summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorSam Roberts <vieuxtech@gmail.com>2019-03-27 12:10:21 -0700
committerSam Roberts <vieuxtech@gmail.com>2019-03-28 14:03:18 -0700
commitbcbd35a48d00c915690682b546e6c282bd15150b (patch)
treea19f2dd6196b88399443762f63668f90c0c322c2 /src
parent805e614ba7401a04330d8f2878d61213268d6e8b (diff)
downloadnode-new-bcbd35a48d00c915690682b546e6c282bd15150b.tar.gz
crypto: add openssl specific error properties
Don't force the user to parse the long-style OpenSSL error message, decorate the error with the library, reason, code, function. PR-URL: https://github.com/nodejs/node/pull/26868 Reviewed-By: Anna Henningsen <anna@addaleax.net> Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl> Reviewed-By: Tobias Nießen <tniessen@tnie.de>
Diffstat (limited to 'src')
-rw-r--r--src/node_crypto.cc115
-rw-r--r--src/tls_wrap.cc2
-rw-r--r--src/util-inl.h11
-rw-r--r--src/util.h4
4 files changed, 130 insertions, 2 deletions
diff --git a/src/node_crypto.cc b/src/node_crypto.cc
index 8b5e6dee2f..c86414fc62 100644
--- a/src/node_crypto.cc
+++ b/src/node_crypto.cc
@@ -212,6 +212,113 @@ static int NoPasswordCallback(char* buf, int size, int rwflag, void* u) {
}
+// namespace node::crypto::error
+namespace error {
+void Decorate(Environment* env, Local<Object> obj,
+ unsigned long err) { // NOLINT(runtime/int)
+ if (err == 0) return; // No decoration possible.
+
+ const char* ls = ERR_lib_error_string(err);
+ const char* fs = ERR_func_error_string(err);
+ const char* rs = ERR_reason_error_string(err);
+
+ Isolate* isolate = env->isolate();
+ Local<Context> context = isolate->GetCurrentContext();
+
+ if (ls != nullptr) {
+ if (obj->Set(context, env->library_string(),
+ OneByteString(isolate, ls)).IsNothing()) {
+ return;
+ }
+ }
+ if (fs != nullptr) {
+ if (obj->Set(context, env->function_string(),
+ OneByteString(isolate, fs)).IsNothing()) {
+ return;
+ }
+ }
+ if (rs != nullptr) {
+ if (obj->Set(context, env->reason_string(),
+ OneByteString(isolate, rs)).IsNothing()) {
+ return;
+ }
+
+ // SSL has no API to recover the error name from the number, so we
+ // transform reason strings like "this error" to "ERR_SSL_THIS_ERROR",
+ // which ends up being close to the original error macro name.
+ std::string reason(rs);
+
+ for (auto& c : reason) {
+ if (c == ' ')
+ c = '_';
+ else
+ c = ToUpper(c);
+ }
+
+#define OSSL_ERROR_CODES_MAP(V) \
+ V(SYS) \
+ V(BN) \
+ V(RSA) \
+ V(DH) \
+ V(EVP) \
+ V(BUF) \
+ V(OBJ) \
+ V(PEM) \
+ V(DSA) \
+ V(X509) \
+ V(ASN1) \
+ V(CONF) \
+ V(CRYPTO) \
+ V(EC) \
+ V(SSL) \
+ V(BIO) \
+ V(PKCS7) \
+ V(X509V3) \
+ V(PKCS12) \
+ V(RAND) \
+ V(DSO) \
+ V(ENGINE) \
+ V(OCSP) \
+ V(UI) \
+ V(COMP) \
+ V(ECDSA) \
+ V(ECDH) \
+ V(OSSL_STORE) \
+ V(FIPS) \
+ V(CMS) \
+ V(TS) \
+ V(HMAC) \
+ V(CT) \
+ V(ASYNC) \
+ V(KDF) \
+ V(SM2) \
+ V(USER) \
+
+#define V(name) case ERR_LIB_##name: lib = #name "_"; break;
+ const char* lib = "";
+ const char* prefix = "OSSL_";
+ switch (ERR_GET_LIB(err)) { OSSL_ERROR_CODES_MAP(V) }
+#undef V
+#undef OSSL_ERROR_CODES_MAP
+ // Don't generate codes like "ERR_OSSL_SSL_".
+ if (lib && strcmp(lib, "SSL_") == 0)
+ prefix = "";
+
+ // All OpenSSL reason strings fit in a single 80-column macro definition,
+ // all prefix lengths are <= 10, and ERR_OSSL_ is 9, so 128 is more than
+ // sufficient.
+ char code[128];
+ snprintf(code, sizeof(code), "ERR_%s%s%s", prefix, lib, reason.c_str());
+
+ if (obj->Set(env->isolate()->GetCurrentContext(),
+ env->code_string(),
+ OneByteString(env->isolate(), code)).IsNothing())
+ return;
+ }
+}
+} // namespace error
+
+
struct CryptoErrorVector : public std::vector<std::string> {
inline void Capture() {
clear();
@@ -258,6 +365,8 @@ struct CryptoErrorVector : public std::vector<std::string> {
void ThrowCryptoError(Environment* env,
unsigned long err, // NOLINT(runtime/int)
+ // Default, only used if there is no SSL `err` which can
+ // be used to create a long-style message string.
const char* message = nullptr) {
char message_buffer[128] = {0};
if (err != 0 || message == nullptr) {
@@ -270,7 +379,11 @@ void ThrowCryptoError(Environment* env,
.ToLocalChecked();
CryptoErrorVector errors;
errors.Capture();
- auto exception = errors.ToException(env, exception_string);
+ Local<Value> exception = errors.ToException(env, exception_string);
+ Local<Object> obj;
+ if (!exception->ToObject(env->context()).ToLocal(&obj))
+ return;
+ error::Decorate(env, obj, err);
env->isolate()->ThrowException(exception);
}
diff --git a/src/tls_wrap.cc b/src/tls_wrap.cc
index 59400d8f3a..14802b1dfb 100644
--- a/src/tls_wrap.cc
+++ b/src/tls_wrap.cc
@@ -453,7 +453,7 @@ Local<Value> TLSWrap::GetSSLError(int status, int* err, std::string* msg) {
if (c == ' ')
c = '_';
else
- c = ::toupper(c);
+ c = ToUpper(c);
}
obj->Set(context, env()->code_string(),
OneByteString(isolate, ("ERR_SSL_" + code).c_str()))
diff --git a/src/util-inl.h b/src/util-inl.h
index 5b59f25bc5..99d470205e 100644
--- a/src/util-inl.h
+++ b/src/util-inl.h
@@ -274,6 +274,17 @@ std::string ToLower(const std::string& in) {
return out;
}
+char ToUpper(char c) {
+ return c >= 'a' && c <= 'z' ? (c - 'a') + 'A' : c;
+}
+
+std::string ToUpper(const std::string& in) {
+ std::string out(in.size(), 0);
+ for (size_t i = 0; i < in.size(); ++i)
+ out[i] = ToUpper(in[i]);
+ return out;
+}
+
bool StringEqualNoCase(const char* a, const char* b) {
do {
if (*a == '\0')
diff --git a/src/util.h b/src/util.h
index 56b2bc8338..a9de8f8636 100644
--- a/src/util.h
+++ b/src/util.h
@@ -284,6 +284,10 @@ inline void SwapBytes64(char* data, size_t nbytes);
inline char ToLower(char c);
inline std::string ToLower(const std::string& in);
+// toupper() is locale-sensitive. Use ToUpper() instead.
+inline char ToUpper(char c);
+inline std::string ToUpper(const std::string& in);
+
// strcasecmp() is locale-sensitive. Use StringEqualNoCase() instead.
inline bool StringEqualNoCase(const char* a, const char* b);