/* * uhub - A tiny ADC p2p connection hub * Copyright (C) 2007-2009, Jan Vidar Krey * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see . * */ #include "uhub.h" #include "network/connection-common.c" #include "network/connection-libevent.c" #include "network/connection-epoll.c" extern struct hub_info* g_hub; int net_con_close(struct net_connection* con) { uhub_assert(con); con->ptr = 0; if (net_con_flag_get(con, NET_CLEANUP)) return 0; if (net_con_flag_get(con, NET_PROCESSING_BUSY)) { net_con_flag_set(con, NET_CLEANUP); return 0; } net_con_after_close(con); return 1; } #ifdef SSL_SUPPORT static int handle_openssl_error(struct net_connection* con, int ret) { uhub_assert(con); int error = SSL_get_error(con->ssl, ret); switch (error) { case SSL_ERROR_ZERO_RETURN: LOG_PROTO("SSL_get_error: ret=%d, error=%d: SSL_ERROR_ZERO_RETURN", ret, error); return -1; case SSL_ERROR_WANT_READ: LOG_PROTO("SSL_get_error: ret=%d, error=%d: SSL_ERROR_WANT_READ", ret, error); net_con_update(con, EV_READ); net_con_flag_set(con, NET_WANT_SSL_READ); return 0; case SSL_ERROR_WANT_WRITE: LOG_PROTO("SSL_get_error: ret=%d, error=%d: SSL_ERROR_WANT_WRITE", ret, error); net_con_update(con, EV_READ | EV_WRITE); net_con_flag_set(con, NET_WANT_SSL_WRITE); return 0; case SSL_ERROR_WANT_CONNECT: LOG_PROTO("SSL_get_error: ret=%d, error=%d: SSL_ERROR_WANT_CONNECT", ret, error); net_con_update(con, EV_READ | EV_WRITE); net_con_flag_set(con, NET_WANT_SSL_CONNECT); return 0; case SSL_ERROR_WANT_ACCEPT: LOG_PROTO("SSL_get_error: ret=%d, error=%d: SSL_ERROR_WANT_ACCEPT", ret, error); net_con_update(con, EV_READ | EV_WRITE); net_con_flag_set(con, NET_WANT_SSL_ACCEPT); return 0; case SSL_ERROR_WANT_X509_LOOKUP: LOG_PROTO("SSL_get_error: ret=%d, error=%d: SSL_ERROR_WANT_X509_LOOKUP", ret, error); return 0; case SSL_ERROR_SYSCALL: LOG_PROTO("SSL_get_error: ret=%d, error=%d: SSL_ERROR_SYSCALL", ret, error); /* if ret == 0, connection closed, if ret == -1, check with errno */ if (ret == 0) return -1; else return -net_error(); case SSL_ERROR_SSL: LOG_PROTO("SSL_get_error: ret=%d, error=%d: SSL_ERROR_SSL", ret, error); /* internal openssl error */ return -1; } return -1; } #endif ssize_t net_con_send(struct net_connection* con, const void* buf, size_t len) { uhub_assert(con); #ifdef SSL_SUPPORT if (!con->ssl) { #endif int ret = net_send(con->sd, buf, len, UHUB_SEND_SIGNAL); #ifdef NETWORK_DUMP_DEBUG LOG_PROTO("net_send: ret=%d", ret); #endif if (ret > 0) { con->last_send = time(0); } else if (ret == -1 && (net_error() == EWOULDBLOCK || net_error() == EINTR)) { return 0; } else { return -1; } return ret; #ifdef SSL_SUPPORT } else { if (net_con_flag_get(con, NET_WANT_SSL_READ) && con->write_len) len = con->write_len; int ret = SSL_write(con->ssl, buf, len); #ifdef NETWORK_DUMP_DEBUG LOG_PROTO("net_send: ret=%d", ret); #endif if (ret > 0) { con->last_send = time(0); net_con_flag_unset(con, NET_WANT_SSL_READ); con->write_len = 0; } else { con->write_len = len; return handle_openssl_error(con, ret); } return ret; } #endif } ssize_t net_con_recv(struct net_connection* con, void* buf, size_t len) { uhub_assert(con); #ifdef SSL_SUPPORT if (!con->ssl) { #endif int ret = net_recv(con->sd, buf, len, 0); #ifdef NETWORK_DUMP_DEBUG LOG_PROTO("net_recv: ret=%d", ret); #endif if (ret > 0) { con->last_recv = time(0); } else if (ret == -1 && (net_error() == EWOULDBLOCK || net_error() == EINTR)) { return 0; } else { return -1; } return ret; #ifdef SSL_SUPPORT } else { int ret = SSL_read(con->ssl, buf, len); #ifdef NETWORK_DUMP_DEBUG LOG_PROTO("net_recv: ret=%d", ret); #endif if (ret > 0) { con->last_recv = time(0); net_con_flag_unset(con, NET_WANT_SSL_WRITE); } else { return handle_openssl_error(con, ret); } return ret; } #endif } ssize_t net_con_peek(struct net_connection* con, void* buf, size_t len) { uhub_assert(con); #ifdef SSL_SUPPORT if (!con->ssl) { #endif int ret = net_recv(con->sd, buf, len, MSG_PEEK); #ifdef NETWORK_DUMP_DEBUG LOG_PROTO("net_recv: ret=%d (MSG_PEEK)", ret); #endif if (ret > 0) { con->last_recv = time(0); } else if (ret == -1 && (net_error() == EWOULDBLOCK || net_error() == EINTR)) { return 0; } else { return -1; } return ret; #ifdef SSL_SUPPORT } else { // FIXME: Not able to do this! return 0; } #endif } void net_con_set_timeout(struct net_connection* con, int seconds) { uhub_assert(con); struct timeval timeout = { seconds, 0 }; net_con_clear_timeout(con); evtimer_set(&con->timeout, net_con_event, con); evtimer_add(&con->timeout, &timeout); net_con_flag_set(con, NET_TIMER_ENABLED); } void net_con_clear_timeout(struct net_connection* con) { uhub_assert(con); if (net_con_flag_get(con, NET_TIMER_ENABLED)) { evtimer_del(&con->timeout); net_con_flag_unset(con, NET_TIMER_ENABLED); } } #ifdef SSL_SUPPORT ssize_t net_con_ssl_accept(struct net_connection* con) { uhub_assert(con); net_con_flag_set(con, NET_WANT_SSL_ACCEPT); ssize_t ret = SSL_accept(con->ssl); #ifdef NETWORK_DUMP_DEBUG LOG_PROTO("SSL_accept() ret=%d", ret); #endif if (ret > 0) { net_con_flag_unset(con, NET_WANT_SSL_ACCEPT); net_con_flag_unset(con, NET_WANT_SSL_READ); } else { return handle_openssl_error(con, ret); } return ret; } ssize_t net_con_ssl_connect(struct net_connection* con) { uhub_assert(con); net_con_flag_set(con, NET_WANT_SSL_CONNECT); ssize_t ret = SSL_connect(con->ssl); #ifdef NETWORK_DUMP_DEBUG LOG_PROTO("SSL_connect() ret=%d", ret); #endif if (ret > 0) { net_con_flag_unset(con, NET_WANT_SSL_CONNECT); net_con_flag_unset(con, NET_WANT_SSL_WRITE); } else { return handle_openssl_error(con, ret); } return ret; } ssize_t net_con_ssl_handshake(struct net_connection* con, int ssl_mode) { uhub_assert(con); if (ssl_mode == NET_CON_SSL_MODE_SERVER) { con->ssl = SSL_new(g_hub->ssl_ctx); SSL_set_fd(con->ssl, con->sd); return net_con_ssl_accept(con); } else { con->ssl = SSL_new(SSL_CTX_new(TLSv1_method())); SSL_set_fd(con->ssl, con->sd); return net_con_ssl_connect(con); } } #endif /* SSL_SUPPORT */ static void net_timer_event(int fd, short ev, void *arg) { struct net_timer* timer = (struct net_timer*) arg; timer->callback(timer, timer->ptr); } void net_timer_initialize(struct net_timer* timer, net_timeout_cb callback, void* ptr) { timer->initialized = 0; timer->callback = callback; timer->ptr = ptr; } void net_timer_reset(struct net_timer* timer, int seconds) { struct timeval timeout = { seconds, 0 }; if (timer->initialized) { evtimer_del(&timer->timeout); timer->initialized = 0; } evtimer_set(&timer->timeout, net_timer_event, timer); evtimer_add(&timer->timeout, &timeout); } void net_timer_shutdown(struct net_timer* timer) { if (timer->initialized) { evtimer_del(&timer->timeout); timer->initialized = 0; } timer->callback = 0; timer->ptr = 0; }