mirror of
				https://github.com/vlang/v.git
				synced 2023-08-10 21:13:21 +03:00 
			
		
		
		
	
		
			
				
	
	
		
			246 lines
		
	
	
		
			5.9 KiB
		
	
	
	
		
			V
		
	
	
	
	
	
			
		
		
	
	
			246 lines
		
	
	
		
			5.9 KiB
		
	
	
	
		
			V
		
	
	
	
	
	
| module openssl
 | |
| 
 | |
| import net.openssl
 | |
| import x.net
 | |
| import time
 | |
| 
 | |
| // const (
 | |
| // is_used = openssl.is_used
 | |
| // )
 | |
| pub struct SSLConn {
 | |
| mut:
 | |
| 	sslctx   &C.SSL_CTX
 | |
| 	ssl      &C.SSL
 | |
| 	handle   int
 | |
| 	duration time.Duration
 | |
| }
 | |
| 
 | |
| enum Select {
 | |
| 	read
 | |
| 	write
 | |
| 	except
 | |
| }
 | |
| 
 | |
| pub fn new_ssl_conn() &SSLConn {
 | |
| 	return &SSLConn{
 | |
| 		sslctx: 0
 | |
| 		ssl: 0
 | |
| 		handle: 0
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // shutdown closes the ssl connection and do clean up
 | |
| pub fn (mut s SSLConn) shutdown() ? {
 | |
| 	if s.ssl != 0 {
 | |
| 		mut res := 0
 | |
| 		for {
 | |
| 			res = int(C.SSL_shutdown(s.ssl))
 | |
| 			if res < 0 {
 | |
| 				err_res := openssl.ssl_error(res, s.ssl) or {
 | |
| 					break // We break to free rest of resources
 | |
| 				}
 | |
| 				if err_res == .ssl_error_want_read {
 | |
| 					for {
 | |
| 						ready := @select(s.handle, .read, s.duration)?
 | |
| 						if ready {
 | |
| 							break
 | |
| 						}
 | |
| 					}
 | |
| 					continue
 | |
| 				} else if err_res == .ssl_error_want_write {
 | |
| 					for {
 | |
| 						ready := @select(s.handle, .write, s.duration)?
 | |
| 						if ready {
 | |
| 							break
 | |
| 						}
 | |
| 					}
 | |
| 					continue
 | |
| 				} else {
 | |
| 					println('error: $err_res')
 | |
| 					return error('unexepedted ssl error $err_res')
 | |
| 				}
 | |
| 				C.SSL_free(s.ssl)
 | |
| 				if s.sslctx != 0 {
 | |
| 					C.SSL_CTX_free(s.sslctx)
 | |
| 				}
 | |
| 				return error('Could not connect using SSL. ($err_res),err')
 | |
| 			} else if res == 0 {
 | |
| 				continue
 | |
| 			} else if res == 1 {
 | |
| 				break
 | |
| 			}
 | |
| 		}
 | |
| 		C.SSL_free(s.ssl)
 | |
| 	}
 | |
| 	if s.sslctx != 0 {
 | |
| 		C.SSL_CTX_free(s.sslctx)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // connect to server using open ssl
 | |
| pub fn (mut s SSLConn) connect(mut tcp_conn net.TcpConn) ? {
 | |
| 	s.handle = tcp_conn.sock.handle
 | |
| 	s.duration = tcp_conn.read_timeout()
 | |
| 	// C.SSL_load_error_strings()
 | |
| 	s.sslctx = C.SSL_CTX_new(C.SSLv23_client_method())
 | |
| 	if s.sslctx == 0 {
 | |
| 		return error("Couldn't get ssl context")
 | |
| 	}
 | |
| 	s.ssl = C.SSL_new(s.sslctx)
 | |
| 	if s.ssl == 0 {
 | |
| 		return error("Couldn't create OpenSSL instance.")
 | |
| 	}
 | |
| 	if C.SSL_set_fd(s.ssl, tcp_conn.sock.handle) != 1 {
 | |
| 		return error("Couldn't assign ssl to socket.")
 | |
| 	}
 | |
| 	for {
 | |
| 		res := C.SSL_connect(s.ssl)
 | |
| 		if res != 1 {
 | |
| 			err_res := openssl.ssl_error(res, s.ssl)?
 | |
| 			if err_res == .ssl_error_want_read {
 | |
| 				for {
 | |
| 					ready := @select(s.handle, .read, s.duration)?
 | |
| 					if ready {
 | |
| 						break
 | |
| 					}
 | |
| 				}
 | |
| 				continue
 | |
| 			} else if err_res == .ssl_error_want_write {
 | |
| 				for {
 | |
| 					ready := @select(s.handle, .write, s.duration)?
 | |
| 					if ready {
 | |
| 						break
 | |
| 					}
 | |
| 				}
 | |
| 				continue
 | |
| 			}
 | |
| 			return error('Could not connect using SSL. ($err_res),err')
 | |
| 		}
 | |
| 		println('CONNECT OK')
 | |
| 		break
 | |
| 	}
 | |
| }
 | |
| 
 | |
| pub fn (mut s SSLConn) socket_read_into_ptr(buf_ptr byteptr, len int) ?int {
 | |
| 	mut res := 0
 | |
| 	for {
 | |
| 		res = C.SSL_read(s.ssl, buf_ptr, len)
 | |
| 		if res < 0 {
 | |
| 			err_res := openssl.ssl_error(res, s.ssl)?
 | |
| 			if err_res == .ssl_error_want_read {
 | |
| 				for {
 | |
| 					ready := @select(s.handle, .read, s.duration)?
 | |
| 					if ready {
 | |
| 						break
 | |
| 					}
 | |
| 				}
 | |
| 				continue
 | |
| 			} else if err_res == .ssl_error_want_write {
 | |
| 				for {
 | |
| 					ready := @select(s.handle, .write, s.duration)?
 | |
| 					if ready {
 | |
| 						break
 | |
| 					}
 | |
| 				}
 | |
| 				continue
 | |
| 			} else if err_res == .ssl_error_zero_return {
 | |
| 				return 0
 | |
| 			}
 | |
| 			return error('Could not read using SSL. ($err_res),err')
 | |
| 		}
 | |
| 		break
 | |
| 	}
 | |
| 	return res
 | |
| }
 | |
| 
 | |
| pub fn (mut s SSLConn) read_into(mut buffer []Byte) ?int {
 | |
| 	res := s.socket_read_into_ptr(byteptr(buffer.data), buffer.len)?
 | |
| 	return res
 | |
| }
 | |
| 
 | |
| // write number of bytes to SSL connection
 | |
| pub fn (mut s SSLConn) write(bytes []Byte) ? {
 | |
| 	unsafe {
 | |
| 		mut ptr_base := byteptr(bytes.data)
 | |
| 		mut total_sent := 0
 | |
| 		for total_sent < bytes.len {
 | |
| 			ptr := ptr_base + total_sent
 | |
| 			remaining := bytes.len - total_sent
 | |
| 			mut sent := C.SSL_write(s.ssl, ptr, remaining)
 | |
| 			if sent <= 0 {
 | |
| 				err_res := openssl.ssl_error(sent, s.ssl)?
 | |
| 				if err_res == .ssl_error_want_read {
 | |
| 					for {
 | |
| 						ready := @select(s.handle, .read, s.duration)?
 | |
| 						if ready {
 | |
| 							break
 | |
| 						}
 | |
| 					}
 | |
| 				} else if err_res == .ssl_error_want_write {
 | |
| 					for {
 | |
| 						ready := @select(s.handle, .write, s.duration)?
 | |
| 						if ready {
 | |
| 							break
 | |
| 						}
 | |
| 					}
 | |
| 					continue
 | |
| 				} else if err_res == .ssl_error_zero_return {
 | |
| 					return error('ssl write on closed connection') // Todo error_with_code close
 | |
| 				}
 | |
| 				return error_with_code('Could not write SSL. ($err_res),err', err_res)
 | |
| 			}
 | |
| 			total_sent += sent
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // // ssl_error returns non error ssl code or error if unrecoverable and we should panic
 | |
| // fn (mut s SSLConn) ssl_error(ret int) ?SSLError {
 | |
| // res := C.SSL_get_error(s.ssl, ret)
 | |
| // match SSLError(res) {
 | |
| // .ssl_error_syscall { return error_with_code('unrecoverable syscall ($res)', res) }
 | |
| // .ssl_error_ssl { return error_with_code('unrecoverable ssl protocol error ($res)',
 | |
| // res) }
 | |
| // else { return res }
 | |
| // }
 | |
| // }
 | |
| // enum SSLError {
 | |
| // ssl_error_none = C.SSL_ERROR_NONE
 | |
| // ssl_error_ssl = C.SSL_ERROR_SSL
 | |
| // ssl_error_want_read = C.SSL_ERROR_WANT_READ
 | |
| // ssl_error_want_write = C.SSL_ERROR_WANT_WRITE
 | |
| // ssl_error_want_x509_lookup = C.SSL_ERROR_WANT_X509_LOOKUP
 | |
| // ssl_error_syscall = C.SSL_ERROR_SYSCALL
 | |
| // ssl_error_zero_return = C.SSL_ERROR_ZERO_RETURN
 | |
| // ssl_error_want_connect = C.SSL_ERROR_WANT_CONNECT
 | |
| // ssl_error_want_accept = C.SSL_ERROR_WANT_ACCEPT
 | |
| // ssl_error_want_async = C.SSL_ERROR_WANT_ASYNC
 | |
| // ssl_error_want_async_job = C.SSL_ERROR_WANT_ASYNC_JOB
 | |
| // ssl_error_want_client_hello_cb = C.SSL_ERROR_WANT_CLIENT_HELLO_CB
 | |
| // }
 | |
| /*
 | |
| This is basically a copy of Emily socket implementation of select.
 | |
| 	This have to be consolidated into common net lib features
 | |
| 	when merging this to V
 | |
| */
 | |
| [typedef]
 | |
| pub struct C.fd_set {
 | |
| }
 | |
| 
 | |
| // Select waits for an io operation (specified by parameter `test`) to be available
 | |
| fn @select(handle int, test Select, timeout time.Duration) ?bool {
 | |
| 	set := C.fd_set{}
 | |
| 	C.FD_ZERO(&set)
 | |
| 	C.FD_SET(handle, &set)
 | |
| 	timeval_timeout := C.timeval{
 | |
| 		tv_sec: u64(0)
 | |
| 		tv_usec: u64(timeout.microseconds())
 | |
| 	}
 | |
| 	match test {
 | |
| 		.read { net.socket_error(C.@select(handle, &set, C.NULL, C.NULL, &timeval_timeout))? }
 | |
| 		.write { net.socket_error(C.@select(handle, C.NULL, &set, C.NULL, &timeval_timeout))? }
 | |
| 		.except { net.socket_error(C.@select(handle, C.NULL, C.NULL, &set, &timeval_timeout))? }
 | |
| 	}
 | |
| 	return C.FD_ISSET(handle, &set)
 | |
| }
 | 
