/dep/acelite/ace/SSL/SSL_SOCK_Stream.inl

https://gitlab.com/mohsencs/SunWellCore · C++ Header · 364 lines · 267 code · 65 blank · 32 comment · 33 complexity · ee5b9b7f4c91517643334e291aa881a3 MD5 · raw file

  1. // -*- C++ -*-
  2. #include "ace/OS_NS_errno.h"
  3. #include "ace/Truncate.h"
  4. ACE_BEGIN_VERSIONED_NAMESPACE_DECL
  5. ACE_INLINE void
  6. ACE_SSL_SOCK_Stream::set_handle (ACE_HANDLE fd)
  7. {
  8. if (this->ssl_ == 0 || fd == ACE_INVALID_HANDLE)
  9. {
  10. this->ACE_SSL_SOCK::set_handle (ACE_INVALID_HANDLE);
  11. return;
  12. }
  13. else
  14. {
  15. (void) ::SSL_set_fd (this->ssl_, (int) fd);
  16. this->ACE_SSL_SOCK::set_handle (fd);
  17. this->stream_.set_handle (fd);
  18. }
  19. }
  20. ACE_INLINE ssize_t
  21. ACE_SSL_SOCK_Stream::send_i (const void *buf,
  22. size_t n,
  23. int flags) const
  24. {
  25. ACE_TRACE ("ACE_SSL_SOCK_Stream::send_i");
  26. // NOTE: Caller must provide thread-synchronization.
  27. // No send flags are supported in SSL.
  28. if (flags != 0)
  29. {
  30. ACE_NOTSUP_RETURN (-1);
  31. }
  32. int const bytes_sent = ::SSL_write (this->ssl_,
  33. static_cast<const char *> (buf),
  34. ACE_Utils::truncate_cast<int> (n));
  35. switch (::SSL_get_error (this->ssl_, bytes_sent))
  36. {
  37. case SSL_ERROR_NONE:
  38. return bytes_sent;
  39. case SSL_ERROR_WANT_READ:
  40. case SSL_ERROR_WANT_WRITE:
  41. errno = EWOULDBLOCK;
  42. return -1;
  43. case SSL_ERROR_ZERO_RETURN:
  44. // The peer has notified us that it is shutting down via the SSL
  45. // "close_notify" message so we need to shutdown, too.
  46. (void) ::SSL_shutdown (this->ssl_);
  47. return bytes_sent;
  48. case SSL_ERROR_SYSCALL:
  49. if (bytes_sent == 0)
  50. // An EOF occured but the SSL "close_notify" message was not
  51. // sent. This is a protocol error, but we ignore it.
  52. return 0;
  53. // If not an EOF, then fall through to "default" case.
  54. // On some platforms (e.g. MS Windows) OpenSSL does not store
  55. // the last error in errno so explicitly do so.
  56. ACE_OS::set_errno_to_last_error ();
  57. break;
  58. default:
  59. // Reset errno to prevent previous values (e.g. EWOULDBLOCK)
  60. // from being associated with fatal SSL errors.
  61. errno = 0;
  62. ACE_SSL_Context::report_error ();
  63. break;
  64. }
  65. return -1;
  66. }
  67. ACE_INLINE ssize_t
  68. ACE_SSL_SOCK_Stream::send (const void *buf,
  69. size_t n,
  70. int flags) const
  71. {
  72. return this->send_i (buf, n, flags);
  73. }
  74. ACE_INLINE ssize_t
  75. ACE_SSL_SOCK_Stream::recv_i (void *buf,
  76. size_t n,
  77. int flags,
  78. const ACE_Time_Value *timeout) const
  79. {
  80. ACE_TRACE ("ACE_SSL_SOCK_Stream::recv_i");
  81. // NOTE: Caller must provide thread-synchronization.
  82. int bytes_read = 0;
  83. ACE_HANDLE const handle = this->get_handle ();
  84. // Value for current I/O mode (blocking/non-blocking)
  85. int val = 0;
  86. if (timeout != 0)
  87. ACE::record_and_set_non_blocking_mode (handle,
  88. val);
  89. // Only block to wait for I/O ready with a timeout if all on-hand data
  90. // has been consumed. If there is remaining data in the SSL buffers
  91. // the socket won't "select" even though SSL_read would complete.
  92. // See "SSL and TLS" by Rescorla section 8.9 for more info.
  93. bool peeking = false;
  94. bool retry = false;
  95. if (flags)
  96. {
  97. if (ACE_BIT_ENABLED (flags, MSG_PEEK))
  98. {
  99. peeking = true;
  100. }
  101. else
  102. {
  103. ACE_NOTSUP_RETURN (-1);
  104. }
  105. }
  106. do
  107. {
  108. retry = false;
  109. if (peeking)
  110. {
  111. bytes_read = ::SSL_peek (this->ssl_,
  112. static_cast<char *> (buf),
  113. ACE_Utils::truncate_cast<int> (n));
  114. }
  115. else
  116. {
  117. bytes_read = ::SSL_read (this->ssl_,
  118. static_cast<char *> (buf),
  119. ACE_Utils::truncate_cast<int> (n));
  120. }
  121. int const status = ::SSL_get_error (this->ssl_, bytes_read);
  122. int substat = 0;
  123. switch (status)
  124. {
  125. case SSL_ERROR_NONE:
  126. break;
  127. case SSL_ERROR_WANT_READ:
  128. case SSL_ERROR_WANT_WRITE:
  129. if (timeout == 0)
  130. {
  131. errno = EWOULDBLOCK;
  132. bytes_read = -1;
  133. break;
  134. }
  135. substat = ACE::handle_ready (handle,
  136. timeout,
  137. status == SSL_ERROR_WANT_READ,
  138. status == SSL_ERROR_WANT_WRITE,
  139. 0);
  140. if (substat == 1) // Now ready to proceed
  141. {
  142. retry = true;
  143. break;
  144. }
  145. bytes_read = -1;
  146. if (substat == 0)
  147. errno = ETIME;
  148. break;
  149. case SSL_ERROR_ZERO_RETURN:
  150. bytes_read = 0;
  151. // The peer has notified us that it is shutting down via the SSL
  152. // "close_notify" message so we need to shutdown, too.
  153. (void) ::SSL_shutdown (this->ssl_);
  154. break;
  155. case SSL_ERROR_SYSCALL:
  156. if (bytes_read == 0)
  157. // An EOF occured but the SSL "close_notify" message was not
  158. // sent. This is a protocol error, but we ignore it.
  159. break;
  160. // On some platforms (e.g. MS Windows) OpenSSL does not store
  161. // the last error in errno so explicitly do so.
  162. ACE_OS::set_errno_to_last_error ();
  163. break;
  164. default:
  165. // Reset errno to prevent previous values (e.g. EWOULDBLOCK)
  166. // from being associated with a fatal SSL error.
  167. bytes_read = -1;
  168. errno = 0;
  169. ACE_SSL_Context::report_error ();
  170. break;
  171. }
  172. } while (retry);
  173. if (timeout != 0)
  174. ACE::restore_non_blocking_mode (handle, val);
  175. return bytes_read;
  176. }
  177. ACE_INLINE ssize_t
  178. ACE_SSL_SOCK_Stream::recv (void *buf,
  179. size_t n,
  180. int flags) const
  181. {
  182. return this->recv_i (buf, n, flags, 0);
  183. }
  184. ACE_INLINE ssize_t
  185. ACE_SSL_SOCK_Stream::send (const void *buf,
  186. size_t n) const
  187. {
  188. ACE_TRACE ("ACE_SSL_SOCK_Stream::send");
  189. return this->send_i (buf, n, 0);
  190. }
  191. ACE_INLINE ssize_t
  192. ACE_SSL_SOCK_Stream::recv (void *buf,
  193. size_t n) const
  194. {
  195. ACE_TRACE ("ACE_SSL_SOCK_Stream::recv");
  196. return this->recv_i (buf, n, 0, 0);
  197. }
  198. ACE_INLINE ssize_t
  199. ACE_SSL_SOCK_Stream::send (const void *buf,
  200. size_t len,
  201. const ACE_Time_Value *timeout) const
  202. {
  203. ACE_TRACE ("ACE_SSL_SOCK_Stream::send");
  204. return this->send (buf, len, 0, timeout);
  205. }
  206. ACE_INLINE ssize_t
  207. ACE_SSL_SOCK_Stream::recv (void *buf,
  208. size_t n,
  209. const ACE_Time_Value *timeout) const
  210. {
  211. ACE_TRACE ("ACE_SSL_SOCK_Stream::recv");
  212. return this->recv (buf, n, 0, timeout);
  213. }
  214. ACE_INLINE ssize_t
  215. ACE_SSL_SOCK_Stream::recv_n (void *buf, int buf_size) const
  216. {
  217. ACE_TRACE ("ACE_SSL_SOCK_Stream::recv_n");
  218. return this->recv_n (buf, buf_size, 0);
  219. }
  220. ACE_INLINE ssize_t
  221. ACE_SSL_SOCK_Stream::recv_n (void *buf,
  222. size_t len,
  223. const ACE_Time_Value *timeout,
  224. size_t *bytes_transferred) const
  225. {
  226. ACE_TRACE ("ACE_SSL_SOCK_Stream::recv_n");
  227. return this->recv_n (buf, len, 0, timeout, bytes_transferred);
  228. }
  229. ACE_INLINE ssize_t
  230. ACE_SSL_SOCK_Stream::send_n (const void *buf, int len) const
  231. {
  232. ACE_TRACE ("ACE_SSL_SOCK_Stream::send_n");
  233. return this->send_n (buf, len, 0);
  234. }
  235. ACE_INLINE ssize_t
  236. ACE_SSL_SOCK_Stream::send_n (const void *buf,
  237. size_t len,
  238. const ACE_Time_Value *timeout,
  239. size_t *bytes_transferred) const
  240. {
  241. ACE_TRACE ("ACE_SSL_SOCK_Stream::send_n");
  242. return this->send_n (buf, len, 0, timeout, bytes_transferred);
  243. }
  244. ACE_INLINE int
  245. ACE_SSL_SOCK_Stream::close_reader (void)
  246. {
  247. ACE_TRACE ("ACE_SSL_SOCK_Stream::close_reader");
  248. return this->stream_.close_reader ();
  249. }
  250. ACE_INLINE int
  251. ACE_SSL_SOCK_Stream::close_writer (void)
  252. {
  253. ACE_TRACE ("ACE_SSL_SOCK_Stream::close_writer");
  254. return this->stream_.close_writer ();
  255. }
  256. ACE_INLINE int
  257. ACE_SSL_SOCK_Stream::close (void)
  258. {
  259. ACE_TRACE ("ACE_SSL_SOCK_Stream::close");
  260. if (this->ssl_ == 0 || this->get_handle () == ACE_INVALID_HANDLE)
  261. return 0; // SSL_SOCK_Stream was never opened.
  262. // SSL_shutdown() returns 1 on successful shutdown of the SSL
  263. // connection, not 0.
  264. int const status = ::SSL_shutdown (this->ssl_);
  265. switch (::SSL_get_error (this->ssl_, status))
  266. {
  267. case SSL_ERROR_NONE:
  268. case SSL_ERROR_SYSCALL: // Ignore this error condition.
  269. // Reset the SSL object to allow another connection to be made
  270. // using this ACE_SSL_SOCK_Stream instance. This prevents the
  271. // previous SSL session state from being associated with the new
  272. // SSL session/connection.
  273. (void) ::SSL_clear (this->ssl_);
  274. this->set_handle (ACE_INVALID_HANDLE);
  275. return this->stream_.close ();
  276. case SSL_ERROR_WANT_READ:
  277. case SSL_ERROR_WANT_WRITE:
  278. errno = EWOULDBLOCK;
  279. break;
  280. default:
  281. ACE_SSL_Context::report_error ();
  282. ACE_Errno_Guard error (errno); // Save/restore errno
  283. (void) this->stream_.close ();
  284. return -1;
  285. }
  286. return -1;
  287. }
  288. ACE_INLINE ACE_SOCK_Stream &
  289. ACE_SSL_SOCK_Stream::peer (void)
  290. {
  291. ACE_TRACE ("ACE_SSL_SOCK_Stream::peer");
  292. return this->stream_;
  293. }
  294. ACE_INLINE SSL *
  295. ACE_SSL_SOCK_Stream::ssl (void) const
  296. {
  297. return this->ssl_;
  298. }
  299. ACE_END_VERSIONED_NAMESPACE_DECL