27 12:15:18 +00:00
|
|
|
if (net_con_flag_get(con, NET_TIMER_ENABLED))
|
2009-08-03 19:57:18 +00:00
|
|
|
{
|
|
|
|
evtimer_del(&con->timeout);
|
2009-08-27 12:15:18 +00:00
|
|
|
net_con_flag_unset(con, NET_TIMER_ENABLED);
|
2009-08-03 19:57:18 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-08-03 00:50:51 +00:00
|
|
|
#ifdef SSL_SUPPORT
|
2009-08-03 12:21:53 +00:00
|
|
|
ssize_t net_con_ssl_accept(struct net_connection* con)
|
2009-08-03 00:50:51 +00:00
|
|
|
{
|
2009-09-28 21:15:15 +00:00
|
|
|
uhub_assert(con);
|
|
|
|
|
2009-08-03 14:20:32 +00:00
|
|
|
net_con_flag_set(con, NET_WANT_SSL_ACCEPT);
|
2009-08-03 00:50:51 +00:00
|
|
|
ssize_t ret = SSL_accept(con->ssl);
|
2009-08-04 02:46:24 +00:00
|
|
|
#ifdef NETWORK_DUMP_DEBUG
|
|
|
|
LOG_PROTO("SSL_accept() ret=%d", ret);
|
|
|
|
#endif
|
2009-08-03 00:50:51 +00:00
|
|
|
if (ret > 0)
|
|
|
|
{
|
|
|
|
net_con_flag_unset(con, NET_WANT_SSL_ACCEPT);
|
2009-08-03 14:20:32 +00:00
|
|
|
net_con_flag_unset(con, NET_WANT_SSL_READ);
|
2009-08-03 00:50:51 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
return handle_openssl_error(con, ret);
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2009-08-03 12:21:53 +00:00
|
|
|
ssize_t net_con_ssl_connect(struct net_connection* con)
|
2009-08-03 00:50:51 +00:00
|
|
|
{
|
2009-09-28 21:15:15 +00:00
|
|
|
uhub_assert(con);
|
|
|
|
|
2009-08-03 14:20:32 +00:00
|
|
|
net_con_flag_set(con, NET_WANT_SSL_CONNECT);
|
2009-08-03 00:50:51 +00:00
|
|
|
ssize_t ret = SSL_connect(con->ssl);
|
2009-08-04 02:46:24 +00:00
|
|
|
#ifdef NETWORK_DUMP_DEBUG
|
|
|
|
LOG_PROTO("SSL_connect() ret=%d", ret);
|
|
|
|
#endif
|
2009-08-03 00:50:51 +00:00
|
|
|
if (ret > 0)
|
|
|
|
{
|
|
|
|
net_con_flag_unset(con, NET_WANT_SSL_CONNECT);
|
2009-08-03 17:55:57 +00:00
|
|
|
net_con_flag_unset(con, NET_WANT_SSL_WRITE);
|
2009-08-03 00:50:51 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
return handle_openssl_error(con, ret);
|
|
|
|
}
|
|
|
|
return ret;
|
2009-08-28 16:05:58 +00:00
|
|
|
// }
|
2009-08-03 18:21:59 +00:00
|
|
|
|
|
|
|
ssize_t net_con_ssl_handshake(struct net_connection* con, int ssl_mode)
|
|
|
|
{
|
2009-09-28 21:15:15 +00:00
|
|
|
uhub_assert(con);
|
|
|
|
|
2009-08-03 18:21:59 +00:00
|
|
|
if (ssl_mode == NET_CON_SSL_MODE_SERVER)
|
|
|
|
{
|
|
|
|
con->ssl = SSL_new(g_hub->ssl_ctx);
|
|
|
|
SSL_set_fd(con->ssl, con->sd);
|
|
|
|
return net_con_ssl_accept(con);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
con->ssl = SSL_new(SSL_CTX_new(TLSv1_method()));
|
|
|
|
SSL_set_fd(con->ssl, con->sd);
|
|
|
|
return net_con_ssl_connect(con);
|
|
|
|
}
|
|
|
|
}
|
2009-08-03 12:21:53 +00:00
|
|
|
#endif /* SSL_SUPPORT */
|
|
|
|
|
2009-08-27 12:15:18 +00:00
|
|
|
static void net_timer_event(int fd, short ev, void *arg)
|
|
|
|
{
|
|
|
|
struct net_timer* timer = (struct net_timer*) arg;
|
|
|
|
timer->callback(timer, timer->ptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
void net_timer_initialize(struct net_timer* timer, net_timeout_cb callback, void* ptr)
|
|
|
|
{
|
|
|
|
timer->initialized = 0;
|
|
|
|
timer->callback = callback;
|
|
|
|
timer->ptr = ptr;
|
|
|
|
}
|
2009-08-03 00:50:51 +00:00
|
|
|
|
2009-08-27 12:15:18 +00:00
|
|
|
void net_timer_reset(struct net_timer* timer, int seconds)
|
|
|
|
{
|
|
|
|
struct timeval timeout = { seconds, 0 };
|
|
|
|
if (timer->initialized)
|
|
|
|
{
|
|
|
|
evtimer_del(&timer->timeout);
|
|
|
|
timer->initialized = 0;
|
|
|
|
}
|
|
|
|
evtimer_set(&timer->timeout, net_timer_event, timer);
|
|
|
|
evtimer_add(&timer->timeout, &timeout);
|
|
|
|
}
|
|
|
|
|
|
|
|
void net_timer_shutdown(struct net_timer* timer)
|
|
|
|
{
|
|
|
|
if (timer->initialized)
|
|
|
|
{
|
|
|
|
evtimer_del(&timer->timeout);
|
|
|
|
timer->initialized = 0;
|
|
|
|
}
|
|
|
|
timer->callback = 0;
|
|
|
|
timer->ptr = 0;
|
|
|
|
}
|