xref: /aosp_15_r20/external/libevent/bufferevent_openssl.c (revision 663afb9b963571284e0f0a60f257164ab54f64bf)
1*663afb9bSAndroid Build Coastguard Worker /*
2*663afb9bSAndroid Build Coastguard Worker  * Copyright (c) 2009-2012 Niels Provos and Nick Mathewson
3*663afb9bSAndroid Build Coastguard Worker  *
4*663afb9bSAndroid Build Coastguard Worker  * Redistribution and use in source and binary forms, with or without
5*663afb9bSAndroid Build Coastguard Worker  * modification, are permitted provided that the following conditions
6*663afb9bSAndroid Build Coastguard Worker  * are met:
7*663afb9bSAndroid Build Coastguard Worker  * 1. Redistributions of source code must retain the above copyright
8*663afb9bSAndroid Build Coastguard Worker  *    notice, this list of conditions and the following disclaimer.
9*663afb9bSAndroid Build Coastguard Worker  * 2. Redistributions in binary form must reproduce the above copyright
10*663afb9bSAndroid Build Coastguard Worker  *    notice, this list of conditions and the following disclaimer in the
11*663afb9bSAndroid Build Coastguard Worker  *    documentation and/or other materials provided with the distribution.
12*663afb9bSAndroid Build Coastguard Worker  * 3. The name of the author may not be used to endorse or promote products
13*663afb9bSAndroid Build Coastguard Worker  *    derived from this software without specific prior written permission.
14*663afb9bSAndroid Build Coastguard Worker  *
15*663afb9bSAndroid Build Coastguard Worker  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
16*663afb9bSAndroid Build Coastguard Worker  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
17*663afb9bSAndroid Build Coastguard Worker  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
18*663afb9bSAndroid Build Coastguard Worker  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
19*663afb9bSAndroid Build Coastguard Worker  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
20*663afb9bSAndroid Build Coastguard Worker  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
21*663afb9bSAndroid Build Coastguard Worker  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
22*663afb9bSAndroid Build Coastguard Worker  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23*663afb9bSAndroid Build Coastguard Worker  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
24*663afb9bSAndroid Build Coastguard Worker  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
25*663afb9bSAndroid Build Coastguard Worker  */
26*663afb9bSAndroid Build Coastguard Worker 
27*663afb9bSAndroid Build Coastguard Worker // Get rid of OSX 10.7 and greater deprecation warnings.
28*663afb9bSAndroid Build Coastguard Worker #if defined(__APPLE__) && defined(__clang__)
29*663afb9bSAndroid Build Coastguard Worker #pragma clang diagnostic ignored "-Wdeprecated-declarations"
30*663afb9bSAndroid Build Coastguard Worker #endif
31*663afb9bSAndroid Build Coastguard Worker 
32*663afb9bSAndroid Build Coastguard Worker #include "event2/event-config.h"
33*663afb9bSAndroid Build Coastguard Worker #include "evconfig-private.h"
34*663afb9bSAndroid Build Coastguard Worker 
35*663afb9bSAndroid Build Coastguard Worker #include <sys/types.h>
36*663afb9bSAndroid Build Coastguard Worker 
37*663afb9bSAndroid Build Coastguard Worker #ifdef EVENT__HAVE_SYS_TIME_H
38*663afb9bSAndroid Build Coastguard Worker #include <sys/time.h>
39*663afb9bSAndroid Build Coastguard Worker #endif
40*663afb9bSAndroid Build Coastguard Worker 
41*663afb9bSAndroid Build Coastguard Worker #include <errno.h>
42*663afb9bSAndroid Build Coastguard Worker #include <stdio.h>
43*663afb9bSAndroid Build Coastguard Worker #include <stdlib.h>
44*663afb9bSAndroid Build Coastguard Worker #include <string.h>
45*663afb9bSAndroid Build Coastguard Worker #ifdef EVENT__HAVE_STDARG_H
46*663afb9bSAndroid Build Coastguard Worker #include <stdarg.h>
47*663afb9bSAndroid Build Coastguard Worker #endif
48*663afb9bSAndroid Build Coastguard Worker #ifdef EVENT__HAVE_UNISTD_H
49*663afb9bSAndroid Build Coastguard Worker #include <unistd.h>
50*663afb9bSAndroid Build Coastguard Worker #endif
51*663afb9bSAndroid Build Coastguard Worker 
52*663afb9bSAndroid Build Coastguard Worker #ifdef _WIN32
53*663afb9bSAndroid Build Coastguard Worker #include <winsock2.h>
54*663afb9bSAndroid Build Coastguard Worker #endif
55*663afb9bSAndroid Build Coastguard Worker 
56*663afb9bSAndroid Build Coastguard Worker #include "event2/bufferevent.h"
57*663afb9bSAndroid Build Coastguard Worker #include "event2/bufferevent_struct.h"
58*663afb9bSAndroid Build Coastguard Worker #include "event2/bufferevent_ssl.h"
59*663afb9bSAndroid Build Coastguard Worker #include "event2/buffer.h"
60*663afb9bSAndroid Build Coastguard Worker #include "event2/event.h"
61*663afb9bSAndroid Build Coastguard Worker 
62*663afb9bSAndroid Build Coastguard Worker #include "mm-internal.h"
63*663afb9bSAndroid Build Coastguard Worker #include "bufferevent-internal.h"
64*663afb9bSAndroid Build Coastguard Worker #include "log-internal.h"
65*663afb9bSAndroid Build Coastguard Worker 
66*663afb9bSAndroid Build Coastguard Worker #include <openssl/ssl.h>
67*663afb9bSAndroid Build Coastguard Worker #include <openssl/err.h>
68*663afb9bSAndroid Build Coastguard Worker #include "openssl-compat.h"
69*663afb9bSAndroid Build Coastguard Worker 
70*663afb9bSAndroid Build Coastguard Worker /*
71*663afb9bSAndroid Build Coastguard Worker  * Define an OpenSSL bio that targets a bufferevent.
72*663afb9bSAndroid Build Coastguard Worker  */
73*663afb9bSAndroid Build Coastguard Worker 
74*663afb9bSAndroid Build Coastguard Worker /* --------------------
75*663afb9bSAndroid Build Coastguard Worker    A BIO is an OpenSSL abstraction that handles reading and writing data.  The
76*663afb9bSAndroid Build Coastguard Worker    library will happily speak SSL over anything that implements a BIO
77*663afb9bSAndroid Build Coastguard Worker    interface.
78*663afb9bSAndroid Build Coastguard Worker 
79*663afb9bSAndroid Build Coastguard Worker    Here we define a BIO implementation that directs its output to a
80*663afb9bSAndroid Build Coastguard Worker    bufferevent.  We'll want to use this only when none of OpenSSL's built-in
81*663afb9bSAndroid Build Coastguard Worker    IO mechanisms work for us.
82*663afb9bSAndroid Build Coastguard Worker    -------------------- */
83*663afb9bSAndroid Build Coastguard Worker 
84*663afb9bSAndroid Build Coastguard Worker /* every BIO type needs its own integer type value. */
85*663afb9bSAndroid Build Coastguard Worker #define BIO_TYPE_LIBEVENT 57
86*663afb9bSAndroid Build Coastguard Worker /* ???? Arguably, we should set BIO_TYPE_FILTER or BIO_TYPE_SOURCE_SINK on
87*663afb9bSAndroid Build Coastguard Worker  * this. */
88*663afb9bSAndroid Build Coastguard Worker 
89*663afb9bSAndroid Build Coastguard Worker #if 0
90*663afb9bSAndroid Build Coastguard Worker static void
91*663afb9bSAndroid Build Coastguard Worker print_err(int val)
92*663afb9bSAndroid Build Coastguard Worker {
93*663afb9bSAndroid Build Coastguard Worker 	int err;
94*663afb9bSAndroid Build Coastguard Worker 	printf("Error was %d\n", val);
95*663afb9bSAndroid Build Coastguard Worker 
96*663afb9bSAndroid Build Coastguard Worker 	while ((err = ERR_get_error())) {
97*663afb9bSAndroid Build Coastguard Worker 		const char *msg = (const char*)ERR_reason_error_string(err);
98*663afb9bSAndroid Build Coastguard Worker 		const char *lib = (const char*)ERR_lib_error_string(err);
99*663afb9bSAndroid Build Coastguard Worker 		const char *func = (const char*)ERR_func_error_string(err);
100*663afb9bSAndroid Build Coastguard Worker 
101*663afb9bSAndroid Build Coastguard Worker 		printf("%s in %s %s\n", msg, lib, func);
102*663afb9bSAndroid Build Coastguard Worker 	}
103*663afb9bSAndroid Build Coastguard Worker }
104*663afb9bSAndroid Build Coastguard Worker #else
105*663afb9bSAndroid Build Coastguard Worker #define print_err(v) ((void)0)
106*663afb9bSAndroid Build Coastguard Worker #endif
107*663afb9bSAndroid Build Coastguard Worker 
108*663afb9bSAndroid Build Coastguard Worker /* Called to initialize a new BIO */
109*663afb9bSAndroid Build Coastguard Worker static int
bio_bufferevent_new(BIO * b)110*663afb9bSAndroid Build Coastguard Worker bio_bufferevent_new(BIO *b)
111*663afb9bSAndroid Build Coastguard Worker {
112*663afb9bSAndroid Build Coastguard Worker 	BIO_set_init(b, 0);
113*663afb9bSAndroid Build Coastguard Worker 	BIO_set_data(b, NULL); /* We'll be putting the bufferevent in this field.*/
114*663afb9bSAndroid Build Coastguard Worker 	return 1;
115*663afb9bSAndroid Build Coastguard Worker }
116*663afb9bSAndroid Build Coastguard Worker 
117*663afb9bSAndroid Build Coastguard Worker /* Called to uninitialize the BIO. */
118*663afb9bSAndroid Build Coastguard Worker static int
bio_bufferevent_free(BIO * b)119*663afb9bSAndroid Build Coastguard Worker bio_bufferevent_free(BIO *b)
120*663afb9bSAndroid Build Coastguard Worker {
121*663afb9bSAndroid Build Coastguard Worker 	if (!b)
122*663afb9bSAndroid Build Coastguard Worker 		return 0;
123*663afb9bSAndroid Build Coastguard Worker 	if (BIO_get_shutdown(b)) {
124*663afb9bSAndroid Build Coastguard Worker 		if (BIO_get_init(b) && BIO_get_data(b))
125*663afb9bSAndroid Build Coastguard Worker 			bufferevent_free(BIO_get_data(b));
126*663afb9bSAndroid Build Coastguard Worker 		BIO_free(b);
127*663afb9bSAndroid Build Coastguard Worker 	}
128*663afb9bSAndroid Build Coastguard Worker 	return 1;
129*663afb9bSAndroid Build Coastguard Worker }
130*663afb9bSAndroid Build Coastguard Worker 
131*663afb9bSAndroid Build Coastguard Worker /* Called to extract data from the BIO. */
132*663afb9bSAndroid Build Coastguard Worker static int
bio_bufferevent_read(BIO * b,char * out,int outlen)133*663afb9bSAndroid Build Coastguard Worker bio_bufferevent_read(BIO *b, char *out, int outlen)
134*663afb9bSAndroid Build Coastguard Worker {
135*663afb9bSAndroid Build Coastguard Worker 	int r = 0;
136*663afb9bSAndroid Build Coastguard Worker 	struct evbuffer *input;
137*663afb9bSAndroid Build Coastguard Worker 
138*663afb9bSAndroid Build Coastguard Worker 	BIO_clear_retry_flags(b);
139*663afb9bSAndroid Build Coastguard Worker 
140*663afb9bSAndroid Build Coastguard Worker 	if (!out)
141*663afb9bSAndroid Build Coastguard Worker 		return 0;
142*663afb9bSAndroid Build Coastguard Worker 	if (!BIO_get_data(b))
143*663afb9bSAndroid Build Coastguard Worker 		return -1;
144*663afb9bSAndroid Build Coastguard Worker 
145*663afb9bSAndroid Build Coastguard Worker 	input = bufferevent_get_input(BIO_get_data(b));
146*663afb9bSAndroid Build Coastguard Worker 	if (evbuffer_get_length(input) == 0) {
147*663afb9bSAndroid Build Coastguard Worker 		/* If there's no data to read, say so. */
148*663afb9bSAndroid Build Coastguard Worker 		BIO_set_retry_read(b);
149*663afb9bSAndroid Build Coastguard Worker 		return -1;
150*663afb9bSAndroid Build Coastguard Worker 	} else {
151*663afb9bSAndroid Build Coastguard Worker 		r = evbuffer_remove(input, out, outlen);
152*663afb9bSAndroid Build Coastguard Worker 	}
153*663afb9bSAndroid Build Coastguard Worker 
154*663afb9bSAndroid Build Coastguard Worker 	return r;
155*663afb9bSAndroid Build Coastguard Worker }
156*663afb9bSAndroid Build Coastguard Worker 
157*663afb9bSAndroid Build Coastguard Worker /* Called to write data into the BIO */
158*663afb9bSAndroid Build Coastguard Worker static int
bio_bufferevent_write(BIO * b,const char * in,int inlen)159*663afb9bSAndroid Build Coastguard Worker bio_bufferevent_write(BIO *b, const char *in, int inlen)
160*663afb9bSAndroid Build Coastguard Worker {
161*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent *bufev = BIO_get_data(b);
162*663afb9bSAndroid Build Coastguard Worker 	struct evbuffer *output;
163*663afb9bSAndroid Build Coastguard Worker 	size_t outlen;
164*663afb9bSAndroid Build Coastguard Worker 
165*663afb9bSAndroid Build Coastguard Worker 	BIO_clear_retry_flags(b);
166*663afb9bSAndroid Build Coastguard Worker 
167*663afb9bSAndroid Build Coastguard Worker 	if (!BIO_get_data(b))
168*663afb9bSAndroid Build Coastguard Worker 		return -1;
169*663afb9bSAndroid Build Coastguard Worker 
170*663afb9bSAndroid Build Coastguard Worker 	output = bufferevent_get_output(bufev);
171*663afb9bSAndroid Build Coastguard Worker 	outlen = evbuffer_get_length(output);
172*663afb9bSAndroid Build Coastguard Worker 
173*663afb9bSAndroid Build Coastguard Worker 	/* Copy only as much data onto the output buffer as can fit under the
174*663afb9bSAndroid Build Coastguard Worker 	 * high-water mark. */
175*663afb9bSAndroid Build Coastguard Worker 	if (bufev->wm_write.high && bufev->wm_write.high <= (outlen+inlen)) {
176*663afb9bSAndroid Build Coastguard Worker 		if (bufev->wm_write.high <= outlen) {
177*663afb9bSAndroid Build Coastguard Worker 			/* If no data can fit, we'll need to retry later. */
178*663afb9bSAndroid Build Coastguard Worker 			BIO_set_retry_write(b);
179*663afb9bSAndroid Build Coastguard Worker 			return -1;
180*663afb9bSAndroid Build Coastguard Worker 		}
181*663afb9bSAndroid Build Coastguard Worker 		inlen = bufev->wm_write.high - outlen;
182*663afb9bSAndroid Build Coastguard Worker 	}
183*663afb9bSAndroid Build Coastguard Worker 
184*663afb9bSAndroid Build Coastguard Worker 	EVUTIL_ASSERT(inlen > 0);
185*663afb9bSAndroid Build Coastguard Worker 	evbuffer_add(output, in, inlen);
186*663afb9bSAndroid Build Coastguard Worker 	return inlen;
187*663afb9bSAndroid Build Coastguard Worker }
188*663afb9bSAndroid Build Coastguard Worker 
189*663afb9bSAndroid Build Coastguard Worker /* Called to handle various requests */
190*663afb9bSAndroid Build Coastguard Worker static long
bio_bufferevent_ctrl(BIO * b,int cmd,long num,void * ptr)191*663afb9bSAndroid Build Coastguard Worker bio_bufferevent_ctrl(BIO *b, int cmd, long num, void *ptr)
192*663afb9bSAndroid Build Coastguard Worker {
193*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent *bufev = BIO_get_data(b);
194*663afb9bSAndroid Build Coastguard Worker 	long ret = 1;
195*663afb9bSAndroid Build Coastguard Worker 
196*663afb9bSAndroid Build Coastguard Worker 	switch (cmd) {
197*663afb9bSAndroid Build Coastguard Worker 	case BIO_CTRL_GET_CLOSE:
198*663afb9bSAndroid Build Coastguard Worker 		ret = BIO_get_shutdown(b);
199*663afb9bSAndroid Build Coastguard Worker 		break;
200*663afb9bSAndroid Build Coastguard Worker 	case BIO_CTRL_SET_CLOSE:
201*663afb9bSAndroid Build Coastguard Worker 		BIO_set_shutdown(b, (int)num);
202*663afb9bSAndroid Build Coastguard Worker 		break;
203*663afb9bSAndroid Build Coastguard Worker 	case BIO_CTRL_PENDING:
204*663afb9bSAndroid Build Coastguard Worker 		ret = evbuffer_get_length(bufferevent_get_input(bufev)) != 0;
205*663afb9bSAndroid Build Coastguard Worker 		break;
206*663afb9bSAndroid Build Coastguard Worker 	case BIO_CTRL_WPENDING:
207*663afb9bSAndroid Build Coastguard Worker 		ret = evbuffer_get_length(bufferevent_get_output(bufev)) != 0;
208*663afb9bSAndroid Build Coastguard Worker 		break;
209*663afb9bSAndroid Build Coastguard Worker 	/* XXXX These two are given a special-case treatment because
210*663afb9bSAndroid Build Coastguard Worker 	 * of cargo-cultism.  I should come up with a better reason. */
211*663afb9bSAndroid Build Coastguard Worker 	case BIO_CTRL_DUP:
212*663afb9bSAndroid Build Coastguard Worker 	case BIO_CTRL_FLUSH:
213*663afb9bSAndroid Build Coastguard Worker 		ret = 1;
214*663afb9bSAndroid Build Coastguard Worker 		break;
215*663afb9bSAndroid Build Coastguard Worker 	default:
216*663afb9bSAndroid Build Coastguard Worker 		ret = 0;
217*663afb9bSAndroid Build Coastguard Worker 		break;
218*663afb9bSAndroid Build Coastguard Worker 	}
219*663afb9bSAndroid Build Coastguard Worker 	return ret;
220*663afb9bSAndroid Build Coastguard Worker }
221*663afb9bSAndroid Build Coastguard Worker 
222*663afb9bSAndroid Build Coastguard Worker /* Called to write a string to the BIO */
223*663afb9bSAndroid Build Coastguard Worker static int
bio_bufferevent_puts(BIO * b,const char * s)224*663afb9bSAndroid Build Coastguard Worker bio_bufferevent_puts(BIO *b, const char *s)
225*663afb9bSAndroid Build Coastguard Worker {
226*663afb9bSAndroid Build Coastguard Worker 	return bio_bufferevent_write(b, s, strlen(s));
227*663afb9bSAndroid Build Coastguard Worker }
228*663afb9bSAndroid Build Coastguard Worker 
229*663afb9bSAndroid Build Coastguard Worker /* Method table for the bufferevent BIO */
230*663afb9bSAndroid Build Coastguard Worker static BIO_METHOD *methods_bufferevent;
231*663afb9bSAndroid Build Coastguard Worker 
232*663afb9bSAndroid Build Coastguard Worker /* Return the method table for the bufferevents BIO */
233*663afb9bSAndroid Build Coastguard Worker static BIO_METHOD *
BIO_s_bufferevent(void)234*663afb9bSAndroid Build Coastguard Worker BIO_s_bufferevent(void)
235*663afb9bSAndroid Build Coastguard Worker {
236*663afb9bSAndroid Build Coastguard Worker 	if (methods_bufferevent == NULL) {
237*663afb9bSAndroid Build Coastguard Worker 		methods_bufferevent = BIO_meth_new(BIO_TYPE_LIBEVENT, "bufferevent");
238*663afb9bSAndroid Build Coastguard Worker 		if (methods_bufferevent == NULL)
239*663afb9bSAndroid Build Coastguard Worker 			return NULL;
240*663afb9bSAndroid Build Coastguard Worker 		BIO_meth_set_write(methods_bufferevent, bio_bufferevent_write);
241*663afb9bSAndroid Build Coastguard Worker 		BIO_meth_set_read(methods_bufferevent, bio_bufferevent_read);
242*663afb9bSAndroid Build Coastguard Worker 		BIO_meth_set_puts(methods_bufferevent, bio_bufferevent_puts);
243*663afb9bSAndroid Build Coastguard Worker 		BIO_meth_set_ctrl(methods_bufferevent, bio_bufferevent_ctrl);
244*663afb9bSAndroid Build Coastguard Worker 		BIO_meth_set_create(methods_bufferevent, bio_bufferevent_new);
245*663afb9bSAndroid Build Coastguard Worker 		BIO_meth_set_destroy(methods_bufferevent, bio_bufferevent_free);
246*663afb9bSAndroid Build Coastguard Worker 	}
247*663afb9bSAndroid Build Coastguard Worker 	return methods_bufferevent;
248*663afb9bSAndroid Build Coastguard Worker }
249*663afb9bSAndroid Build Coastguard Worker 
250*663afb9bSAndroid Build Coastguard Worker /* Create a new BIO to wrap communication around a bufferevent.  If close_flag
251*663afb9bSAndroid Build Coastguard Worker  * is true, the bufferevent will be freed when the BIO is closed. */
252*663afb9bSAndroid Build Coastguard Worker static BIO *
BIO_new_bufferevent(struct bufferevent * bufferevent)253*663afb9bSAndroid Build Coastguard Worker BIO_new_bufferevent(struct bufferevent *bufferevent)
254*663afb9bSAndroid Build Coastguard Worker {
255*663afb9bSAndroid Build Coastguard Worker 	BIO *result;
256*663afb9bSAndroid Build Coastguard Worker 	if (!bufferevent)
257*663afb9bSAndroid Build Coastguard Worker 		return NULL;
258*663afb9bSAndroid Build Coastguard Worker 	if (!(result = BIO_new(BIO_s_bufferevent())))
259*663afb9bSAndroid Build Coastguard Worker 		return NULL;
260*663afb9bSAndroid Build Coastguard Worker 	BIO_set_init(result, 1);
261*663afb9bSAndroid Build Coastguard Worker 	BIO_set_data(result, bufferevent);
262*663afb9bSAndroid Build Coastguard Worker 	/* We don't tell the BIO to close the bufferevent; we do it ourselves on
263*663afb9bSAndroid Build Coastguard Worker 	 * be_openssl_destruct() */
264*663afb9bSAndroid Build Coastguard Worker 	BIO_set_shutdown(result, 0);
265*663afb9bSAndroid Build Coastguard Worker 	return result;
266*663afb9bSAndroid Build Coastguard Worker }
267*663afb9bSAndroid Build Coastguard Worker 
268*663afb9bSAndroid Build Coastguard Worker /* --------------------
269*663afb9bSAndroid Build Coastguard Worker    Now, here's the OpenSSL-based implementation of bufferevent.
270*663afb9bSAndroid Build Coastguard Worker 
271*663afb9bSAndroid Build Coastguard Worker    The implementation comes in two flavors: one that connects its SSL object
272*663afb9bSAndroid Build Coastguard Worker    to an underlying bufferevent using a BIO_bufferevent, and one that has the
273*663afb9bSAndroid Build Coastguard Worker    SSL object connect to a socket directly.  The latter should generally be
274*663afb9bSAndroid Build Coastguard Worker    faster, except on Windows, where your best bet is using a
275*663afb9bSAndroid Build Coastguard Worker    bufferevent_async.
276*663afb9bSAndroid Build Coastguard Worker 
277*663afb9bSAndroid Build Coastguard Worker    (OpenSSL supports many other BIO types, too.  But we can't use any unless
278*663afb9bSAndroid Build Coastguard Worker    we have a good way to get notified when they become readable/writable.)
279*663afb9bSAndroid Build Coastguard Worker    -------------------- */
280*663afb9bSAndroid Build Coastguard Worker 
281*663afb9bSAndroid Build Coastguard Worker struct bio_data_counts {
282*663afb9bSAndroid Build Coastguard Worker 	unsigned long n_written;
283*663afb9bSAndroid Build Coastguard Worker 	unsigned long n_read;
284*663afb9bSAndroid Build Coastguard Worker };
285*663afb9bSAndroid Build Coastguard Worker 
286*663afb9bSAndroid Build Coastguard Worker struct bufferevent_openssl {
287*663afb9bSAndroid Build Coastguard Worker 	/* Shared fields with common bufferevent implementation code.
288*663afb9bSAndroid Build Coastguard Worker 	   If we were set up with an underlying bufferevent, we use the
289*663afb9bSAndroid Build Coastguard Worker 	   events here as timers only.  If we have an SSL, then we use
290*663afb9bSAndroid Build Coastguard Worker 	   the events as socket events.
291*663afb9bSAndroid Build Coastguard Worker 	 */
292*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_private bev;
293*663afb9bSAndroid Build Coastguard Worker 	/* An underlying bufferevent that we're directing our output to.
294*663afb9bSAndroid Build Coastguard Worker 	   If it's NULL, then we're connected to an fd, not an evbuffer. */
295*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent *underlying;
296*663afb9bSAndroid Build Coastguard Worker 	/* The SSL object doing our encryption. */
297*663afb9bSAndroid Build Coastguard Worker 	SSL *ssl;
298*663afb9bSAndroid Build Coastguard Worker 
299*663afb9bSAndroid Build Coastguard Worker 	/* A callback that's invoked when data arrives on our outbuf so we
300*663afb9bSAndroid Build Coastguard Worker 	   know to write data to the SSL. */
301*663afb9bSAndroid Build Coastguard Worker 	struct evbuffer_cb_entry *outbuf_cb;
302*663afb9bSAndroid Build Coastguard Worker 
303*663afb9bSAndroid Build Coastguard Worker 	/* A count of how much data the bios have read/written total.  Used
304*663afb9bSAndroid Build Coastguard Worker 	   for rate-limiting. */
305*663afb9bSAndroid Build Coastguard Worker 	struct bio_data_counts counts;
306*663afb9bSAndroid Build Coastguard Worker 
307*663afb9bSAndroid Build Coastguard Worker 	/* If this value is greater than 0, then the last SSL_write blocked,
308*663afb9bSAndroid Build Coastguard Worker 	 * and we need to try it again with this many bytes. */
309*663afb9bSAndroid Build Coastguard Worker 	ev_ssize_t last_write;
310*663afb9bSAndroid Build Coastguard Worker 
311*663afb9bSAndroid Build Coastguard Worker #define NUM_ERRORS 3
312*663afb9bSAndroid Build Coastguard Worker 	ev_uint32_t errors[NUM_ERRORS];
313*663afb9bSAndroid Build Coastguard Worker 
314*663afb9bSAndroid Build Coastguard Worker 	/* When we next get available space, we should say "read" instead of
315*663afb9bSAndroid Build Coastguard Worker 	   "write". This can happen if there's a renegotiation during a read
316*663afb9bSAndroid Build Coastguard Worker 	   operation. */
317*663afb9bSAndroid Build Coastguard Worker 	unsigned read_blocked_on_write : 1;
318*663afb9bSAndroid Build Coastguard Worker 	/* When we next get data, we should say "write" instead of "read". */
319*663afb9bSAndroid Build Coastguard Worker 	unsigned write_blocked_on_read : 1;
320*663afb9bSAndroid Build Coastguard Worker 	/* Treat TCP close before SSL close on SSL >= v3 as clean EOF. */
321*663afb9bSAndroid Build Coastguard Worker 	unsigned allow_dirty_shutdown : 1;
322*663afb9bSAndroid Build Coastguard Worker 	/* XXX */
323*663afb9bSAndroid Build Coastguard Worker 	unsigned n_errors : 2;
324*663afb9bSAndroid Build Coastguard Worker 
325*663afb9bSAndroid Build Coastguard Worker 	/* Are we currently connecting, accepting, or doing IO? */
326*663afb9bSAndroid Build Coastguard Worker 	unsigned state : 2;
327*663afb9bSAndroid Build Coastguard Worker 	/* If we reset fd, we sould reset state too */
328*663afb9bSAndroid Build Coastguard Worker 	unsigned old_state : 2;
329*663afb9bSAndroid Build Coastguard Worker };
330*663afb9bSAndroid Build Coastguard Worker 
331*663afb9bSAndroid Build Coastguard Worker static int be_openssl_enable(struct bufferevent *, short);
332*663afb9bSAndroid Build Coastguard Worker static int be_openssl_disable(struct bufferevent *, short);
333*663afb9bSAndroid Build Coastguard Worker static void be_openssl_unlink(struct bufferevent *);
334*663afb9bSAndroid Build Coastguard Worker static void be_openssl_destruct(struct bufferevent *);
335*663afb9bSAndroid Build Coastguard Worker static int be_openssl_adj_timeouts(struct bufferevent *);
336*663afb9bSAndroid Build Coastguard Worker static int be_openssl_flush(struct bufferevent *bufev,
337*663afb9bSAndroid Build Coastguard Worker     short iotype, enum bufferevent_flush_mode mode);
338*663afb9bSAndroid Build Coastguard Worker static int be_openssl_ctrl(struct bufferevent *, enum bufferevent_ctrl_op, union bufferevent_ctrl_data *);
339*663afb9bSAndroid Build Coastguard Worker 
340*663afb9bSAndroid Build Coastguard Worker const struct bufferevent_ops bufferevent_ops_openssl = {
341*663afb9bSAndroid Build Coastguard Worker 	"ssl",
342*663afb9bSAndroid Build Coastguard Worker 	evutil_offsetof(struct bufferevent_openssl, bev.bev),
343*663afb9bSAndroid Build Coastguard Worker 	be_openssl_enable,
344*663afb9bSAndroid Build Coastguard Worker 	be_openssl_disable,
345*663afb9bSAndroid Build Coastguard Worker 	be_openssl_unlink,
346*663afb9bSAndroid Build Coastguard Worker 	be_openssl_destruct,
347*663afb9bSAndroid Build Coastguard Worker 	be_openssl_adj_timeouts,
348*663afb9bSAndroid Build Coastguard Worker 	be_openssl_flush,
349*663afb9bSAndroid Build Coastguard Worker 	be_openssl_ctrl,
350*663afb9bSAndroid Build Coastguard Worker };
351*663afb9bSAndroid Build Coastguard Worker 
352*663afb9bSAndroid Build Coastguard Worker /* Given a bufferevent, return a pointer to the bufferevent_openssl that
353*663afb9bSAndroid Build Coastguard Worker  * contains it, if any. */
354*663afb9bSAndroid Build Coastguard Worker static inline struct bufferevent_openssl *
upcast(struct bufferevent * bev)355*663afb9bSAndroid Build Coastguard Worker upcast(struct bufferevent *bev)
356*663afb9bSAndroid Build Coastguard Worker {
357*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_o;
358*663afb9bSAndroid Build Coastguard Worker 	if (!BEV_IS_OPENSSL(bev))
359*663afb9bSAndroid Build Coastguard Worker 		return NULL;
360*663afb9bSAndroid Build Coastguard Worker 	bev_o = (void*)( ((char*)bev) -
361*663afb9bSAndroid Build Coastguard Worker 			 evutil_offsetof(struct bufferevent_openssl, bev.bev));
362*663afb9bSAndroid Build Coastguard Worker 	EVUTIL_ASSERT(BEV_IS_OPENSSL(&bev_o->bev.bev));
363*663afb9bSAndroid Build Coastguard Worker 	return bev_o;
364*663afb9bSAndroid Build Coastguard Worker }
365*663afb9bSAndroid Build Coastguard Worker 
366*663afb9bSAndroid Build Coastguard Worker static inline void
put_error(struct bufferevent_openssl * bev_ssl,unsigned long err)367*663afb9bSAndroid Build Coastguard Worker put_error(struct bufferevent_openssl *bev_ssl, unsigned long err)
368*663afb9bSAndroid Build Coastguard Worker {
369*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl->n_errors == NUM_ERRORS)
370*663afb9bSAndroid Build Coastguard Worker 		return;
371*663afb9bSAndroid Build Coastguard Worker 	/* The error type according to openssl is "unsigned long", but
372*663afb9bSAndroid Build Coastguard Worker 	   openssl never uses more than 32 bits of it.  It _can't_ use more
373*663afb9bSAndroid Build Coastguard Worker 	   than 32 bits of it, since it needs to report errors on systems
374*663afb9bSAndroid Build Coastguard Worker 	   where long is only 32 bits.
375*663afb9bSAndroid Build Coastguard Worker 	 */
376*663afb9bSAndroid Build Coastguard Worker 	bev_ssl->errors[bev_ssl->n_errors++] = (ev_uint32_t) err;
377*663afb9bSAndroid Build Coastguard Worker }
378*663afb9bSAndroid Build Coastguard Worker 
379*663afb9bSAndroid Build Coastguard Worker /* Have the base communications channel (either the underlying bufferevent or
380*663afb9bSAndroid Build Coastguard Worker  * ev_read and ev_write) start reading.  Take the read-blocked-on-write flag
381*663afb9bSAndroid Build Coastguard Worker  * into account. */
382*663afb9bSAndroid Build Coastguard Worker static int
start_reading(struct bufferevent_openssl * bev_ssl)383*663afb9bSAndroid Build Coastguard Worker start_reading(struct bufferevent_openssl *bev_ssl)
384*663afb9bSAndroid Build Coastguard Worker {
385*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl->underlying) {
386*663afb9bSAndroid Build Coastguard Worker 		bufferevent_unsuspend_read_(bev_ssl->underlying,
387*663afb9bSAndroid Build Coastguard Worker 		    BEV_SUSPEND_FILT_READ);
388*663afb9bSAndroid Build Coastguard Worker 		return 0;
389*663afb9bSAndroid Build Coastguard Worker 	} else {
390*663afb9bSAndroid Build Coastguard Worker 		struct bufferevent *bev = &bev_ssl->bev.bev;
391*663afb9bSAndroid Build Coastguard Worker 		int r;
392*663afb9bSAndroid Build Coastguard Worker 		r = bufferevent_add_event_(&bev->ev_read, &bev->timeout_read);
393*663afb9bSAndroid Build Coastguard Worker 		if (r == 0 && bev_ssl->read_blocked_on_write)
394*663afb9bSAndroid Build Coastguard Worker 			r = bufferevent_add_event_(&bev->ev_write,
395*663afb9bSAndroid Build Coastguard Worker 			    &bev->timeout_write);
396*663afb9bSAndroid Build Coastguard Worker 		return r;
397*663afb9bSAndroid Build Coastguard Worker 	}
398*663afb9bSAndroid Build Coastguard Worker }
399*663afb9bSAndroid Build Coastguard Worker 
400*663afb9bSAndroid Build Coastguard Worker /* Have the base communications channel (either the underlying bufferevent or
401*663afb9bSAndroid Build Coastguard Worker  * ev_read and ev_write) start writing.  Take the write-blocked-on-read flag
402*663afb9bSAndroid Build Coastguard Worker  * into account. */
403*663afb9bSAndroid Build Coastguard Worker static int
start_writing(struct bufferevent_openssl * bev_ssl)404*663afb9bSAndroid Build Coastguard Worker start_writing(struct bufferevent_openssl *bev_ssl)
405*663afb9bSAndroid Build Coastguard Worker {
406*663afb9bSAndroid Build Coastguard Worker 	int r = 0;
407*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl->underlying) {
408*663afb9bSAndroid Build Coastguard Worker 		if (bev_ssl->write_blocked_on_read) {
409*663afb9bSAndroid Build Coastguard Worker 			bufferevent_unsuspend_read_(bev_ssl->underlying,
410*663afb9bSAndroid Build Coastguard Worker 			    BEV_SUSPEND_FILT_READ);
411*663afb9bSAndroid Build Coastguard Worker 		}
412*663afb9bSAndroid Build Coastguard Worker 	} else {
413*663afb9bSAndroid Build Coastguard Worker 		struct bufferevent *bev = &bev_ssl->bev.bev;
414*663afb9bSAndroid Build Coastguard Worker 		r = bufferevent_add_event_(&bev->ev_write, &bev->timeout_write);
415*663afb9bSAndroid Build Coastguard Worker 		if (!r && bev_ssl->write_blocked_on_read)
416*663afb9bSAndroid Build Coastguard Worker 			r = bufferevent_add_event_(&bev->ev_read,
417*663afb9bSAndroid Build Coastguard Worker 			    &bev->timeout_read);
418*663afb9bSAndroid Build Coastguard Worker 	}
419*663afb9bSAndroid Build Coastguard Worker 	return r;
420*663afb9bSAndroid Build Coastguard Worker }
421*663afb9bSAndroid Build Coastguard Worker 
422*663afb9bSAndroid Build Coastguard Worker static void
stop_reading(struct bufferevent_openssl * bev_ssl)423*663afb9bSAndroid Build Coastguard Worker stop_reading(struct bufferevent_openssl *bev_ssl)
424*663afb9bSAndroid Build Coastguard Worker {
425*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl->write_blocked_on_read)
426*663afb9bSAndroid Build Coastguard Worker 		return;
427*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl->underlying) {
428*663afb9bSAndroid Build Coastguard Worker 		bufferevent_suspend_read_(bev_ssl->underlying,
429*663afb9bSAndroid Build Coastguard Worker 		    BEV_SUSPEND_FILT_READ);
430*663afb9bSAndroid Build Coastguard Worker 	} else {
431*663afb9bSAndroid Build Coastguard Worker 		struct bufferevent *bev = &bev_ssl->bev.bev;
432*663afb9bSAndroid Build Coastguard Worker 		event_del(&bev->ev_read);
433*663afb9bSAndroid Build Coastguard Worker 	}
434*663afb9bSAndroid Build Coastguard Worker }
435*663afb9bSAndroid Build Coastguard Worker 
436*663afb9bSAndroid Build Coastguard Worker static void
stop_writing(struct bufferevent_openssl * bev_ssl)437*663afb9bSAndroid Build Coastguard Worker stop_writing(struct bufferevent_openssl *bev_ssl)
438*663afb9bSAndroid Build Coastguard Worker {
439*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl->read_blocked_on_write)
440*663afb9bSAndroid Build Coastguard Worker 		return;
441*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl->underlying) {
442*663afb9bSAndroid Build Coastguard Worker 		bufferevent_unsuspend_read_(bev_ssl->underlying,
443*663afb9bSAndroid Build Coastguard Worker 		    BEV_SUSPEND_FILT_READ);
444*663afb9bSAndroid Build Coastguard Worker 	} else {
445*663afb9bSAndroid Build Coastguard Worker 		struct bufferevent *bev = &bev_ssl->bev.bev;
446*663afb9bSAndroid Build Coastguard Worker 		event_del(&bev->ev_write);
447*663afb9bSAndroid Build Coastguard Worker 	}
448*663afb9bSAndroid Build Coastguard Worker }
449*663afb9bSAndroid Build Coastguard Worker 
450*663afb9bSAndroid Build Coastguard Worker static int
set_rbow(struct bufferevent_openssl * bev_ssl)451*663afb9bSAndroid Build Coastguard Worker set_rbow(struct bufferevent_openssl *bev_ssl)
452*663afb9bSAndroid Build Coastguard Worker {
453*663afb9bSAndroid Build Coastguard Worker 	if (!bev_ssl->underlying)
454*663afb9bSAndroid Build Coastguard Worker 		stop_reading(bev_ssl);
455*663afb9bSAndroid Build Coastguard Worker 	bev_ssl->read_blocked_on_write = 1;
456*663afb9bSAndroid Build Coastguard Worker 	return start_writing(bev_ssl);
457*663afb9bSAndroid Build Coastguard Worker }
458*663afb9bSAndroid Build Coastguard Worker 
459*663afb9bSAndroid Build Coastguard Worker static int
set_wbor(struct bufferevent_openssl * bev_ssl)460*663afb9bSAndroid Build Coastguard Worker set_wbor(struct bufferevent_openssl *bev_ssl)
461*663afb9bSAndroid Build Coastguard Worker {
462*663afb9bSAndroid Build Coastguard Worker 	if (!bev_ssl->underlying)
463*663afb9bSAndroid Build Coastguard Worker 		stop_writing(bev_ssl);
464*663afb9bSAndroid Build Coastguard Worker 	bev_ssl->write_blocked_on_read = 1;
465*663afb9bSAndroid Build Coastguard Worker 	return start_reading(bev_ssl);
466*663afb9bSAndroid Build Coastguard Worker }
467*663afb9bSAndroid Build Coastguard Worker 
468*663afb9bSAndroid Build Coastguard Worker static int
clear_rbow(struct bufferevent_openssl * bev_ssl)469*663afb9bSAndroid Build Coastguard Worker clear_rbow(struct bufferevent_openssl *bev_ssl)
470*663afb9bSAndroid Build Coastguard Worker {
471*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent *bev = &bev_ssl->bev.bev;
472*663afb9bSAndroid Build Coastguard Worker 	int r = 0;
473*663afb9bSAndroid Build Coastguard Worker 	bev_ssl->read_blocked_on_write = 0;
474*663afb9bSAndroid Build Coastguard Worker 	if (!(bev->enabled & EV_WRITE))
475*663afb9bSAndroid Build Coastguard Worker 		stop_writing(bev_ssl);
476*663afb9bSAndroid Build Coastguard Worker 	if (bev->enabled & EV_READ)
477*663afb9bSAndroid Build Coastguard Worker 		r = start_reading(bev_ssl);
478*663afb9bSAndroid Build Coastguard Worker 	return r;
479*663afb9bSAndroid Build Coastguard Worker }
480*663afb9bSAndroid Build Coastguard Worker 
481*663afb9bSAndroid Build Coastguard Worker 
482*663afb9bSAndroid Build Coastguard Worker static int
clear_wbor(struct bufferevent_openssl * bev_ssl)483*663afb9bSAndroid Build Coastguard Worker clear_wbor(struct bufferevent_openssl *bev_ssl)
484*663afb9bSAndroid Build Coastguard Worker {
485*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent *bev = &bev_ssl->bev.bev;
486*663afb9bSAndroid Build Coastguard Worker 	int r = 0;
487*663afb9bSAndroid Build Coastguard Worker 	bev_ssl->write_blocked_on_read = 0;
488*663afb9bSAndroid Build Coastguard Worker 	if (!(bev->enabled & EV_READ))
489*663afb9bSAndroid Build Coastguard Worker 		stop_reading(bev_ssl);
490*663afb9bSAndroid Build Coastguard Worker 	if (bev->enabled & EV_WRITE)
491*663afb9bSAndroid Build Coastguard Worker 		r = start_writing(bev_ssl);
492*663afb9bSAndroid Build Coastguard Worker 	return r;
493*663afb9bSAndroid Build Coastguard Worker }
494*663afb9bSAndroid Build Coastguard Worker 
495*663afb9bSAndroid Build Coastguard Worker static void
conn_closed(struct bufferevent_openssl * bev_ssl,int when,int errcode,int ret)496*663afb9bSAndroid Build Coastguard Worker conn_closed(struct bufferevent_openssl *bev_ssl, int when, int errcode, int ret)
497*663afb9bSAndroid Build Coastguard Worker {
498*663afb9bSAndroid Build Coastguard Worker 	int event = BEV_EVENT_ERROR;
499*663afb9bSAndroid Build Coastguard Worker 	int dirty_shutdown = 0;
500*663afb9bSAndroid Build Coastguard Worker 	unsigned long err;
501*663afb9bSAndroid Build Coastguard Worker 
502*663afb9bSAndroid Build Coastguard Worker 	switch (errcode) {
503*663afb9bSAndroid Build Coastguard Worker 	case SSL_ERROR_ZERO_RETURN:
504*663afb9bSAndroid Build Coastguard Worker 		/* Possibly a clean shutdown. */
505*663afb9bSAndroid Build Coastguard Worker 		if (SSL_get_shutdown(bev_ssl->ssl) & SSL_RECEIVED_SHUTDOWN)
506*663afb9bSAndroid Build Coastguard Worker 			event = BEV_EVENT_EOF;
507*663afb9bSAndroid Build Coastguard Worker 		else
508*663afb9bSAndroid Build Coastguard Worker 			dirty_shutdown = 1;
509*663afb9bSAndroid Build Coastguard Worker 		break;
510*663afb9bSAndroid Build Coastguard Worker 	case SSL_ERROR_SYSCALL:
511*663afb9bSAndroid Build Coastguard Worker 		/* IO error; possibly a dirty shutdown. */
512*663afb9bSAndroid Build Coastguard Worker 		if ((ret == 0 || ret == -1) && ERR_peek_error() == 0)
513*663afb9bSAndroid Build Coastguard Worker 			dirty_shutdown = 1;
514*663afb9bSAndroid Build Coastguard Worker 		put_error(bev_ssl, errcode);
515*663afb9bSAndroid Build Coastguard Worker 		break;
516*663afb9bSAndroid Build Coastguard Worker 	case SSL_ERROR_SSL:
517*663afb9bSAndroid Build Coastguard Worker 		/* Protocol error. */
518*663afb9bSAndroid Build Coastguard Worker 		put_error(bev_ssl, errcode);
519*663afb9bSAndroid Build Coastguard Worker 		break;
520*663afb9bSAndroid Build Coastguard Worker 	case SSL_ERROR_WANT_X509_LOOKUP:
521*663afb9bSAndroid Build Coastguard Worker 		/* XXXX handle this. */
522*663afb9bSAndroid Build Coastguard Worker 		put_error(bev_ssl, errcode);
523*663afb9bSAndroid Build Coastguard Worker 		break;
524*663afb9bSAndroid Build Coastguard Worker 	case SSL_ERROR_NONE:
525*663afb9bSAndroid Build Coastguard Worker 	case SSL_ERROR_WANT_READ:
526*663afb9bSAndroid Build Coastguard Worker 	case SSL_ERROR_WANT_WRITE:
527*663afb9bSAndroid Build Coastguard Worker 	case SSL_ERROR_WANT_CONNECT:
528*663afb9bSAndroid Build Coastguard Worker 	case SSL_ERROR_WANT_ACCEPT:
529*663afb9bSAndroid Build Coastguard Worker 	default:
530*663afb9bSAndroid Build Coastguard Worker 		/* should be impossible; treat as normal error. */
531*663afb9bSAndroid Build Coastguard Worker 		event_warnx("BUG: Unexpected OpenSSL error code %d", errcode);
532*663afb9bSAndroid Build Coastguard Worker 		break;
533*663afb9bSAndroid Build Coastguard Worker 	}
534*663afb9bSAndroid Build Coastguard Worker 
535*663afb9bSAndroid Build Coastguard Worker 	while ((err = ERR_get_error())) {
536*663afb9bSAndroid Build Coastguard Worker 		put_error(bev_ssl, err);
537*663afb9bSAndroid Build Coastguard Worker 	}
538*663afb9bSAndroid Build Coastguard Worker 
539*663afb9bSAndroid Build Coastguard Worker 	if (dirty_shutdown && bev_ssl->allow_dirty_shutdown)
540*663afb9bSAndroid Build Coastguard Worker 		event = BEV_EVENT_EOF;
541*663afb9bSAndroid Build Coastguard Worker 
542*663afb9bSAndroid Build Coastguard Worker 	stop_reading(bev_ssl);
543*663afb9bSAndroid Build Coastguard Worker 	stop_writing(bev_ssl);
544*663afb9bSAndroid Build Coastguard Worker 
545*663afb9bSAndroid Build Coastguard Worker 	/* when is BEV_EVENT_{READING|WRITING} */
546*663afb9bSAndroid Build Coastguard Worker 	event = when | event;
547*663afb9bSAndroid Build Coastguard Worker 	bufferevent_run_eventcb_(&bev_ssl->bev.bev, event, 0);
548*663afb9bSAndroid Build Coastguard Worker }
549*663afb9bSAndroid Build Coastguard Worker 
550*663afb9bSAndroid Build Coastguard Worker static void
init_bio_counts(struct bufferevent_openssl * bev_ssl)551*663afb9bSAndroid Build Coastguard Worker init_bio_counts(struct bufferevent_openssl *bev_ssl)
552*663afb9bSAndroid Build Coastguard Worker {
553*663afb9bSAndroid Build Coastguard Worker 	BIO *rbio, *wbio;
554*663afb9bSAndroid Build Coastguard Worker 
555*663afb9bSAndroid Build Coastguard Worker 	wbio = SSL_get_wbio(bev_ssl->ssl);
556*663afb9bSAndroid Build Coastguard Worker 	bev_ssl->counts.n_written = wbio ? BIO_number_written(wbio) : 0;
557*663afb9bSAndroid Build Coastguard Worker 	rbio = SSL_get_rbio(bev_ssl->ssl);
558*663afb9bSAndroid Build Coastguard Worker 	bev_ssl->counts.n_read = rbio ? BIO_number_read(rbio) : 0;
559*663afb9bSAndroid Build Coastguard Worker }
560*663afb9bSAndroid Build Coastguard Worker 
561*663afb9bSAndroid Build Coastguard Worker static inline void
decrement_buckets(struct bufferevent_openssl * bev_ssl)562*663afb9bSAndroid Build Coastguard Worker decrement_buckets(struct bufferevent_openssl *bev_ssl)
563*663afb9bSAndroid Build Coastguard Worker {
564*663afb9bSAndroid Build Coastguard Worker 	unsigned long num_w = BIO_number_written(SSL_get_wbio(bev_ssl->ssl));
565*663afb9bSAndroid Build Coastguard Worker 	unsigned long num_r = BIO_number_read(SSL_get_rbio(bev_ssl->ssl));
566*663afb9bSAndroid Build Coastguard Worker 	/* These next two subtractions can wrap around. That's okay. */
567*663afb9bSAndroid Build Coastguard Worker 	unsigned long w = num_w - bev_ssl->counts.n_written;
568*663afb9bSAndroid Build Coastguard Worker 	unsigned long r = num_r - bev_ssl->counts.n_read;
569*663afb9bSAndroid Build Coastguard Worker 	if (w)
570*663afb9bSAndroid Build Coastguard Worker 		bufferevent_decrement_write_buckets_(&bev_ssl->bev, w);
571*663afb9bSAndroid Build Coastguard Worker 	if (r)
572*663afb9bSAndroid Build Coastguard Worker 		bufferevent_decrement_read_buckets_(&bev_ssl->bev, r);
573*663afb9bSAndroid Build Coastguard Worker 	bev_ssl->counts.n_written = num_w;
574*663afb9bSAndroid Build Coastguard Worker 	bev_ssl->counts.n_read = num_r;
575*663afb9bSAndroid Build Coastguard Worker }
576*663afb9bSAndroid Build Coastguard Worker 
577*663afb9bSAndroid Build Coastguard Worker #define OP_MADE_PROGRESS 1
578*663afb9bSAndroid Build Coastguard Worker #define OP_BLOCKED 2
579*663afb9bSAndroid Build Coastguard Worker #define OP_ERR 4
580*663afb9bSAndroid Build Coastguard Worker 
581*663afb9bSAndroid Build Coastguard Worker /* Return a bitmask of OP_MADE_PROGRESS (if we read anything); OP_BLOCKED (if
582*663afb9bSAndroid Build Coastguard Worker    we're now blocked); and OP_ERR (if an error occurred). */
583*663afb9bSAndroid Build Coastguard Worker static int
do_read(struct bufferevent_openssl * bev_ssl,int n_to_read)584*663afb9bSAndroid Build Coastguard Worker do_read(struct bufferevent_openssl *bev_ssl, int n_to_read) {
585*663afb9bSAndroid Build Coastguard Worker 	/* Requires lock */
586*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent *bev = &bev_ssl->bev.bev;
587*663afb9bSAndroid Build Coastguard Worker 	struct evbuffer *input = bev->input;
588*663afb9bSAndroid Build Coastguard Worker 	int r, n, i, n_used = 0, atmost;
589*663afb9bSAndroid Build Coastguard Worker 	struct evbuffer_iovec space[2];
590*663afb9bSAndroid Build Coastguard Worker 	int result = 0;
591*663afb9bSAndroid Build Coastguard Worker 
592*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl->bev.read_suspended)
593*663afb9bSAndroid Build Coastguard Worker 		return 0;
594*663afb9bSAndroid Build Coastguard Worker 
595*663afb9bSAndroid Build Coastguard Worker 	atmost = bufferevent_get_read_max_(&bev_ssl->bev);
596*663afb9bSAndroid Build Coastguard Worker 	if (n_to_read > atmost)
597*663afb9bSAndroid Build Coastguard Worker 		n_to_read = atmost;
598*663afb9bSAndroid Build Coastguard Worker 
599*663afb9bSAndroid Build Coastguard Worker 	n = evbuffer_reserve_space(input, n_to_read, space, 2);
600*663afb9bSAndroid Build Coastguard Worker 	if (n < 0)
601*663afb9bSAndroid Build Coastguard Worker 		return OP_ERR;
602*663afb9bSAndroid Build Coastguard Worker 
603*663afb9bSAndroid Build Coastguard Worker 	for (i=0; i<n; ++i) {
604*663afb9bSAndroid Build Coastguard Worker 		if (bev_ssl->bev.read_suspended)
605*663afb9bSAndroid Build Coastguard Worker 			break;
606*663afb9bSAndroid Build Coastguard Worker 		ERR_clear_error();
607*663afb9bSAndroid Build Coastguard Worker 		r = SSL_read(bev_ssl->ssl, space[i].iov_base, space[i].iov_len);
608*663afb9bSAndroid Build Coastguard Worker 		if (r>0) {
609*663afb9bSAndroid Build Coastguard Worker 			result |= OP_MADE_PROGRESS;
610*663afb9bSAndroid Build Coastguard Worker 			if (bev_ssl->read_blocked_on_write)
611*663afb9bSAndroid Build Coastguard Worker 				if (clear_rbow(bev_ssl) < 0)
612*663afb9bSAndroid Build Coastguard Worker 					return OP_ERR | result;
613*663afb9bSAndroid Build Coastguard Worker 			++n_used;
614*663afb9bSAndroid Build Coastguard Worker 			space[i].iov_len = r;
615*663afb9bSAndroid Build Coastguard Worker 			decrement_buckets(bev_ssl);
616*663afb9bSAndroid Build Coastguard Worker 		} else {
617*663afb9bSAndroid Build Coastguard Worker 			int err = SSL_get_error(bev_ssl->ssl, r);
618*663afb9bSAndroid Build Coastguard Worker 			print_err(err);
619*663afb9bSAndroid Build Coastguard Worker 			switch (err) {
620*663afb9bSAndroid Build Coastguard Worker 			case SSL_ERROR_WANT_READ:
621*663afb9bSAndroid Build Coastguard Worker 				/* Can't read until underlying has more data. */
622*663afb9bSAndroid Build Coastguard Worker 				if (bev_ssl->read_blocked_on_write)
623*663afb9bSAndroid Build Coastguard Worker 					if (clear_rbow(bev_ssl) < 0)
624*663afb9bSAndroid Build Coastguard Worker 						return OP_ERR | result;
625*663afb9bSAndroid Build Coastguard Worker 				break;
626*663afb9bSAndroid Build Coastguard Worker 			case SSL_ERROR_WANT_WRITE:
627*663afb9bSAndroid Build Coastguard Worker 				/* This read operation requires a write, and the
628*663afb9bSAndroid Build Coastguard Worker 				 * underlying is full */
629*663afb9bSAndroid Build Coastguard Worker 				if (!bev_ssl->read_blocked_on_write)
630*663afb9bSAndroid Build Coastguard Worker 					if (set_rbow(bev_ssl) < 0)
631*663afb9bSAndroid Build Coastguard Worker 						return OP_ERR | result;
632*663afb9bSAndroid Build Coastguard Worker 				break;
633*663afb9bSAndroid Build Coastguard Worker 			default:
634*663afb9bSAndroid Build Coastguard Worker 				conn_closed(bev_ssl, BEV_EVENT_READING, err, r);
635*663afb9bSAndroid Build Coastguard Worker 				break;
636*663afb9bSAndroid Build Coastguard Worker 			}
637*663afb9bSAndroid Build Coastguard Worker 			result |= OP_BLOCKED;
638*663afb9bSAndroid Build Coastguard Worker 			break; /* out of the loop */
639*663afb9bSAndroid Build Coastguard Worker 		}
640*663afb9bSAndroid Build Coastguard Worker 	}
641*663afb9bSAndroid Build Coastguard Worker 
642*663afb9bSAndroid Build Coastguard Worker 	if (n_used) {
643*663afb9bSAndroid Build Coastguard Worker 		evbuffer_commit_space(input, space, n_used);
644*663afb9bSAndroid Build Coastguard Worker 		if (bev_ssl->underlying)
645*663afb9bSAndroid Build Coastguard Worker 			BEV_RESET_GENERIC_READ_TIMEOUT(bev);
646*663afb9bSAndroid Build Coastguard Worker 	}
647*663afb9bSAndroid Build Coastguard Worker 
648*663afb9bSAndroid Build Coastguard Worker 	return result;
649*663afb9bSAndroid Build Coastguard Worker }
650*663afb9bSAndroid Build Coastguard Worker 
651*663afb9bSAndroid Build Coastguard Worker /* Return a bitmask of OP_MADE_PROGRESS (if we wrote anything); OP_BLOCKED (if
652*663afb9bSAndroid Build Coastguard Worker    we're now blocked); and OP_ERR (if an error occurred). */
653*663afb9bSAndroid Build Coastguard Worker static int
do_write(struct bufferevent_openssl * bev_ssl,int atmost)654*663afb9bSAndroid Build Coastguard Worker do_write(struct bufferevent_openssl *bev_ssl, int atmost)
655*663afb9bSAndroid Build Coastguard Worker {
656*663afb9bSAndroid Build Coastguard Worker 	int i, r, n, n_written = 0;
657*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent *bev = &bev_ssl->bev.bev;
658*663afb9bSAndroid Build Coastguard Worker 	struct evbuffer *output = bev->output;
659*663afb9bSAndroid Build Coastguard Worker 	struct evbuffer_iovec space[8];
660*663afb9bSAndroid Build Coastguard Worker 	int result = 0;
661*663afb9bSAndroid Build Coastguard Worker 
662*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl->last_write > 0)
663*663afb9bSAndroid Build Coastguard Worker 		atmost = bev_ssl->last_write;
664*663afb9bSAndroid Build Coastguard Worker 	else
665*663afb9bSAndroid Build Coastguard Worker 		atmost = bufferevent_get_write_max_(&bev_ssl->bev);
666*663afb9bSAndroid Build Coastguard Worker 
667*663afb9bSAndroid Build Coastguard Worker 	n = evbuffer_peek(output, atmost, NULL, space, 8);
668*663afb9bSAndroid Build Coastguard Worker 	if (n < 0)
669*663afb9bSAndroid Build Coastguard Worker 		return OP_ERR | result;
670*663afb9bSAndroid Build Coastguard Worker 
671*663afb9bSAndroid Build Coastguard Worker 	if (n > 8)
672*663afb9bSAndroid Build Coastguard Worker 		n = 8;
673*663afb9bSAndroid Build Coastguard Worker 	for (i=0; i < n; ++i) {
674*663afb9bSAndroid Build Coastguard Worker 		if (bev_ssl->bev.write_suspended)
675*663afb9bSAndroid Build Coastguard Worker 			break;
676*663afb9bSAndroid Build Coastguard Worker 
677*663afb9bSAndroid Build Coastguard Worker 		/* SSL_write will (reasonably) return 0 if we tell it to
678*663afb9bSAndroid Build Coastguard Worker 		   send 0 data.  Skip this case so we don't interpret the
679*663afb9bSAndroid Build Coastguard Worker 		   result as an error */
680*663afb9bSAndroid Build Coastguard Worker 		if (space[i].iov_len == 0)
681*663afb9bSAndroid Build Coastguard Worker 			continue;
682*663afb9bSAndroid Build Coastguard Worker 
683*663afb9bSAndroid Build Coastguard Worker 		ERR_clear_error();
684*663afb9bSAndroid Build Coastguard Worker 		r = SSL_write(bev_ssl->ssl, space[i].iov_base,
685*663afb9bSAndroid Build Coastguard Worker 		    space[i].iov_len);
686*663afb9bSAndroid Build Coastguard Worker 		if (r > 0) {
687*663afb9bSAndroid Build Coastguard Worker 			result |= OP_MADE_PROGRESS;
688*663afb9bSAndroid Build Coastguard Worker 			if (bev_ssl->write_blocked_on_read)
689*663afb9bSAndroid Build Coastguard Worker 				if (clear_wbor(bev_ssl) < 0)
690*663afb9bSAndroid Build Coastguard Worker 					return OP_ERR | result;
691*663afb9bSAndroid Build Coastguard Worker 			n_written += r;
692*663afb9bSAndroid Build Coastguard Worker 			bev_ssl->last_write = -1;
693*663afb9bSAndroid Build Coastguard Worker 			decrement_buckets(bev_ssl);
694*663afb9bSAndroid Build Coastguard Worker 		} else {
695*663afb9bSAndroid Build Coastguard Worker 			int err = SSL_get_error(bev_ssl->ssl, r);
696*663afb9bSAndroid Build Coastguard Worker 			print_err(err);
697*663afb9bSAndroid Build Coastguard Worker 			switch (err) {
698*663afb9bSAndroid Build Coastguard Worker 			case SSL_ERROR_WANT_WRITE:
699*663afb9bSAndroid Build Coastguard Worker 				/* Can't read until underlying has more data. */
700*663afb9bSAndroid Build Coastguard Worker 				if (bev_ssl->write_blocked_on_read)
701*663afb9bSAndroid Build Coastguard Worker 					if (clear_wbor(bev_ssl) < 0)
702*663afb9bSAndroid Build Coastguard Worker 						return OP_ERR | result;
703*663afb9bSAndroid Build Coastguard Worker 				bev_ssl->last_write = space[i].iov_len;
704*663afb9bSAndroid Build Coastguard Worker 				break;
705*663afb9bSAndroid Build Coastguard Worker 			case SSL_ERROR_WANT_READ:
706*663afb9bSAndroid Build Coastguard Worker 				/* This read operation requires a write, and the
707*663afb9bSAndroid Build Coastguard Worker 				 * underlying is full */
708*663afb9bSAndroid Build Coastguard Worker 				if (!bev_ssl->write_blocked_on_read)
709*663afb9bSAndroid Build Coastguard Worker 					if (set_wbor(bev_ssl) < 0)
710*663afb9bSAndroid Build Coastguard Worker 						return OP_ERR | result;
711*663afb9bSAndroid Build Coastguard Worker 				bev_ssl->last_write = space[i].iov_len;
712*663afb9bSAndroid Build Coastguard Worker 				break;
713*663afb9bSAndroid Build Coastguard Worker 			default:
714*663afb9bSAndroid Build Coastguard Worker 				conn_closed(bev_ssl, BEV_EVENT_WRITING, err, r);
715*663afb9bSAndroid Build Coastguard Worker 				bev_ssl->last_write = -1;
716*663afb9bSAndroid Build Coastguard Worker 				break;
717*663afb9bSAndroid Build Coastguard Worker 			}
718*663afb9bSAndroid Build Coastguard Worker 			result |= OP_BLOCKED;
719*663afb9bSAndroid Build Coastguard Worker 			break;
720*663afb9bSAndroid Build Coastguard Worker 		}
721*663afb9bSAndroid Build Coastguard Worker 	}
722*663afb9bSAndroid Build Coastguard Worker 	if (n_written) {
723*663afb9bSAndroid Build Coastguard Worker 		evbuffer_drain(output, n_written);
724*663afb9bSAndroid Build Coastguard Worker 		if (bev_ssl->underlying)
725*663afb9bSAndroid Build Coastguard Worker 			BEV_RESET_GENERIC_WRITE_TIMEOUT(bev);
726*663afb9bSAndroid Build Coastguard Worker 
727*663afb9bSAndroid Build Coastguard Worker 		bufferevent_trigger_nolock_(bev, EV_WRITE, BEV_OPT_DEFER_CALLBACKS);
728*663afb9bSAndroid Build Coastguard Worker 	}
729*663afb9bSAndroid Build Coastguard Worker 	return result;
730*663afb9bSAndroid Build Coastguard Worker }
731*663afb9bSAndroid Build Coastguard Worker 
732*663afb9bSAndroid Build Coastguard Worker #define WRITE_FRAME 15000
733*663afb9bSAndroid Build Coastguard Worker 
734*663afb9bSAndroid Build Coastguard Worker #define READ_DEFAULT 4096
735*663afb9bSAndroid Build Coastguard Worker 
736*663afb9bSAndroid Build Coastguard Worker /* Try to figure out how many bytes to read; return 0 if we shouldn't be
737*663afb9bSAndroid Build Coastguard Worker  * reading. */
738*663afb9bSAndroid Build Coastguard Worker static int
bytes_to_read(struct bufferevent_openssl * bev)739*663afb9bSAndroid Build Coastguard Worker bytes_to_read(struct bufferevent_openssl *bev)
740*663afb9bSAndroid Build Coastguard Worker {
741*663afb9bSAndroid Build Coastguard Worker 	struct evbuffer *input = bev->bev.bev.input;
742*663afb9bSAndroid Build Coastguard Worker 	struct event_watermark *wm = &bev->bev.bev.wm_read;
743*663afb9bSAndroid Build Coastguard Worker 	int result = READ_DEFAULT;
744*663afb9bSAndroid Build Coastguard Worker 	ev_ssize_t limit;
745*663afb9bSAndroid Build Coastguard Worker 	/* XXX 99% of this is generic code that nearly all bufferevents will
746*663afb9bSAndroid Build Coastguard Worker 	 * want. */
747*663afb9bSAndroid Build Coastguard Worker 
748*663afb9bSAndroid Build Coastguard Worker 	if (bev->write_blocked_on_read) {
749*663afb9bSAndroid Build Coastguard Worker 		return 0;
750*663afb9bSAndroid Build Coastguard Worker 	}
751*663afb9bSAndroid Build Coastguard Worker 
752*663afb9bSAndroid Build Coastguard Worker 	if (! (bev->bev.bev.enabled & EV_READ)) {
753*663afb9bSAndroid Build Coastguard Worker 		return 0;
754*663afb9bSAndroid Build Coastguard Worker 	}
755*663afb9bSAndroid Build Coastguard Worker 
756*663afb9bSAndroid Build Coastguard Worker 	if (bev->bev.read_suspended) {
757*663afb9bSAndroid Build Coastguard Worker 		return 0;
758*663afb9bSAndroid Build Coastguard Worker 	}
759*663afb9bSAndroid Build Coastguard Worker 
760*663afb9bSAndroid Build Coastguard Worker 	if (wm->high) {
761*663afb9bSAndroid Build Coastguard Worker 		if (evbuffer_get_length(input) >= wm->high) {
762*663afb9bSAndroid Build Coastguard Worker 			return 0;
763*663afb9bSAndroid Build Coastguard Worker 		}
764*663afb9bSAndroid Build Coastguard Worker 
765*663afb9bSAndroid Build Coastguard Worker 		result = wm->high - evbuffer_get_length(input);
766*663afb9bSAndroid Build Coastguard Worker 	} else {
767*663afb9bSAndroid Build Coastguard Worker 		result = READ_DEFAULT;
768*663afb9bSAndroid Build Coastguard Worker 	}
769*663afb9bSAndroid Build Coastguard Worker 
770*663afb9bSAndroid Build Coastguard Worker 	/* Respect the rate limit */
771*663afb9bSAndroid Build Coastguard Worker 	limit = bufferevent_get_read_max_(&bev->bev);
772*663afb9bSAndroid Build Coastguard Worker 	if (result > limit) {
773*663afb9bSAndroid Build Coastguard Worker 		result = limit;
774*663afb9bSAndroid Build Coastguard Worker 	}
775*663afb9bSAndroid Build Coastguard Worker 
776*663afb9bSAndroid Build Coastguard Worker 	return result;
777*663afb9bSAndroid Build Coastguard Worker }
778*663afb9bSAndroid Build Coastguard Worker 
779*663afb9bSAndroid Build Coastguard Worker 
780*663afb9bSAndroid Build Coastguard Worker /* Things look readable.  If write is blocked on read, write till it isn't.
781*663afb9bSAndroid Build Coastguard Worker  * Read from the underlying buffer until we block or we hit our high-water
782*663afb9bSAndroid Build Coastguard Worker  * mark.
783*663afb9bSAndroid Build Coastguard Worker  */
784*663afb9bSAndroid Build Coastguard Worker static void
consider_reading(struct bufferevent_openssl * bev_ssl)785*663afb9bSAndroid Build Coastguard Worker consider_reading(struct bufferevent_openssl *bev_ssl)
786*663afb9bSAndroid Build Coastguard Worker {
787*663afb9bSAndroid Build Coastguard Worker 	int r;
788*663afb9bSAndroid Build Coastguard Worker 	int n_to_read;
789*663afb9bSAndroid Build Coastguard Worker 	int all_result_flags = 0;
790*663afb9bSAndroid Build Coastguard Worker 
791*663afb9bSAndroid Build Coastguard Worker 	while (bev_ssl->write_blocked_on_read) {
792*663afb9bSAndroid Build Coastguard Worker 		r = do_write(bev_ssl, WRITE_FRAME);
793*663afb9bSAndroid Build Coastguard Worker 		if (r & (OP_BLOCKED|OP_ERR))
794*663afb9bSAndroid Build Coastguard Worker 			break;
795*663afb9bSAndroid Build Coastguard Worker 	}
796*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl->write_blocked_on_read)
797*663afb9bSAndroid Build Coastguard Worker 		return;
798*663afb9bSAndroid Build Coastguard Worker 
799*663afb9bSAndroid Build Coastguard Worker 	n_to_read = bytes_to_read(bev_ssl);
800*663afb9bSAndroid Build Coastguard Worker 
801*663afb9bSAndroid Build Coastguard Worker 	while (n_to_read) {
802*663afb9bSAndroid Build Coastguard Worker 		r = do_read(bev_ssl, n_to_read);
803*663afb9bSAndroid Build Coastguard Worker 		all_result_flags |= r;
804*663afb9bSAndroid Build Coastguard Worker 
805*663afb9bSAndroid Build Coastguard Worker 		if (r & (OP_BLOCKED|OP_ERR))
806*663afb9bSAndroid Build Coastguard Worker 			break;
807*663afb9bSAndroid Build Coastguard Worker 
808*663afb9bSAndroid Build Coastguard Worker 		if (bev_ssl->bev.read_suspended)
809*663afb9bSAndroid Build Coastguard Worker 			break;
810*663afb9bSAndroid Build Coastguard Worker 
811*663afb9bSAndroid Build Coastguard Worker 		/* Read all pending data.  This won't hit the network
812*663afb9bSAndroid Build Coastguard Worker 		 * again, and will (most importantly) put us in a state
813*663afb9bSAndroid Build Coastguard Worker 		 * where we don't need to read anything else until the
814*663afb9bSAndroid Build Coastguard Worker 		 * socket is readable again.  It'll potentially make us
815*663afb9bSAndroid Build Coastguard Worker 		 * overrun our read high-watermark (somewhat
816*663afb9bSAndroid Build Coastguard Worker 		 * regrettable).  The damage to the rate-limit has
817*663afb9bSAndroid Build Coastguard Worker 		 * already been done, since OpenSSL went and read a
818*663afb9bSAndroid Build Coastguard Worker 		 * whole SSL record anyway. */
819*663afb9bSAndroid Build Coastguard Worker 		n_to_read = SSL_pending(bev_ssl->ssl);
820*663afb9bSAndroid Build Coastguard Worker 
821*663afb9bSAndroid Build Coastguard Worker 		/* XXX This if statement is actually a bad bug, added to avoid
822*663afb9bSAndroid Build Coastguard Worker 		 * XXX a worse bug.
823*663afb9bSAndroid Build Coastguard Worker 		 *
824*663afb9bSAndroid Build Coastguard Worker 		 * The bad bug: It can potentially cause resource unfairness
825*663afb9bSAndroid Build Coastguard Worker 		 * by reading too much data from the underlying bufferevent;
826*663afb9bSAndroid Build Coastguard Worker 		 * it can potentially cause read looping if the underlying
827*663afb9bSAndroid Build Coastguard Worker 		 * bufferevent is a bufferevent_pair and deferred callbacks
828*663afb9bSAndroid Build Coastguard Worker 		 * aren't used.
829*663afb9bSAndroid Build Coastguard Worker 		 *
830*663afb9bSAndroid Build Coastguard Worker 		 * The worse bug: If we didn't do this, then we would
831*663afb9bSAndroid Build Coastguard Worker 		 * potentially not read any more from bev_ssl->underlying
832*663afb9bSAndroid Build Coastguard Worker 		 * until more data arrived there, which could lead to us
833*663afb9bSAndroid Build Coastguard Worker 		 * waiting forever.
834*663afb9bSAndroid Build Coastguard Worker 		 */
835*663afb9bSAndroid Build Coastguard Worker 		if (!n_to_read && bev_ssl->underlying)
836*663afb9bSAndroid Build Coastguard Worker 			n_to_read = bytes_to_read(bev_ssl);
837*663afb9bSAndroid Build Coastguard Worker 	}
838*663afb9bSAndroid Build Coastguard Worker 
839*663afb9bSAndroid Build Coastguard Worker 	if (all_result_flags & OP_MADE_PROGRESS) {
840*663afb9bSAndroid Build Coastguard Worker 		struct bufferevent *bev = &bev_ssl->bev.bev;
841*663afb9bSAndroid Build Coastguard Worker 
842*663afb9bSAndroid Build Coastguard Worker 		bufferevent_trigger_nolock_(bev, EV_READ, 0);
843*663afb9bSAndroid Build Coastguard Worker 	}
844*663afb9bSAndroid Build Coastguard Worker 
845*663afb9bSAndroid Build Coastguard Worker 	if (!bev_ssl->underlying) {
846*663afb9bSAndroid Build Coastguard Worker 		/* Should be redundant, but let's avoid busy-looping */
847*663afb9bSAndroid Build Coastguard Worker 		if (bev_ssl->bev.read_suspended ||
848*663afb9bSAndroid Build Coastguard Worker 		    !(bev_ssl->bev.bev.enabled & EV_READ)) {
849*663afb9bSAndroid Build Coastguard Worker 			event_del(&bev_ssl->bev.bev.ev_read);
850*663afb9bSAndroid Build Coastguard Worker 		}
851*663afb9bSAndroid Build Coastguard Worker 	}
852*663afb9bSAndroid Build Coastguard Worker }
853*663afb9bSAndroid Build Coastguard Worker 
854*663afb9bSAndroid Build Coastguard Worker static void
consider_writing(struct bufferevent_openssl * bev_ssl)855*663afb9bSAndroid Build Coastguard Worker consider_writing(struct bufferevent_openssl *bev_ssl)
856*663afb9bSAndroid Build Coastguard Worker {
857*663afb9bSAndroid Build Coastguard Worker 	int r;
858*663afb9bSAndroid Build Coastguard Worker 	struct evbuffer *output = bev_ssl->bev.bev.output;
859*663afb9bSAndroid Build Coastguard Worker 	struct evbuffer *target = NULL;
860*663afb9bSAndroid Build Coastguard Worker 	struct event_watermark *wm = NULL;
861*663afb9bSAndroid Build Coastguard Worker 
862*663afb9bSAndroid Build Coastguard Worker 	while (bev_ssl->read_blocked_on_write) {
863*663afb9bSAndroid Build Coastguard Worker 		r = do_read(bev_ssl, 1024); /* XXXX 1024 is a hack */
864*663afb9bSAndroid Build Coastguard Worker 		if (r & OP_MADE_PROGRESS) {
865*663afb9bSAndroid Build Coastguard Worker 			struct bufferevent *bev = &bev_ssl->bev.bev;
866*663afb9bSAndroid Build Coastguard Worker 
867*663afb9bSAndroid Build Coastguard Worker 			bufferevent_trigger_nolock_(bev, EV_READ, 0);
868*663afb9bSAndroid Build Coastguard Worker 		}
869*663afb9bSAndroid Build Coastguard Worker 		if (r & (OP_ERR|OP_BLOCKED))
870*663afb9bSAndroid Build Coastguard Worker 			break;
871*663afb9bSAndroid Build Coastguard Worker 	}
872*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl->read_blocked_on_write)
873*663afb9bSAndroid Build Coastguard Worker 		return;
874*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl->underlying) {
875*663afb9bSAndroid Build Coastguard Worker 		target = bev_ssl->underlying->output;
876*663afb9bSAndroid Build Coastguard Worker 		wm = &bev_ssl->underlying->wm_write;
877*663afb9bSAndroid Build Coastguard Worker 	}
878*663afb9bSAndroid Build Coastguard Worker 	while ((bev_ssl->bev.bev.enabled & EV_WRITE) &&
879*663afb9bSAndroid Build Coastguard Worker 	    (! bev_ssl->bev.write_suspended) &&
880*663afb9bSAndroid Build Coastguard Worker 	    evbuffer_get_length(output) &&
881*663afb9bSAndroid Build Coastguard Worker 	    (!target || (! wm->high || evbuffer_get_length(target) < wm->high))) {
882*663afb9bSAndroid Build Coastguard Worker 		int n_to_write;
883*663afb9bSAndroid Build Coastguard Worker 		if (wm && wm->high)
884*663afb9bSAndroid Build Coastguard Worker 			n_to_write = wm->high - evbuffer_get_length(target);
885*663afb9bSAndroid Build Coastguard Worker 		else
886*663afb9bSAndroid Build Coastguard Worker 			n_to_write = WRITE_FRAME;
887*663afb9bSAndroid Build Coastguard Worker 		r = do_write(bev_ssl, n_to_write);
888*663afb9bSAndroid Build Coastguard Worker 		if (r & (OP_BLOCKED|OP_ERR))
889*663afb9bSAndroid Build Coastguard Worker 			break;
890*663afb9bSAndroid Build Coastguard Worker 	}
891*663afb9bSAndroid Build Coastguard Worker 
892*663afb9bSAndroid Build Coastguard Worker 	if (!bev_ssl->underlying) {
893*663afb9bSAndroid Build Coastguard Worker 		if (evbuffer_get_length(output) == 0) {
894*663afb9bSAndroid Build Coastguard Worker 			event_del(&bev_ssl->bev.bev.ev_write);
895*663afb9bSAndroid Build Coastguard Worker 		} else if (bev_ssl->bev.write_suspended ||
896*663afb9bSAndroid Build Coastguard Worker 		    !(bev_ssl->bev.bev.enabled & EV_WRITE)) {
897*663afb9bSAndroid Build Coastguard Worker 			/* Should be redundant, but let's avoid busy-looping */
898*663afb9bSAndroid Build Coastguard Worker 			event_del(&bev_ssl->bev.bev.ev_write);
899*663afb9bSAndroid Build Coastguard Worker 		}
900*663afb9bSAndroid Build Coastguard Worker 	}
901*663afb9bSAndroid Build Coastguard Worker }
902*663afb9bSAndroid Build Coastguard Worker 
903*663afb9bSAndroid Build Coastguard Worker static void
be_openssl_readcb(struct bufferevent * bev_base,void * ctx)904*663afb9bSAndroid Build Coastguard Worker be_openssl_readcb(struct bufferevent *bev_base, void *ctx)
905*663afb9bSAndroid Build Coastguard Worker {
906*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl = ctx;
907*663afb9bSAndroid Build Coastguard Worker 	consider_reading(bev_ssl);
908*663afb9bSAndroid Build Coastguard Worker }
909*663afb9bSAndroid Build Coastguard Worker 
910*663afb9bSAndroid Build Coastguard Worker static void
be_openssl_writecb(struct bufferevent * bev_base,void * ctx)911*663afb9bSAndroid Build Coastguard Worker be_openssl_writecb(struct bufferevent *bev_base, void *ctx)
912*663afb9bSAndroid Build Coastguard Worker {
913*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl = ctx;
914*663afb9bSAndroid Build Coastguard Worker 	consider_writing(bev_ssl);
915*663afb9bSAndroid Build Coastguard Worker }
916*663afb9bSAndroid Build Coastguard Worker 
917*663afb9bSAndroid Build Coastguard Worker static void
be_openssl_eventcb(struct bufferevent * bev_base,short what,void * ctx)918*663afb9bSAndroid Build Coastguard Worker be_openssl_eventcb(struct bufferevent *bev_base, short what, void *ctx)
919*663afb9bSAndroid Build Coastguard Worker {
920*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl = ctx;
921*663afb9bSAndroid Build Coastguard Worker 	int event = 0;
922*663afb9bSAndroid Build Coastguard Worker 
923*663afb9bSAndroid Build Coastguard Worker 	if (what & BEV_EVENT_EOF) {
924*663afb9bSAndroid Build Coastguard Worker 		if (bev_ssl->allow_dirty_shutdown)
925*663afb9bSAndroid Build Coastguard Worker 			event = BEV_EVENT_EOF;
926*663afb9bSAndroid Build Coastguard Worker 		else
927*663afb9bSAndroid Build Coastguard Worker 			event = BEV_EVENT_ERROR;
928*663afb9bSAndroid Build Coastguard Worker 	} else if (what & BEV_EVENT_TIMEOUT) {
929*663afb9bSAndroid Build Coastguard Worker 		/* We sure didn't set this.  Propagate it to the user. */
930*663afb9bSAndroid Build Coastguard Worker 		event = what;
931*663afb9bSAndroid Build Coastguard Worker 	} else if (what & BEV_EVENT_ERROR) {
932*663afb9bSAndroid Build Coastguard Worker 		/* An error occurred on the connection.  Propagate it to the user. */
933*663afb9bSAndroid Build Coastguard Worker 		event = what;
934*663afb9bSAndroid Build Coastguard Worker 	} else if (what & BEV_EVENT_CONNECTED) {
935*663afb9bSAndroid Build Coastguard Worker 		/* Ignore it.  We're saying SSL_connect() already, which will
936*663afb9bSAndroid Build Coastguard Worker 		   eat it. */
937*663afb9bSAndroid Build Coastguard Worker 	}
938*663afb9bSAndroid Build Coastguard Worker 	if (event)
939*663afb9bSAndroid Build Coastguard Worker 		bufferevent_run_eventcb_(&bev_ssl->bev.bev, event, 0);
940*663afb9bSAndroid Build Coastguard Worker }
941*663afb9bSAndroid Build Coastguard Worker 
942*663afb9bSAndroid Build Coastguard Worker static void
be_openssl_readeventcb(evutil_socket_t fd,short what,void * ptr)943*663afb9bSAndroid Build Coastguard Worker be_openssl_readeventcb(evutil_socket_t fd, short what, void *ptr)
944*663afb9bSAndroid Build Coastguard Worker {
945*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl = ptr;
946*663afb9bSAndroid Build Coastguard Worker 	bufferevent_incref_and_lock_(&bev_ssl->bev.bev);
947*663afb9bSAndroid Build Coastguard Worker 	if (what == EV_TIMEOUT) {
948*663afb9bSAndroid Build Coastguard Worker 		bufferevent_run_eventcb_(&bev_ssl->bev.bev,
949*663afb9bSAndroid Build Coastguard Worker 		    BEV_EVENT_TIMEOUT|BEV_EVENT_READING, 0);
950*663afb9bSAndroid Build Coastguard Worker 	} else {
951*663afb9bSAndroid Build Coastguard Worker 		consider_reading(bev_ssl);
952*663afb9bSAndroid Build Coastguard Worker 	}
953*663afb9bSAndroid Build Coastguard Worker 	bufferevent_decref_and_unlock_(&bev_ssl->bev.bev);
954*663afb9bSAndroid Build Coastguard Worker }
955*663afb9bSAndroid Build Coastguard Worker 
956*663afb9bSAndroid Build Coastguard Worker static void
be_openssl_writeeventcb(evutil_socket_t fd,short what,void * ptr)957*663afb9bSAndroid Build Coastguard Worker be_openssl_writeeventcb(evutil_socket_t fd, short what, void *ptr)
958*663afb9bSAndroid Build Coastguard Worker {
959*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl = ptr;
960*663afb9bSAndroid Build Coastguard Worker 	bufferevent_incref_and_lock_(&bev_ssl->bev.bev);
961*663afb9bSAndroid Build Coastguard Worker 	if (what == EV_TIMEOUT) {
962*663afb9bSAndroid Build Coastguard Worker 		bufferevent_run_eventcb_(&bev_ssl->bev.bev,
963*663afb9bSAndroid Build Coastguard Worker 		    BEV_EVENT_TIMEOUT|BEV_EVENT_WRITING, 0);
964*663afb9bSAndroid Build Coastguard Worker 	} else {
965*663afb9bSAndroid Build Coastguard Worker 		consider_writing(bev_ssl);
966*663afb9bSAndroid Build Coastguard Worker 	}
967*663afb9bSAndroid Build Coastguard Worker 	bufferevent_decref_and_unlock_(&bev_ssl->bev.bev);
968*663afb9bSAndroid Build Coastguard Worker }
969*663afb9bSAndroid Build Coastguard Worker 
970*663afb9bSAndroid Build Coastguard Worker static evutil_socket_t
be_openssl_auto_fd(struct bufferevent_openssl * bev_ssl,evutil_socket_t fd)971*663afb9bSAndroid Build Coastguard Worker be_openssl_auto_fd(struct bufferevent_openssl *bev_ssl, evutil_socket_t fd)
972*663afb9bSAndroid Build Coastguard Worker {
973*663afb9bSAndroid Build Coastguard Worker 	if (!bev_ssl->underlying) {
974*663afb9bSAndroid Build Coastguard Worker 		struct bufferevent *bev = &bev_ssl->bev.bev;
975*663afb9bSAndroid Build Coastguard Worker 		if (event_initialized(&bev->ev_read) && fd < 0) {
976*663afb9bSAndroid Build Coastguard Worker 			fd = event_get_fd(&bev->ev_read);
977*663afb9bSAndroid Build Coastguard Worker 		}
978*663afb9bSAndroid Build Coastguard Worker 	}
979*663afb9bSAndroid Build Coastguard Worker 	return fd;
980*663afb9bSAndroid Build Coastguard Worker }
981*663afb9bSAndroid Build Coastguard Worker 
982*663afb9bSAndroid Build Coastguard Worker static int
set_open_callbacks(struct bufferevent_openssl * bev_ssl,evutil_socket_t fd)983*663afb9bSAndroid Build Coastguard Worker set_open_callbacks(struct bufferevent_openssl *bev_ssl, evutil_socket_t fd)
984*663afb9bSAndroid Build Coastguard Worker {
985*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl->underlying) {
986*663afb9bSAndroid Build Coastguard Worker 		bufferevent_setcb(bev_ssl->underlying,
987*663afb9bSAndroid Build Coastguard Worker 		    be_openssl_readcb, be_openssl_writecb, be_openssl_eventcb,
988*663afb9bSAndroid Build Coastguard Worker 		    bev_ssl);
989*663afb9bSAndroid Build Coastguard Worker 		return 0;
990*663afb9bSAndroid Build Coastguard Worker 	} else {
991*663afb9bSAndroid Build Coastguard Worker 		struct bufferevent *bev = &bev_ssl->bev.bev;
992*663afb9bSAndroid Build Coastguard Worker 		int rpending=0, wpending=0, r1=0, r2=0;
993*663afb9bSAndroid Build Coastguard Worker 
994*663afb9bSAndroid Build Coastguard Worker 		if (event_initialized(&bev->ev_read)) {
995*663afb9bSAndroid Build Coastguard Worker 			rpending = event_pending(&bev->ev_read, EV_READ, NULL);
996*663afb9bSAndroid Build Coastguard Worker 			wpending = event_pending(&bev->ev_write, EV_WRITE, NULL);
997*663afb9bSAndroid Build Coastguard Worker 
998*663afb9bSAndroid Build Coastguard Worker 			event_del(&bev->ev_read);
999*663afb9bSAndroid Build Coastguard Worker 			event_del(&bev->ev_write);
1000*663afb9bSAndroid Build Coastguard Worker 		}
1001*663afb9bSAndroid Build Coastguard Worker 
1002*663afb9bSAndroid Build Coastguard Worker 		event_assign(&bev->ev_read, bev->ev_base, fd,
1003*663afb9bSAndroid Build Coastguard Worker 		    EV_READ|EV_PERSIST|EV_FINALIZE,
1004*663afb9bSAndroid Build Coastguard Worker 		    be_openssl_readeventcb, bev_ssl);
1005*663afb9bSAndroid Build Coastguard Worker 		event_assign(&bev->ev_write, bev->ev_base, fd,
1006*663afb9bSAndroid Build Coastguard Worker 		    EV_WRITE|EV_PERSIST|EV_FINALIZE,
1007*663afb9bSAndroid Build Coastguard Worker 		    be_openssl_writeeventcb, bev_ssl);
1008*663afb9bSAndroid Build Coastguard Worker 
1009*663afb9bSAndroid Build Coastguard Worker 		if (rpending)
1010*663afb9bSAndroid Build Coastguard Worker 			r1 = bufferevent_add_event_(&bev->ev_read, &bev->timeout_read);
1011*663afb9bSAndroid Build Coastguard Worker 		if (wpending)
1012*663afb9bSAndroid Build Coastguard Worker 			r2 = bufferevent_add_event_(&bev->ev_write, &bev->timeout_write);
1013*663afb9bSAndroid Build Coastguard Worker 
1014*663afb9bSAndroid Build Coastguard Worker 		return (r1<0 || r2<0) ? -1 : 0;
1015*663afb9bSAndroid Build Coastguard Worker 	}
1016*663afb9bSAndroid Build Coastguard Worker }
1017*663afb9bSAndroid Build Coastguard Worker 
1018*663afb9bSAndroid Build Coastguard Worker static int
do_handshake(struct bufferevent_openssl * bev_ssl)1019*663afb9bSAndroid Build Coastguard Worker do_handshake(struct bufferevent_openssl *bev_ssl)
1020*663afb9bSAndroid Build Coastguard Worker {
1021*663afb9bSAndroid Build Coastguard Worker 	int r;
1022*663afb9bSAndroid Build Coastguard Worker 
1023*663afb9bSAndroid Build Coastguard Worker 	switch (bev_ssl->state) {
1024*663afb9bSAndroid Build Coastguard Worker 	default:
1025*663afb9bSAndroid Build Coastguard Worker 	case BUFFEREVENT_SSL_OPEN:
1026*663afb9bSAndroid Build Coastguard Worker 		EVUTIL_ASSERT(0);
1027*663afb9bSAndroid Build Coastguard Worker 		return -1;
1028*663afb9bSAndroid Build Coastguard Worker 	case BUFFEREVENT_SSL_CONNECTING:
1029*663afb9bSAndroid Build Coastguard Worker 	case BUFFEREVENT_SSL_ACCEPTING:
1030*663afb9bSAndroid Build Coastguard Worker 		ERR_clear_error();
1031*663afb9bSAndroid Build Coastguard Worker 		r = SSL_do_handshake(bev_ssl->ssl);
1032*663afb9bSAndroid Build Coastguard Worker 		break;
1033*663afb9bSAndroid Build Coastguard Worker 	}
1034*663afb9bSAndroid Build Coastguard Worker 	decrement_buckets(bev_ssl);
1035*663afb9bSAndroid Build Coastguard Worker 
1036*663afb9bSAndroid Build Coastguard Worker 	if (r==1) {
1037*663afb9bSAndroid Build Coastguard Worker 		evutil_socket_t fd = event_get_fd(&bev_ssl->bev.bev.ev_read);
1038*663afb9bSAndroid Build Coastguard Worker 		/* We're done! */
1039*663afb9bSAndroid Build Coastguard Worker 		bev_ssl->state = BUFFEREVENT_SSL_OPEN;
1040*663afb9bSAndroid Build Coastguard Worker 		set_open_callbacks(bev_ssl, fd); /* XXXX handle failure */
1041*663afb9bSAndroid Build Coastguard Worker 		/* Call do_read and do_write as needed */
1042*663afb9bSAndroid Build Coastguard Worker 		bufferevent_enable(&bev_ssl->bev.bev, bev_ssl->bev.bev.enabled);
1043*663afb9bSAndroid Build Coastguard Worker 		bufferevent_run_eventcb_(&bev_ssl->bev.bev,
1044*663afb9bSAndroid Build Coastguard Worker 		    BEV_EVENT_CONNECTED, 0);
1045*663afb9bSAndroid Build Coastguard Worker 		return 1;
1046*663afb9bSAndroid Build Coastguard Worker 	} else {
1047*663afb9bSAndroid Build Coastguard Worker 		int err = SSL_get_error(bev_ssl->ssl, r);
1048*663afb9bSAndroid Build Coastguard Worker 		print_err(err);
1049*663afb9bSAndroid Build Coastguard Worker 		switch (err) {
1050*663afb9bSAndroid Build Coastguard Worker 		case SSL_ERROR_WANT_WRITE:
1051*663afb9bSAndroid Build Coastguard Worker 			stop_reading(bev_ssl);
1052*663afb9bSAndroid Build Coastguard Worker 			return start_writing(bev_ssl);
1053*663afb9bSAndroid Build Coastguard Worker 		case SSL_ERROR_WANT_READ:
1054*663afb9bSAndroid Build Coastguard Worker 			stop_writing(bev_ssl);
1055*663afb9bSAndroid Build Coastguard Worker 			return start_reading(bev_ssl);
1056*663afb9bSAndroid Build Coastguard Worker 		default:
1057*663afb9bSAndroid Build Coastguard Worker 			conn_closed(bev_ssl, BEV_EVENT_READING, err, r);
1058*663afb9bSAndroid Build Coastguard Worker 			return -1;
1059*663afb9bSAndroid Build Coastguard Worker 		}
1060*663afb9bSAndroid Build Coastguard Worker 	}
1061*663afb9bSAndroid Build Coastguard Worker }
1062*663afb9bSAndroid Build Coastguard Worker 
1063*663afb9bSAndroid Build Coastguard Worker static void
be_openssl_handshakecb(struct bufferevent * bev_base,void * ctx)1064*663afb9bSAndroid Build Coastguard Worker be_openssl_handshakecb(struct bufferevent *bev_base, void *ctx)
1065*663afb9bSAndroid Build Coastguard Worker {
1066*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl = ctx;
1067*663afb9bSAndroid Build Coastguard Worker 	do_handshake(bev_ssl);/* XXX handle failure */
1068*663afb9bSAndroid Build Coastguard Worker }
1069*663afb9bSAndroid Build Coastguard Worker 
1070*663afb9bSAndroid Build Coastguard Worker static void
be_openssl_handshakeeventcb(evutil_socket_t fd,short what,void * ptr)1071*663afb9bSAndroid Build Coastguard Worker be_openssl_handshakeeventcb(evutil_socket_t fd, short what, void *ptr)
1072*663afb9bSAndroid Build Coastguard Worker {
1073*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl = ptr;
1074*663afb9bSAndroid Build Coastguard Worker 
1075*663afb9bSAndroid Build Coastguard Worker 	bufferevent_incref_and_lock_(&bev_ssl->bev.bev);
1076*663afb9bSAndroid Build Coastguard Worker 	if (what & EV_TIMEOUT) {
1077*663afb9bSAndroid Build Coastguard Worker 		bufferevent_run_eventcb_(&bev_ssl->bev.bev, BEV_EVENT_TIMEOUT, 0);
1078*663afb9bSAndroid Build Coastguard Worker 	} else
1079*663afb9bSAndroid Build Coastguard Worker 		do_handshake(bev_ssl);/* XXX handle failure */
1080*663afb9bSAndroid Build Coastguard Worker 	bufferevent_decref_and_unlock_(&bev_ssl->bev.bev);
1081*663afb9bSAndroid Build Coastguard Worker }
1082*663afb9bSAndroid Build Coastguard Worker 
1083*663afb9bSAndroid Build Coastguard Worker static int
set_handshake_callbacks(struct bufferevent_openssl * bev_ssl,evutil_socket_t fd)1084*663afb9bSAndroid Build Coastguard Worker set_handshake_callbacks(struct bufferevent_openssl *bev_ssl, evutil_socket_t fd)
1085*663afb9bSAndroid Build Coastguard Worker {
1086*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl->underlying) {
1087*663afb9bSAndroid Build Coastguard Worker 		bufferevent_setcb(bev_ssl->underlying,
1088*663afb9bSAndroid Build Coastguard Worker 		    be_openssl_handshakecb, be_openssl_handshakecb,
1089*663afb9bSAndroid Build Coastguard Worker 		    be_openssl_eventcb,
1090*663afb9bSAndroid Build Coastguard Worker 		    bev_ssl);
1091*663afb9bSAndroid Build Coastguard Worker 
1092*663afb9bSAndroid Build Coastguard Worker 		if (fd < 0)
1093*663afb9bSAndroid Build Coastguard Worker 			return 0;
1094*663afb9bSAndroid Build Coastguard Worker 
1095*663afb9bSAndroid Build Coastguard Worker 		if (bufferevent_setfd(bev_ssl->underlying, fd))
1096*663afb9bSAndroid Build Coastguard Worker 			return 1;
1097*663afb9bSAndroid Build Coastguard Worker 
1098*663afb9bSAndroid Build Coastguard Worker 		return do_handshake(bev_ssl);
1099*663afb9bSAndroid Build Coastguard Worker 	} else {
1100*663afb9bSAndroid Build Coastguard Worker 		struct bufferevent *bev = &bev_ssl->bev.bev;
1101*663afb9bSAndroid Build Coastguard Worker 
1102*663afb9bSAndroid Build Coastguard Worker 		if (event_initialized(&bev->ev_read)) {
1103*663afb9bSAndroid Build Coastguard Worker 			event_del(&bev->ev_read);
1104*663afb9bSAndroid Build Coastguard Worker 			event_del(&bev->ev_write);
1105*663afb9bSAndroid Build Coastguard Worker 		}
1106*663afb9bSAndroid Build Coastguard Worker 
1107*663afb9bSAndroid Build Coastguard Worker 		event_assign(&bev->ev_read, bev->ev_base, fd,
1108*663afb9bSAndroid Build Coastguard Worker 		    EV_READ|EV_PERSIST|EV_FINALIZE,
1109*663afb9bSAndroid Build Coastguard Worker 		    be_openssl_handshakeeventcb, bev_ssl);
1110*663afb9bSAndroid Build Coastguard Worker 		event_assign(&bev->ev_write, bev->ev_base, fd,
1111*663afb9bSAndroid Build Coastguard Worker 		    EV_WRITE|EV_PERSIST|EV_FINALIZE,
1112*663afb9bSAndroid Build Coastguard Worker 		    be_openssl_handshakeeventcb, bev_ssl);
1113*663afb9bSAndroid Build Coastguard Worker 		if (fd >= 0)
1114*663afb9bSAndroid Build Coastguard Worker 			bufferevent_enable(bev, bev->enabled);
1115*663afb9bSAndroid Build Coastguard Worker 		return 0;
1116*663afb9bSAndroid Build Coastguard Worker 	}
1117*663afb9bSAndroid Build Coastguard Worker }
1118*663afb9bSAndroid Build Coastguard Worker 
1119*663afb9bSAndroid Build Coastguard Worker int
bufferevent_ssl_renegotiate(struct bufferevent * bev)1120*663afb9bSAndroid Build Coastguard Worker bufferevent_ssl_renegotiate(struct bufferevent *bev)
1121*663afb9bSAndroid Build Coastguard Worker {
1122*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl = upcast(bev);
1123*663afb9bSAndroid Build Coastguard Worker 	if (!bev_ssl)
1124*663afb9bSAndroid Build Coastguard Worker 		return -1;
1125*663afb9bSAndroid Build Coastguard Worker 	if (SSL_renegotiate(bev_ssl->ssl) < 0)
1126*663afb9bSAndroid Build Coastguard Worker 		return -1;
1127*663afb9bSAndroid Build Coastguard Worker 	bev_ssl->state = BUFFEREVENT_SSL_CONNECTING;
1128*663afb9bSAndroid Build Coastguard Worker 	if (set_handshake_callbacks(bev_ssl, be_openssl_auto_fd(bev_ssl, -1)) < 0)
1129*663afb9bSAndroid Build Coastguard Worker 		return -1;
1130*663afb9bSAndroid Build Coastguard Worker 	if (!bev_ssl->underlying)
1131*663afb9bSAndroid Build Coastguard Worker 		return do_handshake(bev_ssl);
1132*663afb9bSAndroid Build Coastguard Worker 	return 0;
1133*663afb9bSAndroid Build Coastguard Worker }
1134*663afb9bSAndroid Build Coastguard Worker 
1135*663afb9bSAndroid Build Coastguard Worker static void
be_openssl_outbuf_cb(struct evbuffer * buf,const struct evbuffer_cb_info * cbinfo,void * arg)1136*663afb9bSAndroid Build Coastguard Worker be_openssl_outbuf_cb(struct evbuffer *buf,
1137*663afb9bSAndroid Build Coastguard Worker     const struct evbuffer_cb_info *cbinfo, void *arg)
1138*663afb9bSAndroid Build Coastguard Worker {
1139*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl = arg;
1140*663afb9bSAndroid Build Coastguard Worker 	int r = 0;
1141*663afb9bSAndroid Build Coastguard Worker 	/* XXX need to hold a reference here. */
1142*663afb9bSAndroid Build Coastguard Worker 
1143*663afb9bSAndroid Build Coastguard Worker 	if (cbinfo->n_added && bev_ssl->state == BUFFEREVENT_SSL_OPEN) {
1144*663afb9bSAndroid Build Coastguard Worker 		if (cbinfo->orig_size == 0)
1145*663afb9bSAndroid Build Coastguard Worker 			r = bufferevent_add_event_(&bev_ssl->bev.bev.ev_write,
1146*663afb9bSAndroid Build Coastguard Worker 			    &bev_ssl->bev.bev.timeout_write);
1147*663afb9bSAndroid Build Coastguard Worker 
1148*663afb9bSAndroid Build Coastguard Worker 		if (bev_ssl->underlying)
1149*663afb9bSAndroid Build Coastguard Worker 			consider_writing(bev_ssl);
1150*663afb9bSAndroid Build Coastguard Worker 	}
1151*663afb9bSAndroid Build Coastguard Worker 	/* XXX Handle r < 0 */
1152*663afb9bSAndroid Build Coastguard Worker 	(void)r;
1153*663afb9bSAndroid Build Coastguard Worker }
1154*663afb9bSAndroid Build Coastguard Worker 
1155*663afb9bSAndroid Build Coastguard Worker 
1156*663afb9bSAndroid Build Coastguard Worker static int
be_openssl_enable(struct bufferevent * bev,short events)1157*663afb9bSAndroid Build Coastguard Worker be_openssl_enable(struct bufferevent *bev, short events)
1158*663afb9bSAndroid Build Coastguard Worker {
1159*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl = upcast(bev);
1160*663afb9bSAndroid Build Coastguard Worker 	int r1 = 0, r2 = 0;
1161*663afb9bSAndroid Build Coastguard Worker 
1162*663afb9bSAndroid Build Coastguard Worker 	if (events & EV_READ)
1163*663afb9bSAndroid Build Coastguard Worker 		r1 = start_reading(bev_ssl);
1164*663afb9bSAndroid Build Coastguard Worker 	if (events & EV_WRITE)
1165*663afb9bSAndroid Build Coastguard Worker 		r2 = start_writing(bev_ssl);
1166*663afb9bSAndroid Build Coastguard Worker 
1167*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl->underlying) {
1168*663afb9bSAndroid Build Coastguard Worker 		if (events & EV_READ)
1169*663afb9bSAndroid Build Coastguard Worker 			BEV_RESET_GENERIC_READ_TIMEOUT(bev);
1170*663afb9bSAndroid Build Coastguard Worker 		if (events & EV_WRITE)
1171*663afb9bSAndroid Build Coastguard Worker 			BEV_RESET_GENERIC_WRITE_TIMEOUT(bev);
1172*663afb9bSAndroid Build Coastguard Worker 
1173*663afb9bSAndroid Build Coastguard Worker 		if (events & EV_READ)
1174*663afb9bSAndroid Build Coastguard Worker 			consider_reading(bev_ssl);
1175*663afb9bSAndroid Build Coastguard Worker 		if (events & EV_WRITE)
1176*663afb9bSAndroid Build Coastguard Worker 			consider_writing(bev_ssl);
1177*663afb9bSAndroid Build Coastguard Worker 	}
1178*663afb9bSAndroid Build Coastguard Worker 	return (r1 < 0 || r2 < 0) ? -1 : 0;
1179*663afb9bSAndroid Build Coastguard Worker }
1180*663afb9bSAndroid Build Coastguard Worker 
1181*663afb9bSAndroid Build Coastguard Worker static int
be_openssl_disable(struct bufferevent * bev,short events)1182*663afb9bSAndroid Build Coastguard Worker be_openssl_disable(struct bufferevent *bev, short events)
1183*663afb9bSAndroid Build Coastguard Worker {
1184*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl = upcast(bev);
1185*663afb9bSAndroid Build Coastguard Worker 
1186*663afb9bSAndroid Build Coastguard Worker 	if (events & EV_READ)
1187*663afb9bSAndroid Build Coastguard Worker 		stop_reading(bev_ssl);
1188*663afb9bSAndroid Build Coastguard Worker 	if (events & EV_WRITE)
1189*663afb9bSAndroid Build Coastguard Worker 		stop_writing(bev_ssl);
1190*663afb9bSAndroid Build Coastguard Worker 
1191*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl->underlying) {
1192*663afb9bSAndroid Build Coastguard Worker 		if (events & EV_READ)
1193*663afb9bSAndroid Build Coastguard Worker 			BEV_DEL_GENERIC_READ_TIMEOUT(bev);
1194*663afb9bSAndroid Build Coastguard Worker 		if (events & EV_WRITE)
1195*663afb9bSAndroid Build Coastguard Worker 			BEV_DEL_GENERIC_WRITE_TIMEOUT(bev);
1196*663afb9bSAndroid Build Coastguard Worker 	}
1197*663afb9bSAndroid Build Coastguard Worker 	return 0;
1198*663afb9bSAndroid Build Coastguard Worker }
1199*663afb9bSAndroid Build Coastguard Worker 
1200*663afb9bSAndroid Build Coastguard Worker static void
be_openssl_unlink(struct bufferevent * bev)1201*663afb9bSAndroid Build Coastguard Worker be_openssl_unlink(struct bufferevent *bev)
1202*663afb9bSAndroid Build Coastguard Worker {
1203*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl = upcast(bev);
1204*663afb9bSAndroid Build Coastguard Worker 
1205*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl->bev.options & BEV_OPT_CLOSE_ON_FREE) {
1206*663afb9bSAndroid Build Coastguard Worker 		if (bev_ssl->underlying) {
1207*663afb9bSAndroid Build Coastguard Worker 			if (BEV_UPCAST(bev_ssl->underlying)->refcnt < 2) {
1208*663afb9bSAndroid Build Coastguard Worker 				event_warnx("BEV_OPT_CLOSE_ON_FREE set on an "
1209*663afb9bSAndroid Build Coastguard Worker 				    "bufferevent with too few references");
1210*663afb9bSAndroid Build Coastguard Worker 			} else {
1211*663afb9bSAndroid Build Coastguard Worker 				bufferevent_free(bev_ssl->underlying);
1212*663afb9bSAndroid Build Coastguard Worker 				/* We still have a reference to it, via our
1213*663afb9bSAndroid Build Coastguard Worker 				 * BIO. So we don't drop this. */
1214*663afb9bSAndroid Build Coastguard Worker 				// bev_ssl->underlying = NULL;
1215*663afb9bSAndroid Build Coastguard Worker 			}
1216*663afb9bSAndroid Build Coastguard Worker 		}
1217*663afb9bSAndroid Build Coastguard Worker 	} else {
1218*663afb9bSAndroid Build Coastguard Worker 		if (bev_ssl->underlying) {
1219*663afb9bSAndroid Build Coastguard Worker 			if (bev_ssl->underlying->errorcb == be_openssl_eventcb)
1220*663afb9bSAndroid Build Coastguard Worker 				bufferevent_setcb(bev_ssl->underlying,
1221*663afb9bSAndroid Build Coastguard Worker 				    NULL,NULL,NULL,NULL);
1222*663afb9bSAndroid Build Coastguard Worker 			bufferevent_unsuspend_read_(bev_ssl->underlying,
1223*663afb9bSAndroid Build Coastguard Worker 			    BEV_SUSPEND_FILT_READ);
1224*663afb9bSAndroid Build Coastguard Worker 		}
1225*663afb9bSAndroid Build Coastguard Worker 	}
1226*663afb9bSAndroid Build Coastguard Worker }
1227*663afb9bSAndroid Build Coastguard Worker 
1228*663afb9bSAndroid Build Coastguard Worker static void
be_openssl_destruct(struct bufferevent * bev)1229*663afb9bSAndroid Build Coastguard Worker be_openssl_destruct(struct bufferevent *bev)
1230*663afb9bSAndroid Build Coastguard Worker {
1231*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl = upcast(bev);
1232*663afb9bSAndroid Build Coastguard Worker 
1233*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl->bev.options & BEV_OPT_CLOSE_ON_FREE) {
1234*663afb9bSAndroid Build Coastguard Worker 		if (! bev_ssl->underlying) {
1235*663afb9bSAndroid Build Coastguard Worker 			evutil_socket_t fd = EVUTIL_INVALID_SOCKET;
1236*663afb9bSAndroid Build Coastguard Worker 			BIO *bio = SSL_get_wbio(bev_ssl->ssl);
1237*663afb9bSAndroid Build Coastguard Worker 			if (bio)
1238*663afb9bSAndroid Build Coastguard Worker 				fd = BIO_get_fd(bio, NULL);
1239*663afb9bSAndroid Build Coastguard Worker 			if (fd >= 0)
1240*663afb9bSAndroid Build Coastguard Worker 				evutil_closesocket(fd);
1241*663afb9bSAndroid Build Coastguard Worker 		}
1242*663afb9bSAndroid Build Coastguard Worker 		SSL_free(bev_ssl->ssl);
1243*663afb9bSAndroid Build Coastguard Worker 	}
1244*663afb9bSAndroid Build Coastguard Worker }
1245*663afb9bSAndroid Build Coastguard Worker 
1246*663afb9bSAndroid Build Coastguard Worker static int
be_openssl_adj_timeouts(struct bufferevent * bev)1247*663afb9bSAndroid Build Coastguard Worker be_openssl_adj_timeouts(struct bufferevent *bev)
1248*663afb9bSAndroid Build Coastguard Worker {
1249*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl = upcast(bev);
1250*663afb9bSAndroid Build Coastguard Worker 
1251*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl->underlying) {
1252*663afb9bSAndroid Build Coastguard Worker 		return bufferevent_generic_adj_timeouts_(bev);
1253*663afb9bSAndroid Build Coastguard Worker 	} else {
1254*663afb9bSAndroid Build Coastguard Worker 		return bufferevent_generic_adj_existing_timeouts_(bev);
1255*663afb9bSAndroid Build Coastguard Worker 	}
1256*663afb9bSAndroid Build Coastguard Worker }
1257*663afb9bSAndroid Build Coastguard Worker 
1258*663afb9bSAndroid Build Coastguard Worker static int
be_openssl_flush(struct bufferevent * bufev,short iotype,enum bufferevent_flush_mode mode)1259*663afb9bSAndroid Build Coastguard Worker be_openssl_flush(struct bufferevent *bufev,
1260*663afb9bSAndroid Build Coastguard Worker     short iotype, enum bufferevent_flush_mode mode)
1261*663afb9bSAndroid Build Coastguard Worker {
1262*663afb9bSAndroid Build Coastguard Worker 	/* XXXX Implement this. */
1263*663afb9bSAndroid Build Coastguard Worker 	return 0;
1264*663afb9bSAndroid Build Coastguard Worker }
1265*663afb9bSAndroid Build Coastguard Worker 
1266*663afb9bSAndroid Build Coastguard Worker static int
be_openssl_set_fd(struct bufferevent_openssl * bev_ssl,enum bufferevent_ssl_state state,evutil_socket_t fd)1267*663afb9bSAndroid Build Coastguard Worker be_openssl_set_fd(struct bufferevent_openssl *bev_ssl,
1268*663afb9bSAndroid Build Coastguard Worker     enum bufferevent_ssl_state state, evutil_socket_t fd)
1269*663afb9bSAndroid Build Coastguard Worker {
1270*663afb9bSAndroid Build Coastguard Worker 	bev_ssl->state = state;
1271*663afb9bSAndroid Build Coastguard Worker 
1272*663afb9bSAndroid Build Coastguard Worker 	switch (state) {
1273*663afb9bSAndroid Build Coastguard Worker 	case BUFFEREVENT_SSL_ACCEPTING:
1274*663afb9bSAndroid Build Coastguard Worker 		if (!SSL_clear(bev_ssl->ssl))
1275*663afb9bSAndroid Build Coastguard Worker 			return -1;
1276*663afb9bSAndroid Build Coastguard Worker 		SSL_set_accept_state(bev_ssl->ssl);
1277*663afb9bSAndroid Build Coastguard Worker 		if (set_handshake_callbacks(bev_ssl, fd) < 0)
1278*663afb9bSAndroid Build Coastguard Worker 			return -1;
1279*663afb9bSAndroid Build Coastguard Worker 		break;
1280*663afb9bSAndroid Build Coastguard Worker 	case BUFFEREVENT_SSL_CONNECTING:
1281*663afb9bSAndroid Build Coastguard Worker 		if (!SSL_clear(bev_ssl->ssl))
1282*663afb9bSAndroid Build Coastguard Worker 			return -1;
1283*663afb9bSAndroid Build Coastguard Worker 		SSL_set_connect_state(bev_ssl->ssl);
1284*663afb9bSAndroid Build Coastguard Worker 		if (set_handshake_callbacks(bev_ssl, fd) < 0)
1285*663afb9bSAndroid Build Coastguard Worker 			return -1;
1286*663afb9bSAndroid Build Coastguard Worker 		break;
1287*663afb9bSAndroid Build Coastguard Worker 	case BUFFEREVENT_SSL_OPEN:
1288*663afb9bSAndroid Build Coastguard Worker 		if (set_open_callbacks(bev_ssl, fd) < 0)
1289*663afb9bSAndroid Build Coastguard Worker 			return -1;
1290*663afb9bSAndroid Build Coastguard Worker 		break;
1291*663afb9bSAndroid Build Coastguard Worker 	default:
1292*663afb9bSAndroid Build Coastguard Worker 		return -1;
1293*663afb9bSAndroid Build Coastguard Worker 	}
1294*663afb9bSAndroid Build Coastguard Worker 
1295*663afb9bSAndroid Build Coastguard Worker 	return 0;
1296*663afb9bSAndroid Build Coastguard Worker }
1297*663afb9bSAndroid Build Coastguard Worker 
1298*663afb9bSAndroid Build Coastguard Worker static int
be_openssl_ctrl(struct bufferevent * bev,enum bufferevent_ctrl_op op,union bufferevent_ctrl_data * data)1299*663afb9bSAndroid Build Coastguard Worker be_openssl_ctrl(struct bufferevent *bev,
1300*663afb9bSAndroid Build Coastguard Worker     enum bufferevent_ctrl_op op, union bufferevent_ctrl_data *data)
1301*663afb9bSAndroid Build Coastguard Worker {
1302*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl = upcast(bev);
1303*663afb9bSAndroid Build Coastguard Worker 	switch (op) {
1304*663afb9bSAndroid Build Coastguard Worker 	case BEV_CTRL_SET_FD:
1305*663afb9bSAndroid Build Coastguard Worker 		if (!bev_ssl->underlying) {
1306*663afb9bSAndroid Build Coastguard Worker 			BIO *bio;
1307*663afb9bSAndroid Build Coastguard Worker 			bio = BIO_new_socket((int)data->fd, 0);
1308*663afb9bSAndroid Build Coastguard Worker 			SSL_set_bio(bev_ssl->ssl, bio, bio);
1309*663afb9bSAndroid Build Coastguard Worker 		} else {
1310*663afb9bSAndroid Build Coastguard Worker 			BIO *bio;
1311*663afb9bSAndroid Build Coastguard Worker 			if (!(bio = BIO_new_bufferevent(bev_ssl->underlying)))
1312*663afb9bSAndroid Build Coastguard Worker 				return -1;
1313*663afb9bSAndroid Build Coastguard Worker 			SSL_set_bio(bev_ssl->ssl, bio, bio);
1314*663afb9bSAndroid Build Coastguard Worker 		}
1315*663afb9bSAndroid Build Coastguard Worker 
1316*663afb9bSAndroid Build Coastguard Worker 		return be_openssl_set_fd(bev_ssl, bev_ssl->old_state, data->fd);
1317*663afb9bSAndroid Build Coastguard Worker 	case BEV_CTRL_GET_FD:
1318*663afb9bSAndroid Build Coastguard Worker 		if (bev_ssl->underlying) {
1319*663afb9bSAndroid Build Coastguard Worker 			data->fd = event_get_fd(&bev_ssl->underlying->ev_read);
1320*663afb9bSAndroid Build Coastguard Worker 		} else {
1321*663afb9bSAndroid Build Coastguard Worker 			data->fd = event_get_fd(&bev->ev_read);
1322*663afb9bSAndroid Build Coastguard Worker 		}
1323*663afb9bSAndroid Build Coastguard Worker 		return 0;
1324*663afb9bSAndroid Build Coastguard Worker 	case BEV_CTRL_GET_UNDERLYING:
1325*663afb9bSAndroid Build Coastguard Worker 		data->ptr = bev_ssl->underlying;
1326*663afb9bSAndroid Build Coastguard Worker 		return 0;
1327*663afb9bSAndroid Build Coastguard Worker 	case BEV_CTRL_CANCEL_ALL:
1328*663afb9bSAndroid Build Coastguard Worker 	default:
1329*663afb9bSAndroid Build Coastguard Worker 		return -1;
1330*663afb9bSAndroid Build Coastguard Worker 	}
1331*663afb9bSAndroid Build Coastguard Worker }
1332*663afb9bSAndroid Build Coastguard Worker 
1333*663afb9bSAndroid Build Coastguard Worker SSL *
bufferevent_openssl_get_ssl(struct bufferevent * bufev)1334*663afb9bSAndroid Build Coastguard Worker bufferevent_openssl_get_ssl(struct bufferevent *bufev)
1335*663afb9bSAndroid Build Coastguard Worker {
1336*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl = upcast(bufev);
1337*663afb9bSAndroid Build Coastguard Worker 	if (!bev_ssl)
1338*663afb9bSAndroid Build Coastguard Worker 		return NULL;
1339*663afb9bSAndroid Build Coastguard Worker 	return bev_ssl->ssl;
1340*663afb9bSAndroid Build Coastguard Worker }
1341*663afb9bSAndroid Build Coastguard Worker 
1342*663afb9bSAndroid Build Coastguard Worker static struct bufferevent *
bufferevent_openssl_new_impl(struct event_base * base,struct bufferevent * underlying,evutil_socket_t fd,SSL * ssl,enum bufferevent_ssl_state state,int options)1343*663afb9bSAndroid Build Coastguard Worker bufferevent_openssl_new_impl(struct event_base *base,
1344*663afb9bSAndroid Build Coastguard Worker     struct bufferevent *underlying,
1345*663afb9bSAndroid Build Coastguard Worker     evutil_socket_t fd,
1346*663afb9bSAndroid Build Coastguard Worker     SSL *ssl,
1347*663afb9bSAndroid Build Coastguard Worker     enum bufferevent_ssl_state state,
1348*663afb9bSAndroid Build Coastguard Worker     int options)
1349*663afb9bSAndroid Build Coastguard Worker {
1350*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl = NULL;
1351*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_private *bev_p = NULL;
1352*663afb9bSAndroid Build Coastguard Worker 	int tmp_options = options & ~BEV_OPT_THREADSAFE;
1353*663afb9bSAndroid Build Coastguard Worker 
1354*663afb9bSAndroid Build Coastguard Worker 	/* Only one can be set. */
1355*663afb9bSAndroid Build Coastguard Worker 	if (underlying != NULL && fd >= 0)
1356*663afb9bSAndroid Build Coastguard Worker 		goto err;
1357*663afb9bSAndroid Build Coastguard Worker 
1358*663afb9bSAndroid Build Coastguard Worker 	if (!(bev_ssl = mm_calloc(1, sizeof(struct bufferevent_openssl))))
1359*663afb9bSAndroid Build Coastguard Worker 		goto err;
1360*663afb9bSAndroid Build Coastguard Worker 
1361*663afb9bSAndroid Build Coastguard Worker 	bev_p = &bev_ssl->bev;
1362*663afb9bSAndroid Build Coastguard Worker 
1363*663afb9bSAndroid Build Coastguard Worker 	if (bufferevent_init_common_(bev_p, base,
1364*663afb9bSAndroid Build Coastguard Worker 		&bufferevent_ops_openssl, tmp_options) < 0)
1365*663afb9bSAndroid Build Coastguard Worker 		goto err;
1366*663afb9bSAndroid Build Coastguard Worker 
1367*663afb9bSAndroid Build Coastguard Worker 	/* Don't explode if we decide to realloc a chunk we're writing from in
1368*663afb9bSAndroid Build Coastguard Worker 	 * the output buffer. */
1369*663afb9bSAndroid Build Coastguard Worker 	SSL_set_mode(ssl, SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER);
1370*663afb9bSAndroid Build Coastguard Worker 
1371*663afb9bSAndroid Build Coastguard Worker 	bev_ssl->underlying = underlying;
1372*663afb9bSAndroid Build Coastguard Worker 	bev_ssl->ssl = ssl;
1373*663afb9bSAndroid Build Coastguard Worker 
1374*663afb9bSAndroid Build Coastguard Worker 	bev_ssl->outbuf_cb = evbuffer_add_cb(bev_p->bev.output,
1375*663afb9bSAndroid Build Coastguard Worker 	    be_openssl_outbuf_cb, bev_ssl);
1376*663afb9bSAndroid Build Coastguard Worker 
1377*663afb9bSAndroid Build Coastguard Worker 	if (options & BEV_OPT_THREADSAFE)
1378*663afb9bSAndroid Build Coastguard Worker 		bufferevent_enable_locking_(&bev_ssl->bev.bev, NULL);
1379*663afb9bSAndroid Build Coastguard Worker 
1380*663afb9bSAndroid Build Coastguard Worker 	if (underlying) {
1381*663afb9bSAndroid Build Coastguard Worker 		bufferevent_init_generic_timeout_cbs_(&bev_ssl->bev.bev);
1382*663afb9bSAndroid Build Coastguard Worker 		bufferevent_incref_(underlying);
1383*663afb9bSAndroid Build Coastguard Worker 	}
1384*663afb9bSAndroid Build Coastguard Worker 
1385*663afb9bSAndroid Build Coastguard Worker 	bev_ssl->old_state = state;
1386*663afb9bSAndroid Build Coastguard Worker 	bev_ssl->last_write = -1;
1387*663afb9bSAndroid Build Coastguard Worker 
1388*663afb9bSAndroid Build Coastguard Worker 	init_bio_counts(bev_ssl);
1389*663afb9bSAndroid Build Coastguard Worker 
1390*663afb9bSAndroid Build Coastguard Worker 	fd = be_openssl_auto_fd(bev_ssl, fd);
1391*663afb9bSAndroid Build Coastguard Worker 	if (be_openssl_set_fd(bev_ssl, state, fd))
1392*663afb9bSAndroid Build Coastguard Worker 		goto err;
1393*663afb9bSAndroid Build Coastguard Worker 
1394*663afb9bSAndroid Build Coastguard Worker 	if (underlying) {
1395*663afb9bSAndroid Build Coastguard Worker 		bufferevent_setwatermark(underlying, EV_READ, 0, 0);
1396*663afb9bSAndroid Build Coastguard Worker 		bufferevent_enable(underlying, EV_READ|EV_WRITE);
1397*663afb9bSAndroid Build Coastguard Worker 		if (state == BUFFEREVENT_SSL_OPEN)
1398*663afb9bSAndroid Build Coastguard Worker 			bufferevent_suspend_read_(underlying,
1399*663afb9bSAndroid Build Coastguard Worker 			    BEV_SUSPEND_FILT_READ);
1400*663afb9bSAndroid Build Coastguard Worker 	}
1401*663afb9bSAndroid Build Coastguard Worker 
1402*663afb9bSAndroid Build Coastguard Worker 	return &bev_ssl->bev.bev;
1403*663afb9bSAndroid Build Coastguard Worker err:
1404*663afb9bSAndroid Build Coastguard Worker 	if (options & BEV_OPT_CLOSE_ON_FREE)
1405*663afb9bSAndroid Build Coastguard Worker 		SSL_free(ssl);
1406*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl) {
1407*663afb9bSAndroid Build Coastguard Worker 		bev_ssl->ssl = NULL;
1408*663afb9bSAndroid Build Coastguard Worker 		bufferevent_free(&bev_ssl->bev.bev);
1409*663afb9bSAndroid Build Coastguard Worker 	}
1410*663afb9bSAndroid Build Coastguard Worker 	return NULL;
1411*663afb9bSAndroid Build Coastguard Worker }
1412*663afb9bSAndroid Build Coastguard Worker 
1413*663afb9bSAndroid Build Coastguard Worker struct bufferevent *
bufferevent_openssl_filter_new(struct event_base * base,struct bufferevent * underlying,SSL * ssl,enum bufferevent_ssl_state state,int options)1414*663afb9bSAndroid Build Coastguard Worker bufferevent_openssl_filter_new(struct event_base *base,
1415*663afb9bSAndroid Build Coastguard Worker     struct bufferevent *underlying,
1416*663afb9bSAndroid Build Coastguard Worker     SSL *ssl,
1417*663afb9bSAndroid Build Coastguard Worker     enum bufferevent_ssl_state state,
1418*663afb9bSAndroid Build Coastguard Worker     int options)
1419*663afb9bSAndroid Build Coastguard Worker {
1420*663afb9bSAndroid Build Coastguard Worker 	BIO *bio;
1421*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent *bev;
1422*663afb9bSAndroid Build Coastguard Worker 
1423*663afb9bSAndroid Build Coastguard Worker 	if (!underlying)
1424*663afb9bSAndroid Build Coastguard Worker 		goto err;
1425*663afb9bSAndroid Build Coastguard Worker 	if (!(bio = BIO_new_bufferevent(underlying)))
1426*663afb9bSAndroid Build Coastguard Worker 		goto err;
1427*663afb9bSAndroid Build Coastguard Worker 
1428*663afb9bSAndroid Build Coastguard Worker 	SSL_set_bio(ssl, bio, bio);
1429*663afb9bSAndroid Build Coastguard Worker 
1430*663afb9bSAndroid Build Coastguard Worker 	bev = bufferevent_openssl_new_impl(
1431*663afb9bSAndroid Build Coastguard Worker 		base, underlying, -1, ssl, state, options);
1432*663afb9bSAndroid Build Coastguard Worker 	return bev;
1433*663afb9bSAndroid Build Coastguard Worker 
1434*663afb9bSAndroid Build Coastguard Worker err:
1435*663afb9bSAndroid Build Coastguard Worker 	if (options & BEV_OPT_CLOSE_ON_FREE)
1436*663afb9bSAndroid Build Coastguard Worker 		SSL_free(ssl);
1437*663afb9bSAndroid Build Coastguard Worker 	return NULL;
1438*663afb9bSAndroid Build Coastguard Worker }
1439*663afb9bSAndroid Build Coastguard Worker 
1440*663afb9bSAndroid Build Coastguard Worker struct bufferevent *
bufferevent_openssl_socket_new(struct event_base * base,evutil_socket_t fd,SSL * ssl,enum bufferevent_ssl_state state,int options)1441*663afb9bSAndroid Build Coastguard Worker bufferevent_openssl_socket_new(struct event_base *base,
1442*663afb9bSAndroid Build Coastguard Worker     evutil_socket_t fd,
1443*663afb9bSAndroid Build Coastguard Worker     SSL *ssl,
1444*663afb9bSAndroid Build Coastguard Worker     enum bufferevent_ssl_state state,
1445*663afb9bSAndroid Build Coastguard Worker     int options)
1446*663afb9bSAndroid Build Coastguard Worker {
1447*663afb9bSAndroid Build Coastguard Worker 	/* Does the SSL already have an fd? */
1448*663afb9bSAndroid Build Coastguard Worker 	BIO *bio = SSL_get_wbio(ssl);
1449*663afb9bSAndroid Build Coastguard Worker 	long have_fd = -1;
1450*663afb9bSAndroid Build Coastguard Worker 
1451*663afb9bSAndroid Build Coastguard Worker 	if (bio)
1452*663afb9bSAndroid Build Coastguard Worker 		have_fd = BIO_get_fd(bio, NULL);
1453*663afb9bSAndroid Build Coastguard Worker 
1454*663afb9bSAndroid Build Coastguard Worker 	if (have_fd >= 0) {
1455*663afb9bSAndroid Build Coastguard Worker 		/* The SSL is already configured with an fd. */
1456*663afb9bSAndroid Build Coastguard Worker 		if (fd < 0) {
1457*663afb9bSAndroid Build Coastguard Worker 			/* We should learn the fd from the SSL. */
1458*663afb9bSAndroid Build Coastguard Worker 			fd = (evutil_socket_t) have_fd;
1459*663afb9bSAndroid Build Coastguard Worker 		} else if (have_fd == (long)fd) {
1460*663afb9bSAndroid Build Coastguard Worker 			/* We already know the fd from the SSL; do nothing */
1461*663afb9bSAndroid Build Coastguard Worker 		} else {
1462*663afb9bSAndroid Build Coastguard Worker 			/* We specified an fd different from that of the SSL.
1463*663afb9bSAndroid Build Coastguard Worker 			   This is probably an error on our part.  Fail. */
1464*663afb9bSAndroid Build Coastguard Worker 			goto err;
1465*663afb9bSAndroid Build Coastguard Worker 		}
1466*663afb9bSAndroid Build Coastguard Worker 		BIO_set_close(bio, 0);
1467*663afb9bSAndroid Build Coastguard Worker 	} else {
1468*663afb9bSAndroid Build Coastguard Worker 		/* The SSL isn't configured with a BIO with an fd. */
1469*663afb9bSAndroid Build Coastguard Worker 		if (fd >= 0) {
1470*663afb9bSAndroid Build Coastguard Worker 			/* ... and we have an fd we want to use. */
1471*663afb9bSAndroid Build Coastguard Worker 			bio = BIO_new_socket((int)fd, 0);
1472*663afb9bSAndroid Build Coastguard Worker 			SSL_set_bio(ssl, bio, bio);
1473*663afb9bSAndroid Build Coastguard Worker 		} else {
1474*663afb9bSAndroid Build Coastguard Worker 			/* Leave the fd unset. */
1475*663afb9bSAndroid Build Coastguard Worker 		}
1476*663afb9bSAndroid Build Coastguard Worker 	}
1477*663afb9bSAndroid Build Coastguard Worker 
1478*663afb9bSAndroid Build Coastguard Worker 	return bufferevent_openssl_new_impl(
1479*663afb9bSAndroid Build Coastguard Worker 		base, NULL, fd, ssl, state, options);
1480*663afb9bSAndroid Build Coastguard Worker 
1481*663afb9bSAndroid Build Coastguard Worker err:
1482*663afb9bSAndroid Build Coastguard Worker 	if (options & BEV_OPT_CLOSE_ON_FREE)
1483*663afb9bSAndroid Build Coastguard Worker 		SSL_free(ssl);
1484*663afb9bSAndroid Build Coastguard Worker 	return NULL;
1485*663afb9bSAndroid Build Coastguard Worker }
1486*663afb9bSAndroid Build Coastguard Worker 
1487*663afb9bSAndroid Build Coastguard Worker int
bufferevent_openssl_get_allow_dirty_shutdown(struct bufferevent * bev)1488*663afb9bSAndroid Build Coastguard Worker bufferevent_openssl_get_allow_dirty_shutdown(struct bufferevent *bev)
1489*663afb9bSAndroid Build Coastguard Worker {
1490*663afb9bSAndroid Build Coastguard Worker 	int allow_dirty_shutdown = -1;
1491*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl;
1492*663afb9bSAndroid Build Coastguard Worker 	BEV_LOCK(bev);
1493*663afb9bSAndroid Build Coastguard Worker 	bev_ssl = upcast(bev);
1494*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl)
1495*663afb9bSAndroid Build Coastguard Worker 		allow_dirty_shutdown = bev_ssl->allow_dirty_shutdown;
1496*663afb9bSAndroid Build Coastguard Worker 	BEV_UNLOCK(bev);
1497*663afb9bSAndroid Build Coastguard Worker 	return allow_dirty_shutdown;
1498*663afb9bSAndroid Build Coastguard Worker }
1499*663afb9bSAndroid Build Coastguard Worker 
1500*663afb9bSAndroid Build Coastguard Worker void
bufferevent_openssl_set_allow_dirty_shutdown(struct bufferevent * bev,int allow_dirty_shutdown)1501*663afb9bSAndroid Build Coastguard Worker bufferevent_openssl_set_allow_dirty_shutdown(struct bufferevent *bev,
1502*663afb9bSAndroid Build Coastguard Worker     int allow_dirty_shutdown)
1503*663afb9bSAndroid Build Coastguard Worker {
1504*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl;
1505*663afb9bSAndroid Build Coastguard Worker 	BEV_LOCK(bev);
1506*663afb9bSAndroid Build Coastguard Worker 	bev_ssl = upcast(bev);
1507*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl)
1508*663afb9bSAndroid Build Coastguard Worker 		bev_ssl->allow_dirty_shutdown = !!allow_dirty_shutdown;
1509*663afb9bSAndroid Build Coastguard Worker 	BEV_UNLOCK(bev);
1510*663afb9bSAndroid Build Coastguard Worker }
1511*663afb9bSAndroid Build Coastguard Worker 
1512*663afb9bSAndroid Build Coastguard Worker unsigned long
bufferevent_get_openssl_error(struct bufferevent * bev)1513*663afb9bSAndroid Build Coastguard Worker bufferevent_get_openssl_error(struct bufferevent *bev)
1514*663afb9bSAndroid Build Coastguard Worker {
1515*663afb9bSAndroid Build Coastguard Worker 	unsigned long err = 0;
1516*663afb9bSAndroid Build Coastguard Worker 	struct bufferevent_openssl *bev_ssl;
1517*663afb9bSAndroid Build Coastguard Worker 	BEV_LOCK(bev);
1518*663afb9bSAndroid Build Coastguard Worker 	bev_ssl = upcast(bev);
1519*663afb9bSAndroid Build Coastguard Worker 	if (bev_ssl && bev_ssl->n_errors) {
1520*663afb9bSAndroid Build Coastguard Worker 		err = bev_ssl->errors[--bev_ssl->n_errors];
1521*663afb9bSAndroid Build Coastguard Worker 	}
1522*663afb9bSAndroid Build Coastguard Worker 	BEV_UNLOCK(bev);
1523*663afb9bSAndroid Build Coastguard Worker 	return err;
1524*663afb9bSAndroid Build Coastguard Worker }
1525