/* * uhub - A tiny ADC p2p connection hub * Copyright (C) 2007-2009, Jan Vidar Krey * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see . * */ #include "uhub.h" extern struct hub_info* g_hub; static inline int net_con_flag_get(struct net_connection* con, unsigned int flag) { return con->flags & flag; } static inline void net_con_flag_set(struct net_connection* con, unsigned int flag) { con->flags |= flag; } static inline void net_con_flag_unset(struct net_connection* con, unsigned int flag) { con->flags &= ~flag; } static void net_con_event(int fd, short ev, void *arg) { struct net_connection* con = (struct net_connection*) arg; #ifdef SSL_SUPPORT if (!con->ssl) { #endif net_event(fd, ev, con->ptr); #ifdef SSL_SUPPORT } else { if (ev & (EV_READ | EV_WRITE)) { if (net_con_flag_get(con, NET_WANT_SSL_ACCEPT)) { net_con_ssl_accept(con); } else if (net_con_flag_get(con, NET_WANT_SSL_CONNECT)) { net_con_ssl_connect(con); } else if (ev == EV_READ && net_con_flag_get(con, NET_WANT_SSL_READ)) { net_event(fd, EV_WRITE, con->ptr); } else if (ev == EV_WRITE && net_con_flag_get(con, NET_WANT_SSL_WRITE)) { net_event(fd, ev & EV_READ, con->ptr); } else { net_event(fd, ev, con->ptr); } } else { net_event(fd, ev, con->ptr); } } #endif } void net_con_initialize(struct net_connection* con, int sd, const void* ptr, int events) { con->sd = sd; con->ptr = (void*) ptr; con->last_send = time(0); con->last_recv = con->last_send; #ifdef SSL_SUPPORT con->ssl = NULL; con->write_len = 0; #endif if (events & EV_READ) net_con_flag_set(con, NET_WANT_READ); if (events & EV_WRITE) net_con_flag_set(con, NET_WANT_WRITE); event_set(&con->event, con->sd, events | EV_PERSIST, net_con_event, con); event_base_set(g_hub->evbase, &con->event); event_add(&con->event, 0); } void net_con_update(struct net_connection* con, int events) { if (event_pending(&con->event, EV_READ | EV_WRITE, 0) == events) return; if (events & EV_READ) net_con_flag_set(con, NET_WANT_READ); if (events & EV_WRITE) net_con_flag_set(con, NET_WANT_WRITE); event_del(&con->event); event_set(&con->event, con->sd, events | EV_PERSIST, net_con_event, con); event_add(&con->event, 0); } void net_con_close(struct net_connection* con) { if (!event_pending(&con->event, EV_READ | EV_WRITE, 0)) return; event_del(&con->event); net_close(con->sd); con->sd = -1; } #ifdef SSL_SUPPORT static int handle_openssl_error(struct net_connection* con, int ret) { int error = SSL_get_error(con->ssl, ret); switch (error) { case SSL_ERROR_ZERO_RETURN: return ret; case SSL_ERROR_WANT_READ: net_con_update(con, EV_READ); net_con_flag_set(con, NET_WANT_SSL_READ); return 0; case SSL_ERROR_WANT_WRITE: net_con_update(con, EV_READ | EV_WRITE); net_con_flag_set(con, NET_WANT_SSL_WRITE); return 0; case SSL_ERROR_WANT_CONNECT: net_con_update(con, EV_READ | EV_WRITE); net_con_flag_set(con, NET_WANT_SSL_CONNECT); return 0; case SSL_ERROR_WANT_ACCEPT: net_con_update(con, EV_READ | EV_WRITE); net_con_flag_set(con, NET_WANT_SSL_ACCEPT); return 0; case SSL_ERROR_WANT_X509_LOOKUP: return 0; case SSL_ERROR_SYSCALL: /* if ret == 0, connection closed, if ret == -1, check with errno */ return -1; case SSL_ERROR_SSL: /* internal openssl error */ return -1; } return -1; } #endif ssize_t net_con_send(struct net_connection* con, const void* buf, size_t len) { #ifdef SSL_SUPPORT if (!con->ssl) { #endif int ret = net_send(con->sd, buf, len, UHUB_SEND_SIGNAL); if (ret > 0) { con->last_send = time(0); } else if (ret == -1 && (net_error() == EWOULDBLOCK || net_error() == EINTR)) { return 0; } else { return -1; } return ret; #ifdef SSL_SUPPORT } else { int ret = SSL_write(con->ssl, buf, len); if (ret > 0) { con->last_send = time(0); net_con_flag_unset(con, NET_WANT_SSL_READ); } else { return handle_openssl_error(con, ret); } return ret; } #endif } ssize_t net_con_recv(struct net_connection* con, void* buf, size_t len) { #ifdef SSL_SUPPORT if (!con->ssl) { #endif int ret = net_recv(con->sd, buf, len, 0); if (ret > 0) { con->last_recv = time(0); } else if (ret == -1 && (net_error() == EWOULDBLOCK || net_error() == EINTR)) { return 0; } else { return -1; } return ret; #ifdef SSL_SUPPORT } else { int ret = SSL_read(con->ssl, buf, len); if (ret > 0) { con->last_recv = time(0); net_con_flag_unset(con, NET_WANT_SSL_WRITE); } else { return handle_openssl_error(con, ret); } return ret; } #endif } #ifdef SSL_SUPPORT ssize_t net_con_ssl_accept(struct net_connection* con) { ssize_t ret = SSL_accept(con->ssl); if (ret > 0) { net_con_flag_unset(con, NET_WANT_SSL_ACCEPT); } else { return handle_openssl_error(con, ret); } return ret; } ssize_t net_con_ssl_connect(struct net_connection* con) { ssize_t ret = SSL_connect(con->ssl); if (ret > 0) { net_con_flag_unset(con, NET_WANT_SSL_CONNECT); } else { return handle_openssl_error(con, ret); } return ret; } #endif /* SSL_SUPPORT */