summaryrefslogtreecommitdiff
path: root/bufferevent_mbedtls.c
diff options
context:
space:
mode:
authorokhowang(王沛文) <okhowang@tencent.com>2020-07-07 17:26:46 +0800
committerAzat Khuzhin <azat@libevent.org>2020-07-22 23:03:17 +0300
commitd095b834a9cc6df5aad8ec49bfc945c06b35af4d (patch)
tree5866798180449e7bb5b161c7c5ffdb9f460810a2 /bufferevent_mbedtls.c
parentdad699cc044748b0706049aa86df305f63cb0d1a (diff)
downloadlibevent-d095b834a9cc6df5aad8ec49bfc945c06b35af4d.tar.gz
Merge ssl implementations (openssl and mbedtls)
This patch splits common part out to avoid copy-paste from the - bufferevent_openssl.c - bufferevent_mbedtls.c It uses VFS/bufferevent-like approach, i.e. structure of callbacks.
Diffstat (limited to 'bufferevent_mbedtls.c')
-rw-r--r--bufferevent_mbedtls.c1349
1 files changed, 223 insertions, 1126 deletions
diff --git a/bufferevent_mbedtls.c b/bufferevent_mbedtls.c
index 5dc95f47..f1422019 100644
--- a/bufferevent_mbedtls.c
+++ b/bufferevent_mbedtls.c
@@ -24,51 +24,116 @@
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
-// Get rid of OSX 10.7 and greater deprecation warnings.
-#if defined(__APPLE__) && defined(__clang__)
-#pragma clang diagnostic ignored "-Wdeprecated-declarations"
-#endif
-
-#include "event2/event-config.h"
-#include "evconfig-private.h"
-
-#include <sys/types.h>
-
-#ifdef EVENT__HAVE_SYS_TIME_H
-#include <sys/time.h>
-#endif
-
-#include <errno.h>
-#include <stdio.h>
-#include <stdlib.h>
-#include <string.h>
-#ifdef EVENT__HAVE_STDARG_H
-#include <stdarg.h>
-#endif
-#ifdef EVENT__HAVE_UNISTD_H
-#include <unistd.h>
-#endif
-
-#ifdef _WIN32
-#include <winsock2.h>
-#endif
+#include <mbedtls/ssl.h>
+#include <mbedtls/net_sockets.h>
+#include <mbedtls/error.h>
+#include "event2/util.h"
+#include "util-internal.h"
+#include "event2/buffer.h"
#include "event2/bufferevent.h"
#include "event2/bufferevent_struct.h"
#include "event2/bufferevent_ssl.h"
-#include "event2/buffer.h"
-#include "event2/event.h"
+#include "ssl-compat.h"
#include "mm-internal.h"
-#include "bufferevent-internal.h"
-#include "log-internal.h"
-#include <mbedtls/ssl.h>
-#include <mbedtls/net_sockets.h>
-#include <mbedtls/error.h>
-#define SSL_ERROR_WANT_READ MBEDTLS_ERR_SSL_WANT_READ
-#define SSL_ERROR_WANT_WRITE MBEDTLS_ERR_SSL_WANT_WRITE
-#define SSL mbedtls_ssl_context
+struct mbedtls_context {
+ mbedtls_ssl_context *ssl;
+ mbedtls_net_context net;
+};
+static void *
+mbedtls_context_init(void *ssl)
+{
+ struct mbedtls_context *ctx = mm_malloc(sizeof(*ctx));
+ if (ctx) {
+ ctx->ssl = ssl;
+ ctx->net.fd = -1;
+ }
+ return ctx;
+}
+static void
+mbedtls_context_free(void *ssl, int flags)
+{
+ struct mbedtls_context *ctx = ssl;
+ if (flags & BEV_OPT_CLOSE_ON_FREE)
+ mbedtls_ssl_free(ctx->ssl);
+ mm_free(ctx);
+}
+static int
+mbedtls_context_renegotiate(void *ssl)
+{
+ struct mbedtls_context *ctx = ssl;
+ return mbedtls_ssl_renegotiate(ctx->ssl);
+}
+static int
+mbedtls_context_write(void *ssl, const unsigned char *buf, size_t len)
+{
+ struct mbedtls_context *ctx = ssl;
+ return mbedtls_ssl_write(ctx->ssl, buf, len);
+}
+static int
+mbedtls_context_read(void *ssl, unsigned char *buf, size_t len)
+{
+ struct mbedtls_context *ctx = ssl;
+ return mbedtls_ssl_read(ctx->ssl, buf, len);
+}
+static size_t
+mbedtls_context_pending(void *ssl)
+{
+ struct mbedtls_context *ctx = ssl;
+ return mbedtls_ssl_get_bytes_avail(ctx->ssl);
+}
+static int
+mbedtls_context_handshake(void *ssl)
+{
+ struct mbedtls_context *ctx = ssl;
+ return mbedtls_ssl_handshake(ctx->ssl);
+}
+static int
+mbedtls_get_error(void *ssl, int ret)
+{
+ return ret;
+}
+static void
+mbedtls_clear_error(void)
+{
+}
+static int
+mbedtls_clear(void *ssl)
+{
+ return 1;
+}
+static void
+mbedtls_set_ssl_noops(void *ssl)
+{
+}
+static int
+mbedtls_is_ok(int err)
+{
+ return err == 0;
+}
+static int
+mbedtls_is_want_read(int err)
+{
+ return err == MBEDTLS_ERR_SSL_WANT_READ;
+}
+static int
+mbedtls_is_want_write(int err)
+{
+ return err == MBEDTLS_ERR_SSL_WANT_WRITE;
+}
+
+static evutil_socket_t
+be_mbedtls_get_fd(void *ssl)
+{
+ struct bufferevent_ssl *bev = ssl;
+ struct mbedtls_context *ctx = bev->ssl;
+ return ctx->net.fd;
+}
+
+static int be_mbedtls_bio_set_fd(
+ struct bufferevent_ssl *bev_ssl, evutil_socket_t fd);
#if 0
static void
@@ -79,15 +144,17 @@ print_err(int val)
printf("Error was %d:%s\n", val, buf);
}
#else
-#define print_err(v) ((void)0)
+static void
+print_err(int val)
+{
+}
#endif
-
/* Called to extract data from the BIO. */
static int
bio_bufferevent_read(void *ctx, unsigned char *out, size_t outlen)
{
- struct bufferevent *bufev = (struct bufferevent*)ctx;
+ struct bufferevent *bufev = (struct bufferevent *)ctx;
int r = 0;
struct evbuffer *input;
@@ -111,7 +178,7 @@ bio_bufferevent_read(void *ctx, unsigned char *out, size_t outlen)
static int
bio_bufferevent_write(void *ctx, const unsigned char *in, size_t inlen)
{
- struct bufferevent *bufev = (struct bufferevent*)ctx;
+ struct bufferevent *bufev = (struct bufferevent *)ctx;
struct evbuffer *output;
size_t outlen;
@@ -123,7 +190,7 @@ bio_bufferevent_write(void *ctx, const unsigned char *in, size_t inlen)
/* Copy only as much data onto the output buffer as can fit under the
* high-water mark. */
- if (bufev->wm_write.high && bufev->wm_write.high <= (outlen+inlen)) {
+ if (bufev->wm_write.high && bufev->wm_write.high <= (outlen + inlen)) {
if (bufev->wm_write.high <= outlen) {
/* If no data can fit, we'll need to retry later. */
return MBEDTLS_ERR_SSL_WANT_WRITE;
@@ -136,239 +203,13 @@ bio_bufferevent_write(void *ctx, const unsigned char *in, size_t inlen)
return inlen;
}
-
-/* --------------------
- Now, here's the mbedTLS-based implementation of bufferevent.
-
- The implementation comes in only one flavors, that has the
- SSL object connect to a socket directly.
- -------------------- */
-
-struct bio_data_counts {
- unsigned long n_written;
- unsigned long n_read;
-};
-
-struct bufferevent_mbedtls {
- /* Shared fields with common bufferevent implementation code.
- If we were set up with an underlying bufferevent, we use the
- events here as timers only. If we have an SSL, then we use
- the events as socket events.
- */
- struct bufferevent_private bev;
- /* An underlying bufferevent that we're directing our output to.
- If it's NULL, then we're connected to an fd, not an evbuffer. */
- struct bufferevent *underlying;
- /* net fd */
- mbedtls_net_context net_ctx;
- /* The SSL object doing our encryption. */
- SSL *ssl;
-
- /* A callback that's invoked when data arrives on our outbuf so we
- know to write data to the SSL. */
- struct evbuffer_cb_entry *outbuf_cb;
-
- /* A count of how much data the bios have read/written total. Used
- for rate-limiting. */
- struct bio_data_counts counts;
-
- /* If this value is greater than 0, then the last SSL_write blocked,
- * and we need to try it again with this many bytes. */
- ev_ssize_t last_write;
-
-#define NUM_ERRORS 3
- ev_uint32_t errors[NUM_ERRORS];
-
- /* When we next get available space, we should say "read" instead of
- "write". This can happen if there's a renegotiation during a read
- operation. */
- unsigned read_blocked_on_write : 1;
- /* When we next get data, we should say "write" instead of "read". */
- unsigned write_blocked_on_read : 1;
- /* Treat TCP close before SSL close on SSL >= v3 as clean EOF. */
- unsigned allow_dirty_shutdown : 1;
- /* XXX */
- unsigned n_errors : 2;
-
- /* Are we currently connecting, accepting, or doing IO? */
- unsigned state : 2;
- /* If we reset fd, we sould reset state too */
- unsigned old_state : 2;
-};
-
-static int be_mbedtls_enable(struct bufferevent *, short);
-static int be_mbedtls_disable(struct bufferevent *, short);
-static void be_mbedtls_unlink(struct bufferevent *);
-static void be_mbedtls_destruct(struct bufferevent *);
-static int be_mbedtls_adj_timeouts(struct bufferevent *);
-static int be_mbedtls_flush(struct bufferevent *bufev,
- short iotype, enum bufferevent_flush_mode mode);
-static int be_mbedtls_ctrl(struct bufferevent *, enum bufferevent_ctrl_op, union bufferevent_ctrl_data *);
-
-const struct bufferevent_ops bufferevent_ops_mbedtls = {
- "mbedtls",
- evutil_offsetof(struct bufferevent_mbedtls, bev.bev),
- be_mbedtls_enable,
- be_mbedtls_disable,
- be_mbedtls_unlink,
- be_mbedtls_destruct,
- be_mbedtls_adj_timeouts,
- be_mbedtls_flush,
- be_mbedtls_ctrl,
-};
-
-/* Given a bufferevent, return a pointer to the bufferevent_mbedtls that
- * contains it, if any. */
-static inline struct bufferevent_mbedtls *
-upcast(struct bufferevent *bev)
-{
- struct bufferevent_mbedtls *bev_o;
- if (!BEV_IS_MBEDTLS(bev))
- return NULL;
- bev_o = (void*)( ((char*)bev) -
- evutil_offsetof(struct bufferevent_mbedtls, bev.bev));
- EVUTIL_ASSERT(BEV_IS_MBEDTLS(&bev_o->bev.bev));
- return bev_o;
-}
-
-static inline void
-put_error(struct bufferevent_mbedtls *bev_ssl, unsigned long err)
-{
- if (bev_ssl->n_errors == NUM_ERRORS)
- return;
- /* The error type according to openssl is "unsigned long", but
- openssl never uses more than 32 bits of it. It _can't_ use more
- than 32 bits of it, since it needs to report errors on systems
- where long is only 32 bits.
- */
- bev_ssl->errors[bev_ssl->n_errors++] = (ev_uint32_t) err;
-}
-
-/* Have the base communications channel (either the underlying bufferevent or
- * ev_read and ev_write) start reading. Take the read-blocked-on-write flag
- * into account. */
-static int
-start_reading(struct bufferevent_mbedtls *bev_ssl)
-{
- if (bev_ssl->underlying) {
- bufferevent_unsuspend_read_(bev_ssl->underlying,
- BEV_SUSPEND_FILT_READ);
- return 0;
- } else {
- struct bufferevent *bev = &bev_ssl->bev.bev;
- int r;
- r = bufferevent_add_event_(&bev->ev_read, &bev->timeout_read);
- if (r == 0 && bev_ssl->read_blocked_on_write)
- r = bufferevent_add_event_(&bev->ev_write,
- &bev->timeout_write);
- return r;
- }
-}
-
-/* Have the base communications channel (either the underlying bufferevent or
- * ev_read and ev_write) start writing. Take the write-blocked-on-read flag
- * into account. */
-static int
-start_writing(struct bufferevent_mbedtls *bev_ssl)
-{
- int r = 0;
- if (bev_ssl->underlying) {
- if (bev_ssl->write_blocked_on_read) {
- bufferevent_unsuspend_read_(bev_ssl->underlying,
- BEV_SUSPEND_FILT_READ);
- }
- } else {
- struct bufferevent *bev = &bev_ssl->bev.bev;
- r = bufferevent_add_event_(&bev->ev_write, &bev->timeout_write);
- if (!r && bev_ssl->write_blocked_on_read)
- r = bufferevent_add_event_(&bev->ev_read,
- &bev->timeout_read);
- }
- return r;
-}
-
static void
-stop_reading(struct bufferevent_mbedtls *bev_ssl)
-{
- if (bev_ssl->write_blocked_on_read)
- return;
- if (bev_ssl->underlying) {
- bufferevent_suspend_read_(bev_ssl->underlying,
- BEV_SUSPEND_FILT_READ);
- } else {
- struct bufferevent *bev = &bev_ssl->bev.bev;
- event_del(&bev->ev_read);
- }
-}
-
-static void
-stop_writing(struct bufferevent_mbedtls *bev_ssl)
-{
- if (bev_ssl->read_blocked_on_write)
- return;
- if (bev_ssl->underlying) {
- bufferevent_unsuspend_read_(bev_ssl->underlying,
- BEV_SUSPEND_FILT_READ);
- } else {
- struct bufferevent *bev = &bev_ssl->bev.bev;
- event_del(&bev->ev_write);
- }
-}
-
-static int
-set_rbow(struct bufferevent_mbedtls *bev_ssl)
-{
- if (!bev_ssl->underlying)
- stop_reading(bev_ssl);
- bev_ssl->read_blocked_on_write = 1;
- return start_writing(bev_ssl);
-}
-
-static int
-set_wbor(struct bufferevent_mbedtls *bev_ssl)
-{
- if (!bev_ssl->underlying)
- stop_writing(bev_ssl);
- bev_ssl->write_blocked_on_read = 1;
- return start_reading(bev_ssl);
-}
-
-static int
-clear_rbow(struct bufferevent_mbedtls *bev_ssl)
-{
- struct bufferevent *bev = &bev_ssl->bev.bev;
- int r = 0;
- bev_ssl->read_blocked_on_write = 0;
- if (!(bev->enabled & EV_WRITE))
- stop_writing(bev_ssl);
- if (bev->enabled & EV_READ)
- r = start_reading(bev_ssl);
- return r;
-}
-
-
-static int
-clear_wbor(struct bufferevent_mbedtls *bev_ssl)
-{
- struct bufferevent *bev = &bev_ssl->bev.bev;
- int r = 0;
- bev_ssl->write_blocked_on_read = 0;
- if (!(bev->enabled & EV_READ))
- stop_reading(bev_ssl);
- if (bev->enabled & EV_WRITE)
- r = start_writing(bev_ssl);
- return r;
-}
-
-static void
-conn_closed(struct bufferevent_mbedtls *bev_ssl, int when, int errcode, int ret)
+conn_closed(struct bufferevent_ssl *bev_ssl, int when, int errcode, int ret)
{
int event = BEV_EVENT_ERROR;
- //int dirty_shutdown = 0;
char buf[100];
- if (when & BEV_EVENT_READING && ret == 0)
- {
+ if (when & BEV_EVENT_READING && ret == 0) {
if (bev_ssl->allow_dirty_shutdown)
event = BEV_EVENT_EOF;
} else {
@@ -377,925 +218,181 @@ conn_closed(struct bufferevent_mbedtls *bev_ssl, int when, int errcode, int ret)
case MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY:
event = BEV_EVENT_EOF;
break;
- //case MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS:
- //case MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS:
case MBEDTLS_ERR_SSL_CLIENT_RECONNECT:
event_warnx("BUG: Unsupported feature %d: %s", errcode, buf);
break;
default:
/* should be impossible; treat as normal error. */
- event_warnx("BUG: Unexpected mbedtls error code %d: %s", errcode, buf);
+ event_warnx(
+ "BUG: Unexpected mbedtls error code %d: %s", errcode, buf);
break;
}
- put_error(bev_ssl, errcode);
+ bufferevent_ssl_put_error(bev_ssl, errcode);
}
-
- stop_reading(bev_ssl);
- stop_writing(bev_ssl);
+ bufferevent_ssl_stop_reading(bev_ssl);
+ bufferevent_ssl_stop_writing(bev_ssl);
bufferevent_run_eventcb_(&bev_ssl->bev.bev, when | event, 0);
}
-#define OP_MADE_PROGRESS 1
-#define OP_BLOCKED 2
-#define OP_ERR 4
-
-/* Return a bitmask of OP_MADE_PROGRESS (if we read anything); OP_BLOCKED (if
- we're now blocked); and OP_ERR (if an error occurred). */
-static int
-do_read(struct bufferevent_mbedtls *bev_ssl, int n_to_read) {
- /* Requires lock */
- struct bufferevent *bev = &bev_ssl->bev.bev;
- struct evbuffer *input = bev->input;
- int r, n, i, n_used = 0, atmost;
- struct evbuffer_iovec space[2];
- int result = 0;
-
- if (bev_ssl->bev.read_suspended)
- return 0;
-
- atmost = bufferevent_get_read_max_(&bev_ssl->bev);
- if (n_to_read > atmost)
- n_to_read = atmost;
-
- n = evbuffer_reserve_space(input, n_to_read, space, 2);
- if (n < 0)
- return OP_ERR;
-
- for (i=0; i<n; ++i) {
- if (bev_ssl->bev.read_suspended)
- break;
- r = mbedtls_ssl_read(bev_ssl->ssl, space[i].iov_base, space[i].iov_len);
- if (r>0) {
- result |= OP_MADE_PROGRESS;
- if (bev_ssl->read_blocked_on_write)
- if (clear_rbow(bev_ssl) < 0)
- return OP_ERR | result;
- ++n_used;
- space[i].iov_len = r;
- } else {
- int err = r;
- print_err(err);
- switch (err) {
- case SSL_ERROR_WANT_READ:
- /* Can't read until underlying has more data. */
- if (bev_ssl->read_blocked_on_write)
- if (clear_rbow(bev_ssl) < 0)
- return OP_ERR | result;
- break;
- case SSL_ERROR_WANT_WRITE:
- /* This read operation requires a write, and the
- * underlying is full */
- if (!bev_ssl->read_blocked_on_write)
- if (set_rbow(bev_ssl) < 0)
- return OP_ERR | result;
- break;
- default:
- conn_closed(bev_ssl, BEV_EVENT_READING, err, r);
- break;
- }
- result |= OP_BLOCKED;
- break; /* out of the loop */
- }
- }
-
- if (n_used) {
- evbuffer_commit_space(input, space, n_used);
- if (bev_ssl->underlying)
- BEV_RESET_GENERIC_READ_TIMEOUT(bev);
- }
-
- return result;
-}
-
-/* Return a bitmask of OP_MADE_PROGRESS (if we wrote anything); OP_BLOCKED (if
- we're now blocked); and OP_ERR (if an error occurred). */
static int
-do_write(struct bufferevent_mbedtls *bev_ssl, int atmost)
-{
- int i, r, n, n_written = 0;
- struct bufferevent *bev = &bev_ssl->bev.bev;
- struct evbuffer *output = bev->output;
- struct evbuffer_iovec space[8];
- int result = 0;
-
- if (bev_ssl->last_write > 0)
- atmost = bev_ssl->last_write;
- else
- atmost = bufferevent_get_write_max_(&bev_ssl->bev);
-
- n = evbuffer_peek(output, atmost, NULL, space, 8);
- if (n < 0)
- return OP_ERR | result;
-
- if (n > 8)
- n = 8;
- for (i=0; i < n; ++i) {
- if (bev_ssl->bev.write_suspended)
- break;
-
- /* SSL_write will (reasonably) return 0 if we tell it to
- send 0 data. Skip this case so we don't interpret the
- result as an error */
- if (space[i].iov_len == 0)
- continue;
-
- r = mbedtls_ssl_write(bev_ssl->ssl, space[i].iov_base,
- space[i].iov_len);
- if (r > 0) {
- result |= OP_MADE_PROGRESS;
- if (bev_ssl->write_blocked_on_read)
- if (clear_wbor(bev_ssl) < 0)
- return OP_ERR | result;
- n_written += r;
- bev_ssl->last_write = -1;
- } else {
- int err = r;
- print_err(err);
- switch (err) {
- case SSL_ERROR_WANT_WRITE:
- /* Can't read until underlying has more data. */
- if (bev_ssl->write_blocked_on_read)
- if (clear_wbor(bev_ssl) < 0)
- return OP_ERR | result;
- bev_ssl->last_write = space[i].iov_len;
- break;
- case SSL_ERROR_WANT_READ:
- /* This read operation requires a write, and the
- * underlying is full */
- if (!bev_ssl->write_blocked_on_read)
- if (set_wbor(bev_ssl) < 0)
- return OP_ERR | result;
- bev_ssl->last_write = space[i].iov_len;
- break;
- default:
- conn_closed(bev_ssl, BEV_EVENT_WRITING, err, r);
- bev_ssl->last_write = -1;
- break;
- }
- result |= OP_BLOCKED;
- break;
- }
- }
- if (n_written) {
- evbuffer_drain(output, n_written);
- if (bev_ssl->underlying)
- BEV_RESET_GENERIC_WRITE_TIMEOUT(bev);
-
- bufferevent_trigger_nolock_(bev, EV_WRITE, BEV_OPT_DEFER_CALLBACKS);
- }
- return result;
-}
-
-#define WRITE_FRAME 15000
-
-#define READ_DEFAULT 4096
-
-/* Try to figure out how many bytes to read; return 0 if we shouldn't be
- * reading. */
-static int
-bytes_to_read(struct bufferevent_mbedtls *bev)
-{
- struct evbuffer *input = bev->bev.bev.input;
- struct event_watermark *wm = &bev->bev.bev.wm_read;
- int result = READ_DEFAULT;
- ev_ssize_t limit;
- /* XXX 99% of this is generic code that nearly all bufferevents will
- * want. */
-
- if (bev->write_blocked_on_read) {
- return 0;
- }
-
- if (! (bev->bev.bev.enabled & EV_READ)) {
- return 0;
- }
-
- if (bev->bev.read_suspended) {
- return 0;
- }
-
- if (wm->high) {
- if (evbuffer_get_length(input) >= wm->high) {
- return 0;
- }
-
- result = wm->high - evbuffer_get_length(input);
- } else {
- result = READ_DEFAULT;
- }
-
- /* Respect the rate limit */
- limit = bufferevent_get_read_max_(&bev->bev);
- if (result > limit) {
- result = limit;
- }
-
- return result;
-}
-
-
-/* Things look readable. If write is blocked on read, write till it isn't.
- * Read from the underlying buffer until we block or we hit our high-water
- * mark.
- */
-static void
-consider_reading(struct bufferevent_mbedtls *bev_ssl)
-{
- int r;
- int n_to_read;
- int all_result_flags = 0;
-
- while (bev_ssl->write_blocked_on_read) {
- r = do_write(bev_ssl, WRITE_FRAME);
- if (r & (OP_BLOCKED|OP_ERR))
- break;
- }
- if (bev_ssl->write_blocked_on_read)
- return;
-
- n_to_read = bytes_to_read(bev_ssl);
-
- while (n_to_read) {
- r = do_read(bev_ssl, n_to_read);
- all_result_flags |= r;
-
- if (r & (OP_BLOCKED|OP_ERR))
- break;
-
- if (bev_ssl->bev.read_suspended)
- break;
-
- /* Read all pending data. This won't hit the network
- * again, and will (most importantly) put us in a state
- * where we don't need to read anything else until the
- * socket is readable again. It'll potentially make us
- * overrun our read high-watermark (somewhat
- * regrettable). The damage to the rate-limit has
- * already been done, since OpenSSL went and read a
- * whole SSL record anyway. */
- n_to_read = mbedtls_ssl_get_bytes_avail(bev_ssl->ssl);
-
- /* XXX This if statement is actually a bad bug, added to avoid
- * XXX a worse bug.
- *
- * The bad bug: It can potentially cause resource unfairness
- * by reading too much data from the underlying bufferevent;
- * it can potentially cause read looping if the underlying
- * bufferevent is a bufferevent_pair and deferred callbacks
- * aren't used.
- *
- * The worse bug: If we didn't do this, then we would
- * potentially not read any more from bev_ssl->underlying
- * until more data arrived there, which could lead to us
- * waiting forever.
- */
- if (!n_to_read && bev_ssl->underlying)
- n_to_read = bytes_to_read(bev_ssl);
- }
-
- if (all_result_flags & OP_MADE_PROGRESS) {
- struct bufferevent *bev = &bev_ssl->bev.bev;
-
- bufferevent_trigger_nolock_(bev, EV_READ, 0);
- }
-
- if (!bev_ssl->underlying) {
- /* Should be redundant, but let's avoid busy-looping */
- if (bev_ssl->bev.read_suspended ||
- !(bev_ssl->bev.bev.enabled & EV_READ)) {
- event_del(&bev_ssl->bev.bev.ev_read);
- }
- }
-}
-
-static void
-consider_writing(struct bufferevent_mbedtls *bev_ssl)
-{
- int r;
- struct evbuffer *output = bev_ssl->bev.bev.output;
- struct evbuffer *target = NULL;
- struct event_watermark *wm = NULL;
-
- while (bev_ssl->read_blocked_on_write) {
- r = do_read(bev_ssl, 1024); /* XXXX 1024 is a hack */
- if (r & OP_MADE_PROGRESS) {
- struct bufferevent *bev = &bev_ssl->bev.bev;
-
- bufferevent_trigger_nolock_(bev, EV_READ, 0);
- }
- if (r & (OP_ERR|OP_BLOCKED))
- break;
- }
- if (bev_ssl->read_blocked_on_write)
- return;
- if (bev_ssl->underlying) {
- target = bev_ssl->underlying->output;
- wm = &bev_ssl->underlying->wm_write;
- }
- while ((bev_ssl->bev.bev.enabled & EV_WRITE) &&
- (! bev_ssl->bev.write_suspended) &&
- evbuffer_get_length(output) &&
- (!target || (! wm->high || evbuffer_get_length(target) < wm->high))) {
- int n_to_write;
- if (wm && wm->high)
- n_to_write = wm->high - evbuffer_get_length(target);
- else
- n_to_write = WRITE_FRAME;
- r = do_write(bev_ssl, n_to_write);
- if (r & (OP_BLOCKED|OP_ERR))
- break;
- }
-
- if (!bev_ssl->underlying) {
- if (evbuffer_get_length(output) == 0) {
- event_del(&bev_ssl->bev.bev.ev_write);
- } else if (bev_ssl->bev.write_suspended ||
- !(bev_ssl->bev.bev.enabled & EV_WRITE)) {
- /* Should be redundant, but let's avoid busy-looping */
- event_del(&bev_ssl->bev.bev.ev_write);
- }
- }
-}
-
-static void
-be_mbedtls_readcb(struct bufferevent *bev_base, void *ctx)
-{
- struct bufferevent_mbedtls *bev_ssl = ctx;
- consider_reading(bev_ssl);
-}
-
-static void
-be_mbedtls_writecb(struct bufferevent *bev_base, void *ctx)
-{
- struct bufferevent_mbedtls *bev_ssl = ctx;
- consider_writing(bev_ssl);
-}
-
-static void
-be_mbedtls_eventcb(struct bufferevent *bev_base, short what, void *ctx)
-{
- struct bufferevent_mbedtls *bev_ssl = ctx;
- int event = 0;
-
- if (what & BEV_EVENT_EOF) {
- if (bev_ssl->allow_dirty_shutdown)
- event = BEV_EVENT_EOF;
- else
- event = BEV_EVENT_ERROR;
- } else if (what & BEV_EVENT_TIMEOUT) {
- /* We sure didn't set this. Propagate it to the user. */
- event = what;
- } else if (what & BEV_EVENT_ERROR) {
- /* An error occurred on the connection. Propagate it to the user. */
- event = what;
- } else if (what & BEV_EVENT_CONNECTED) {
- /* Ignore it. We're saying SSL_connect() already, which will
- eat it. */
- }
- if (event)
- bufferevent_run_eventcb_(&bev_ssl->bev.bev, event, 0);
-}
-
-static void
-be_mbedtls_readeventcb(evutil_socket_t fd, short what, void *ptr)
-{
- struct bufferevent_mbedtls *bev_ssl = ptr;
- bufferevent_incref_and_lock_(&bev_ssl->bev.bev);
- if (what == EV_TIMEOUT) {
- bufferevent_run_eventcb_(&bev_ssl->bev.bev,
- BEV_EVENT_TIMEOUT|BEV_EVENT_READING, 0);
- } else {
- consider_reading(bev_ssl);
- }
- bufferevent_decref_and_unlock_(&bev_ssl->bev.bev);
-}
-
-static void
-be_mbedtls_writeeventcb(evutil_socket_t fd, short what, void *ptr)
-{
- struct bufferevent_mbedtls *bev_ssl = ptr;
- bufferevent_incref_and_lock_(&bev_ssl->bev.bev);
- if (what == EV_TIMEOUT) {
- bufferevent_run_eventcb_(&bev_ssl->bev.bev,
- BEV_EVENT_TIMEOUT|BEV_EVENT_WRITING, 0);
- } else {
- consider_writing(bev_ssl);
- }
- bufferevent_decref_and_unlock_(&bev_ssl->bev.bev);
-}
-
-static evutil_socket_t
-be_mbedtls_auto_fd(struct bufferevent_mbedtls *bev_ssl, evutil_socket_t fd)
+be_mbedtls_bio_set_fd(struct bufferevent_ssl *bev_ssl, evutil_socket_t fd)
{
+ struct mbedtls_context *ctx = bev_ssl->ssl;
if (!bev_ssl->underlying) {
- struct bufferevent *bev = &bev_ssl->bev.bev;
- if (event_initialized(&bev->ev_read) && fd < 0) {
- fd = event_get_fd(&bev->ev_read);
- }
- }
- return fd;
-}
-
-static int
-set_open_callbacks(struct bufferevent_mbedtls *bev_ssl, evutil_socket_t fd)
-{
- if (bev_ssl->underlying) {
- bufferevent_setcb(bev_ssl->underlying,
- be_mbedtls_readcb, be_mbedtls_writecb, be_mbedtls_eventcb,
- bev_ssl);
- return 0;
- } else {
- struct bufferevent *bev = &bev_ssl->bev.bev;
- int rpending=0, wpending=0, r1=0, r2=0;
-
- if (event_initialized(&bev->ev_read)) {
- rpending = event_pending(&bev->ev_read, EV_READ, NULL);
- wpending = event_pending(&bev->ev_write, EV_WRITE, NULL);
-
- event_del(&bev->ev_read);
- event_del(&bev->ev_write);
- }
-
- event_assign(&bev->ev_read, bev->ev_base, fd,
- EV_READ|EV_PERSIST|EV_FINALIZE,
- be_mbedtls_readeventcb, bev_ssl);
- event_assign(&bev->ev_write, bev->ev_base, fd,
- EV_WRITE|EV_PERSIST|EV_FINALIZE,
- be_mbedtls_writeeventcb, bev_ssl);
-
- if (rpending)
- r1 = bufferevent_add_event_(&bev->ev_read, &bev->timeout_read);
- if (wpending)
- r2 = bufferevent_add_event_(&bev->ev_write, &bev->timeout_write);
-
- return (r1<0 || r2<0) ? -1 : 0;
- }
-}
-
-static int
-do_handshake(struct bufferevent_mbedtls *bev_ssl)
-{
- int r;
-
- switch (bev_ssl->state) {
- default:
- case BUFFEREVENT_SSL_OPEN:
- EVUTIL_ASSERT(0);
- return -1;
- case BUFFEREVENT_SSL_CONNECTING:
- case BUFFEREVENT_SSL_ACCEPTING:
- r = mbedtls_ssl_handshake(bev_ssl->ssl);
- break;
- }
-
- if (r==0) {
- evutil_socket_t fd = event_get_fd(&bev_ssl->bev.bev.ev_read);
- /* We're done! */
- bev_ssl->state = BUFFEREVENT_SSL_OPEN;
- set_open_callbacks(bev_ssl, fd); /* XXXX handle failure */
- /* Call do_read and do_write as needed */
- bufferevent_enable(&bev_ssl->bev.bev, bev_ssl->bev.bev.enabled);
- bufferevent_run_eventcb_(&bev_ssl->bev.bev,
- BEV_EVENT_CONNECTED, 0);
- return 1;
+ ctx->net.fd = fd;
+ mbedtls_ssl_set_bio(
+ ctx->ssl, &ctx->net, mbedtls_net_send, mbedtls_net_recv, NULL);
} else {
- int err = r;
- print_err(err);
- switch (err) {
- case SSL_ERROR_WANT_WRITE:
- stop_reading(bev_ssl);
- return start_writing(bev_ssl);
- case SSL_ERROR_WANT_READ:
- stop_writing(bev_ssl);
- return start_reading(bev_ssl);
- default:
- conn_closed(bev_ssl, BEV_EVENT_READING, err, r);
- return -1;
- }
+ mbedtls_ssl_set_bio(ctx->ssl, bev_ssl->underlying,
+ bio_bufferevent_write, bio_bufferevent_read, NULL);
}
+ return 0;
}
-static void
-be_mbedtls_handshakecb(struct bufferevent *bev_base, void *ctx)
+int
+bufferevent_mbedtls_get_allow_dirty_shutdown(struct bufferevent *bev)
{
- struct bufferevent_mbedtls *bev_ssl = ctx;
- do_handshake(bev_ssl);/* XXX handle failure */
+ return bufferevent_ssl_get_allow_dirty_shutdown(bev);
}
-static void
-be_mbedtls_handshakeeventcb(evutil_socket_t fd, short what, void *ptr)
+void
+bufferevent_mbedtls_set_allow_dirty_shutdown(
+ struct bufferevent *bev, int allow_dirty_shutdown)
{
- struct bufferevent_mbedtls *bev_ssl = ptr;
-
- bufferevent_incref_and_lock_(&bev_ssl->bev.bev);
- if (what & EV_TIMEOUT) {
- bufferevent_run_eventcb_(&bev_ssl->bev.bev, BEV_EVENT_TIMEOUT, 0);
- } else
- do_handshake(bev_ssl);/* XXX handle failure */
- bufferevent_decref_and_unlock_(&bev_ssl->bev.bev);
+ bufferevent_ssl_set_allow_dirty_shutdown(bev, allow_dirty_shutdown);
}
-static int
-set_handshake_callbacks(struct bufferevent_mbedtls *bev_ssl, evutil_socket_t fd)
+mbedtls_ssl_context *
+bufferevent_mbedtls_get_ssl(struct bufferevent *bufev)
{
- if (bev_ssl->underlying) {
- bufferevent_setcb(bev_ssl->underlying,
- be_mbedtls_handshakecb, be_mbedtls_handshakecb,
- be_mbedtls_eventcb,
- bev_ssl);
-
- if (fd < 0)
- return 0;
-
- if (bufferevent_setfd(bev_ssl->underlying, fd))
- return 1;
-
- return do_handshake(bev_ssl);
- } else {
- struct bufferevent *bev = &bev_ssl->bev.bev;
-
- if (event_initialized(&bev->ev_read)) {
- event_del(&bev->ev_read);
- event_del(&bev->ev_write);
- }
-
- event_assign(&bev->ev_read, bev->ev_base, fd,
- EV_READ|EV_PERSIST|EV_FINALIZE,
- be_mbedtls_handshakeeventcb, bev_ssl);
- event_assign(&bev->ev_write, bev->ev_base, fd,
- EV_WRITE|EV_PERSIST|EV_FINALIZE,
- be_mbedtls_handshakeeventcb, bev_ssl);
- if (fd >= 0)
- bufferevent_enable(bev, bev->enabled);
- return 0;
- }
+ struct mbedtls_context *ctx = NULL;
+ struct bufferevent_ssl *bev_ssl = bufferevent_ssl_upcast(bufev);
+ if (!bev_ssl)
+ return NULL;
+ ctx = bev_ssl->ssl;
+ return ctx->ssl;
}
int
-bufferevent_mbedtls_renegotiate(struct bufferevent *bev)
+bufferevent_mbedtls_renegotiate(struct bufferevent *bufev)
{
- struct bufferevent_mbedtls *bev_ssl = upcast(bev);
+ struct bufferevent_ssl *bev_ssl = bufferevent_ssl_upcast(bufev);
if (!bev_ssl)
return -1;
- if (mbedtls_ssl_renegotiate(bev_ssl->ssl) < 0)
- return -1;
- bev_ssl->state = BUFFEREVENT_SSL_CONNECTING;
- if (set_handshake_callbacks(bev_ssl, be_mbedtls_auto_fd(bev_ssl, -1)) < 0)
- return -1;
- if (!bev_ssl->underlying)
- return do_handshake(bev_ssl);
- return 0;
-}
-
-static void
-be_mbedtls_outbuf_cb(struct evbuffer *buf,
- const struct evbuffer_cb_info *cbinfo, void *arg)
-{
- struct bufferevent_mbedtls *bev_ssl = arg;
- int r = 0;
- /* XXX need to hold a reference here. */
-
- if (cbinfo->n_added && bev_ssl->state == BUFFEREVENT_SSL_OPEN) {
- if (cbinfo->orig_size == 0)
- r = bufferevent_add_event_(&bev_ssl->bev.bev.ev_write,
- &bev_ssl->bev.bev.timeout_write);
-
- if (bev_ssl->underlying)
- consider_writing(bev_ssl);
- }
- /* XXX Handle r < 0 */
- (void)r;
-}
-
-
-static int
-be_mbedtls_enable(struct bufferevent *bev, short events)
-{
- struct bufferevent_mbedtls *bev_ssl = upcast(bev);
- int r1 = 0, r2 = 0;
-
- if (events & EV_READ)
- r1 = start_reading(bev_ssl);
- if (events & EV_WRITE)
- r2 = start_writing(bev_ssl);
-
- if (bev_ssl->underlying) {
- if (events & EV_READ)
- BEV_RESET_GENERIC_READ_TIMEOUT(bev);
- if (events & EV_WRITE)
- BEV_RESET_GENERIC_WRITE_TIMEOUT(bev);
-
- if (events & EV_READ)
- consider_reading(bev_ssl);
- if (events & EV_WRITE)
- consider_writing(bev_ssl);
- }
- return (r1 < 0 || r2 < 0) ? -1 : 0;
-}
-
-static int
-be_mbedtls_disable(struct bufferevent *bev, short events)
-{
- struct bufferevent_mbedtls *bev_ssl = upcast(bev);
-
- if (events & EV_READ)
- stop_reading(bev_ssl);
- if (events & EV_WRITE)
- stop_writing(bev_ssl);
-
- if (bev_ssl->underlying) {
- if (events & EV_READ)
- BEV_DEL_GENERIC_READ_TIMEOUT(bev);
- if (events & EV_WRITE)
- BEV_DEL_GENERIC_WRITE_TIMEOUT(bev);
- }
- return 0;
+ return bufferevent_ssl_renegotiate_impl(bufev);
}
-static void
-be_mbedtls_unlink(struct bufferevent *bev)
-{
- struct bufferevent_mbedtls *bev_ssl = upcast(bev);
-
- if (bev_ssl->bev.options & BEV_OPT_CLOSE_ON_FREE) {
- if (bev_ssl->underlying) {
- if (BEV_UPCAST(bev_ssl->underlying)->refcnt < 2) {
- event_warnx("BEV_OPT_CLOSE_ON_FREE set on an "
- "bufferevent with too few references");
- } else {
- mbedtls_ssl_set_bio(bev_ssl->ssl, NULL, NULL, NULL, NULL);
- bufferevent_free(bev_ssl->underlying);
- /* We still have a reference to it, via our
- * BIO. So we don't drop this. */
- // bev_ssl->underlying = NULL;
- }
- }
- } else {
- if (bev_ssl->underlying) {
- if (bev_ssl->underlying->errorcb == be_mbedtls_eventcb)
- bufferevent_setcb(bev_ssl->underlying,
- NULL,NULL,NULL,NULL);
- bufferevent_unsuspend_read_(bev_ssl->underlying,
- BEV_SUSPEND_FILT_READ);
- }
- }
-}
-
-static void
-be_mbedtls_destruct(struct bufferevent *bev)
-{
- struct bufferevent_mbedtls *bev_ssl = upcast(bev);
-
- if (bev_ssl->bev.options & BEV_OPT_CLOSE_ON_FREE) {
- if (! bev_ssl->underlying) {
- evutil_socket_t fd = (evutil_socket_t)bev_ssl->net_ctx.fd;
- if (fd >= 0)
- evutil_closesocket(fd);
- }
- mbedtls_ssl_free(bev_ssl->ssl);
- }
-}
-
-static int
-be_mbedtls_adj_timeouts(struct bufferevent *bev)
-{
- struct bufferevent_mbedtls *bev_ssl = upcast(bev);
-
- if (bev_ssl->underlying) {
- return bufferevent_generic_adj_timeouts_(bev);
- } else {
- return bufferevent_generic_adj_existing_timeouts_(bev);
- }
-}
-
-static int
-be_mbedtls_flush(struct bufferevent *bufev,
- short iotype, enum bufferevent_flush_mode mode)
-{
- /* XXXX Implement this. */
- return 0;
-}
-
-static int
-be_mbedtls_set_fd(struct bufferevent_mbedtls *bev_ssl,
- enum bufferevent_ssl_state state, evutil_socket_t fd)
-{
- if (!bev_ssl->underlying) {
- bev_ssl->net_ctx.fd = fd;
- mbedtls_ssl_set_bio(bev_ssl->ssl, &(bev_ssl->net_ctx), mbedtls_net_send, mbedtls_net_recv, NULL);
- } else {
- mbedtls_ssl_set_bio(bev_ssl->ssl, bev_ssl->underlying, bio_bufferevent_write, bio_bufferevent_read, NULL);
- }
-
- bev_ssl->state = state;
-
- switch (state) {
- case BUFFEREVENT_SSL_ACCEPTING:
- if (bev_ssl->ssl->conf->endpoint != MBEDTLS_SSL_IS_SERVER)
- return -1;
- if (set_handshake_callbacks(bev_ssl, fd) < 0)
- return -1;
- break;
- case BUFFEREVENT_SSL_CONNECTING:
- if (bev_ssl->ssl->conf->endpoint != MBEDTLS_SSL_IS_CLIENT)
- return -1;
- if (set_handshake_callbacks(bev_ssl, fd) < 0)
- return -1;
- break;
- case BUFFEREVENT_SSL_OPEN:
- if (set_open_callbacks(bev_ssl, fd) < 0)
- return -1;
- break;
- default:
- return -1;
- }
-
- return 0;
-}
-
-static int
-be_mbedtls_ctrl(struct bufferevent *bev,
- enum bufferevent_ctrl_op op, union bufferevent_ctrl_data *data)
-{
- struct bufferevent_mbedtls *bev_ssl = upcast(bev);
- switch (op) {
- case BEV_CTRL_SET_FD:
- if (!bev_ssl->underlying) {
- //bev_ssl->net_ctx.fd = data->fd;
- //mbedtls_ssl_set_bio(bev_ssl->ssl, &(bev_ssl->net_ctx), mbedtls_net_send, mbedtls_net_recv, NULL);
- } else {
- //mbedtls_ssl_set_bio(bev_ssl->ssl, bev_ssl->underlying, bio_bufferevent_write, bio_bufferevent_read, NULL);
- }
-
- return be_mbedtls_set_fd(bev_ssl, bev_ssl->old_state, data->fd);
- case BEV_CTRL_GET_FD:
- if (bev_ssl->underlying) {
- data->fd = event_get_fd(&bev_ssl->underlying->ev_read);
- } else {
- data->fd = event_get_fd(&bev->ev_read);
- }
- return 0;
- case BEV_CTRL_GET_UNDERLYING:
- data->ptr = bev_ssl->underlying;
- return 0;
- case BEV_CTRL_CANCEL_ALL:
- default:
- return -1;
- }
-}
-
-SSL *
-bufferevent_mbedtls_get_ssl(struct bufferevent *bufev)
+unsigned long
+bufferevent_get_mbedtls_error(struct bufferevent *bufev)
{
- struct bufferevent_mbedtls *bev_ssl = upcast(bufev);
+ struct bufferevent_ssl *bev_ssl = bufferevent_ssl_upcast(bufev);
if (!bev_ssl)
- return NULL;
- return bev_ssl->ssl;
-}
+ return -1;
+ return bufferevent_get_ssl_error(bufev);
+}
+
+static struct le_ssl_ops le_mbedtls_ops = {
+ mbedtls_context_init,
+ mbedtls_context_free,
+ (void (*)(void *))mbedtls_ssl_free,
+ mbedtls_context_renegotiate,
+ mbedtls_context_write,
+ mbedtls_context_read,
+ mbedtls_context_pending,
+ mbedtls_context_handshake,
+ mbedtls_get_error,
+ mbedtls_clear_error,
+ mbedtls_clear,
+ mbedtls_set_ssl_noops,
+ mbedtls_set_ssl_noops,
+ mbedtls_is_ok,
+ mbedtls_is_want_read,
+ mbedtls_is_want_write,
+ be_mbedtls_get_fd,
+ be_mbedtls_bio_set_fd,
+ mbedtls_set_ssl_noops,
+ (void (*)(struct bufferevent_ssl *))mbedtls_set_ssl_noops,
+ (void (*)(struct bufferevent_ssl *))mbedtls_set_ssl_noops,
+ conn_closed,
+ print_err,
+};
-static struct bufferevent *
-bufferevent_mbedtls_new_impl(struct event_base *base,
- struct bufferevent *underlying,
- evutil_socket_t fd,
- SSL *ssl,
- enum bufferevent_ssl_state state,
- int options)
+struct bufferevent *
+bufferevent_mbedtls_filter_new(struct event_base *base,
+ struct bufferevent *underlying, mbedtls_ssl_context *ssl,
+ enum bufferevent_ssl_state state, int options)
{
- struct bufferevent_mbedtls *bev_ssl = NULL;
- struct bufferevent_private *bev_p = NULL;
- int tmp_options = options & ~BEV_OPT_THREADSAFE;
-
- /* Only one can be set. */
- if (underlying != NULL && fd >= 0)
- goto err;
-
- if (!(bev_ssl = mm_calloc(1, sizeof(struct bufferevent_mbedtls))))
- goto err;
-
- bev_p = &bev_ssl->bev;
+ struct bufferevent *bev;
- if (bufferevent_init_common_(bev_p, base,
- &bufferevent_ops_mbedtls, tmp_options) < 0)
+ if (!underlying)
goto err;
- bev_ssl->underlying = underlying;
- bev_ssl->ssl = ssl;
+ bev = bufferevent_ssl_new_impl(
+ base, underlying, -1, ssl, state, options, &le_mbedtls_ops);
- bev_ssl->outbuf_cb = evbuffer_add_cb(bev_p->bev.output,
- be_mbedtls_outbuf_cb, bev_ssl);
-
- if (options & BEV_OPT_THREADSAFE)
- bufferevent_enable_locking_(&bev_ssl->bev.bev, NULL);
-
- if (underlying) {
- bufferevent_init_generic_timeout_cbs_(&bev_ssl->bev.bev);
- bufferevent_incref_(underlying);
+ if (bev) {
+ be_mbedtls_bio_set_fd(bufferevent_ssl_upcast(bev), -1);
}
- bev_ssl->old_state = state;
- bev_ssl->last_write = -1;
-
- fd = be_mbedtls_auto_fd(bev_ssl, fd);
- if (be_mbedtls_set_fd(bev_ssl, state, fd))
- goto err;
-
- if (underlying) {
- bufferevent_setwatermark(underlying, EV_READ, 0, 0);
- bufferevent_enable(underlying, EV_READ|EV_WRITE);
- if (state == BUFFEREVENT_SSL_OPEN)
- bufferevent_suspend_read_(underlying,
- BEV_SUSPEND_FILT_READ);
- }
+ return bev;
- return &bev_ssl->bev.bev;
err:
if (options & BEV_OPT_CLOSE_ON_FREE)
mbedtls_ssl_free(ssl);
- if (bev_ssl) {
- bev_ssl->ssl = NULL;
- bufferevent_free(&bev_ssl->bev.bev);
- }
return NULL;
}
struct bufferevent *
-bufferevent_mbedtls_filter_new(struct event_base *base,
- struct bufferevent *underlying,
- SSL *ssl,
- enum bufferevent_ssl_state state,
- int options)
+bufferevent_mbedtls_socket_new(struct event_base *base, evutil_socket_t fd,
+ mbedtls_ssl_context *ssl, enum bufferevent_ssl_state state, int options)
{
+ long have_fd = -1;
struct bufferevent *bev;
- if (!underlying)
- goto err;
-
- bev = bufferevent_mbedtls_new_impl(
- base, underlying, -1, ssl, state, options);
- return bev;
-
-err:
- if (options & BEV_OPT_CLOSE_ON_FREE)
- mbedtls_ssl_free(ssl);
- return NULL;
-}
+ if (ssl->p_bio) {
+ /* The SSL is already configured with bio. */
+ if (ssl->f_send == mbedtls_net_send &&
+ ssl->f_recv == mbedtls_net_recv) {
+ have_fd = ((mbedtls_net_context *)ssl->p_bio)->fd;
+ } else if (ssl->f_send == bio_bufferevent_write &&
+ ssl->f_recv == bio_bufferevent_read) {
+ have_fd = bufferevent_getfd(ssl->p_bio);
+ } else {
+ /* We don't known the fd. */
+ have_fd = LONG_MAX;
+ }
+ }
-struct bufferevent *
-bufferevent_mbedtls_socket_new(struct event_base *base,
- evutil_socket_t fd,
- SSL *ssl,
- enum bufferevent_ssl_state state,
- int options)
-{
+ if (have_fd >= 0) {
+ if (fd < 0) {
+ /* We should learn the fd from the SSL. */
+ fd = (evutil_socket_t)have_fd;
+ } else if (have_fd == (long)fd) {
+ /* We already know the fd from the SSL; do nothing */
+ } else {
+ /* We specified an fd different from that of the SSL.
+ This is probably an error on our part. Fail. */
+ goto err;
+ }
+ } else {
if (fd >= 0) {
/* ... and we have an fd we want to use. */
} else {
/* Leave the fd unset. */
}
+ }
- return bufferevent_mbedtls_new_impl(
- base, NULL, fd, ssl, state, options);
-
-}
-
-int
-bufferevent_mbedtls_get_allow_dirty_shutdown(struct bufferevent *bev)
-{
- int allow_dirty_shutdown = -1;
- struct bufferevent_mbedtls *bev_ssl;
- BEV_LOCK(bev);
- bev_ssl = upcast(bev);
- if (bev_ssl)
- allow_dirty_shutdown = bev_ssl->allow_dirty_shutdown;
- BEV_UNLOCK(bev);
- return allow_dirty_shutdown;
-}
-
-void
-bufferevent_mbedtls_set_allow_dirty_shutdown(struct bufferevent *bev,
- int allow_dirty_shutdown)
-{
- struct bufferevent_mbedtls *bev_ssl;
- BEV_LOCK(bev);
- bev_ssl = upcast(bev);
- if (bev_ssl)
- bev_ssl->allow_dirty_shutdown = !!allow_dirty_shutdown;
- BEV_UNLOCK(bev);
-}
+ bev = bufferevent_ssl_new_impl(
+ base, NULL, fd, ssl, state, options, &le_mbedtls_ops);
-unsigned long
-bufferevent_get_mbedtls_error(struct bufferevent *bev)
-{
- unsigned long err = 0;
- struct bufferevent_mbedtls *bev_ssl;
- BEV_LOCK(bev);
- bev_ssl = upcast(bev);
- if (bev_ssl && bev_ssl->n_errors) {
- err = bev_ssl->errors[--bev_ssl->n_errors];
+ if (bev) {
+ be_mbedtls_bio_set_fd(bufferevent_ssl_upcast(bev), fd);
}
- BEV_UNLOCK(bev);
- return err;
+
+ return bev;
+err:
+ return NULL;
}