diff --git a/examples/websocket_ssl_proxy/Makefile b/examples/websocket_ssl_proxy/Makefile index e0076a33fbcb0817ad70ae42d37657ceff1fb1c2..bd3f6be12976325c05180f6a534d75bcb7822995 100644 --- a/examples/websocket_ssl_proxy/Makefile +++ b/examples/websocket_ssl_proxy/Makefile @@ -3,14 +3,13 @@ PROG = ws_ssl CFLAGS = -W -Wall -I../.. -I. -pthread -g -O0 $(CFLAGS_EXTRA) -SOURCES = ws_ssl.c ../../mongoose.c net_skeleton.c ssl_wrapper.c +SOURCES = ws_ssl.c ../../mongoose.c ssl_wrapper.c all: $(PROG) $(PROG): $(SOURCES) $(CC) -o $(PROG) $(SOURCES) \ - -DNS_ENABLE_SSL -DNOEMBED_NET_SKELETON \ - -DSSL_WRAPPER_USE_AS_LIBRARY -lssl $(CFLAGS) + -DNS_ENABLE_SSL -DSSL_WRAPPER_USE_AS_LIBRARY -lssl $(CFLAGS) clean: rm -rf $(PROG) *.exe *.dSYM *.obj *.exp .*o *.lib diff --git a/examples/websocket_ssl_proxy/net_skeleton.c b/examples/websocket_ssl_proxy/net_skeleton.c deleted file mode 100644 index 5b9904e006cfdac3a77840c3853609cacc1b30a9..0000000000000000000000000000000000000000 --- a/examples/websocket_ssl_proxy/net_skeleton.c +++ /dev/null @@ -1,947 +0,0 @@ -// Copyright (c) 2014 Cesanta Software Limited -// All rights reserved -// -// This software is dual-licensed: you can redistribute it and/or modify -// it under the terms of the GNU General Public License version 2 as -// published by the Free Software Foundation. For the terms of this -// license, see <http://www.gnu.org/licenses/>. -// -// You are free to use this software under the terms of the GNU General -// Public License, but WITHOUT ANY WARRANTY; without even the implied -// warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. -// See the GNU General Public License for more details. -// -// Alternatively, you can license this software under a commercial -// license, as set out in <http://cesanta.com/>. -// -// $Date: 2014-09-28 05:04:41 UTC $ - -#include "net_skeleton.h" - -#ifndef NS_MALLOC -#define NS_MALLOC malloc -#endif - -#ifndef NS_REALLOC -#define NS_REALLOC realloc -#endif - -#ifndef NS_FREE -#define NS_FREE free -#endif - -#define NS_UDP_RECEIVE_BUFFER_SIZE 2000 -#define NS_VPRINTF_BUFFER_SIZE 500 - -struct ctl_msg { - ns_callback_t callback; - char message[1024 * 8]; -}; - -void iobuf_resize(struct iobuf *io, size_t new_size) { - char *p; - if ((new_size > io->size || (new_size < io->size && new_size >= io->len)) && - (p = (char *) NS_REALLOC(io->buf, new_size)) != NULL) { - io->size = new_size; - io->buf = p; - } -} - -void iobuf_init(struct iobuf *iobuf, size_t initial_size) { - iobuf->len = iobuf->size = 0; - iobuf->buf = NULL; - iobuf_resize(iobuf, initial_size); -} - -void iobuf_free(struct iobuf *iobuf) { - if (iobuf != NULL) { - if (iobuf->buf != NULL) NS_FREE(iobuf->buf); - iobuf_init(iobuf, 0); - } -} - -size_t iobuf_append(struct iobuf *io, const void *buf, size_t len) { - char *p = NULL; - - assert(io != NULL); - assert(io->len <= io->size); - - if (len <= 0) { - } else if (io->len + len <= io->size) { - memcpy(io->buf + io->len, buf, len); - io->len += len; - } else if ((p = (char *) NS_REALLOC(io->buf, io->len + len)) != NULL) { - io->buf = p; - memcpy(io->buf + io->len, buf, len); - io->len += len; - io->size = io->len; - } else { - len = 0; - } - - return len; -} - -void iobuf_remove(struct iobuf *io, size_t n) { - if (n > 0 && n <= io->len) { - memmove(io->buf, io->buf + n, io->len - n); - io->len -= n; - } -} - -static size_t ns_out(struct ns_connection *nc, const void *buf, size_t len) { - if (nc->flags & NSF_UDP) { - long n = sendto(nc->sock, buf, len, 0, &nc->sa.sa, sizeof(nc->sa.sin)); - DBG(("%p %d send %ld (%d %s)", nc, nc->sock, n, errno, strerror(errno))); - return n < 0 ? 0 : n; - } else { - return iobuf_append(&nc->send_iobuf, buf, len); - } -} - -#ifndef NS_DISABLE_THREADS -void *ns_start_thread(void *(*f)(void *), void *p) { -#ifdef _WIN32 - return (void *) _beginthread((void (__cdecl *)(void *)) f, 0, p); -#else - pthread_t thread_id = (pthread_t) 0; - pthread_attr_t attr; - - (void) pthread_attr_init(&attr); - (void) pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED); - -#if defined(NS_STACK_SIZE) && NS_STACK_SIZE > 1 - (void) pthread_attr_setstacksize(&attr, NS_STACK_SIZE); -#endif - - pthread_create(&thread_id, &attr, f, p); - pthread_attr_destroy(&attr); - - return (void *) thread_id; -#endif -} -#endif // NS_DISABLE_THREADS - -static void ns_add_conn(struct ns_mgr *mgr, struct ns_connection *c) { - c->next = mgr->active_connections; - mgr->active_connections = c; - c->prev = NULL; - if (c->next != NULL) c->next->prev = c; -} - -static void ns_remove_conn(struct ns_connection *conn) { - if (conn->prev == NULL) conn->mgr->active_connections = conn->next; - if (conn->prev) conn->prev->next = conn->next; - if (conn->next) conn->next->prev = conn->prev; -} - -// Print message to buffer. If buffer is large enough to hold the message, -// return buffer. If buffer is to small, allocate large enough buffer on heap, -// and return allocated buffer. -int ns_avprintf(char **buf, size_t size, const char *fmt, va_list ap) { - va_list ap_copy; - int len; - - va_copy(ap_copy, ap); - len = vsnprintf(*buf, size, fmt, ap_copy); - va_end(ap_copy); - - if (len < 0) { - // eCos and Windows are not standard-compliant and return -1 when - // the buffer is too small. Keep allocating larger buffers until we - // succeed or out of memory. - *buf = NULL; - while (len < 0) { - if (*buf) free(*buf); - size *= 2; - if ((*buf = (char *) NS_MALLOC(size)) == NULL) break; - va_copy(ap_copy, ap); - len = vsnprintf(*buf, size, fmt, ap_copy); - va_end(ap_copy); - } - } else if (len > (int) size) { - // Standard-compliant code path. Allocate a buffer that is large enough. - if ((*buf = (char *) NS_MALLOC(len + 1)) == NULL) { - len = -1; - } else { - va_copy(ap_copy, ap); - len = vsnprintf(*buf, len + 1, fmt, ap_copy); - va_end(ap_copy); - } - } - - return len; -} - -int ns_vprintf(struct ns_connection *nc, const char *fmt, va_list ap) { - char mem[NS_VPRINTF_BUFFER_SIZE], *buf = mem; - int len; - - if ((len = ns_avprintf(&buf, sizeof(mem), fmt, ap)) > 0) { - ns_out(nc, buf, len); - } - if (buf != mem && buf != NULL) { - free(buf); - } - - return len; -} - -int ns_printf(struct ns_connection *conn, const char *fmt, ...) { - int len; - va_list ap; - va_start(ap, fmt); - len = ns_vprintf(conn, fmt, ap); - va_end(ap); - return len; -} - -static void hexdump(struct ns_connection *nc, const char *path, - int num_bytes, int ev) { - const struct iobuf *io = ev == NS_SEND ? &nc->send_iobuf : &nc->recv_iobuf; - FILE *fp; - char *buf, src[60], dst[60]; - int buf_size = num_bytes * 5 + 100; - - if ((fp = fopen(path, "a")) != NULL) { - ns_sock_to_str(nc->sock, src, sizeof(src), 3); - ns_sock_to_str(nc->sock, dst, sizeof(dst), 7); - fprintf(fp, "%lu %p %s %s %s %d\n", (unsigned long) time(NULL), - nc->user_data, src, - ev == NS_RECV ? "<-" : ev == NS_SEND ? "->" : - ev == NS_ACCEPT ? "<A" : ev == NS_CONNECT ? "C>" : "XX", - dst, num_bytes); - if (num_bytes > 0 && (buf = (char *) NS_MALLOC(buf_size)) != NULL) { - ns_hexdump(io->buf + (ev == NS_SEND ? 0 : io->len) - - (ev == NS_SEND ? 0 : num_bytes), num_bytes, buf, buf_size); - fprintf(fp, "%s", buf); - free(buf); - } - fclose(fp); - } -} - -static void ns_call(struct ns_connection *nc, int ev, void *p) { - if (nc->mgr->hexdump_file != NULL && ev != NS_POLL) { - int len = (ev == NS_RECV || ev == NS_SEND) ? * (int *) p : 0; - hexdump(nc, nc->mgr->hexdump_file, len, ev); - } - - nc->callback(nc, ev, p); -} - -static void ns_destroy_conn(struct ns_connection *conn) { - closesocket(conn->sock); - iobuf_free(&conn->recv_iobuf); - iobuf_free(&conn->send_iobuf); -#ifdef NS_ENABLE_SSL - if (conn->ssl != NULL) { - SSL_free(conn->ssl); - } - if (conn->ssl_ctx != NULL) { - SSL_CTX_free(conn->ssl_ctx); - } -#endif - NS_FREE(conn); -} - -static void ns_close_conn(struct ns_connection *conn) { - DBG(("%p %d", conn, conn->flags)); - ns_call(conn, NS_CLOSE, NULL); - ns_remove_conn(conn); - ns_destroy_conn(conn); -} - -void ns_set_close_on_exec(sock_t sock) { -#ifdef _WIN32 - (void) SetHandleInformation((HANDLE) sock, HANDLE_FLAG_INHERIT, 0); -#else - fcntl(sock, F_SETFD, FD_CLOEXEC); -#endif -} - -static void ns_set_non_blocking_mode(sock_t sock) { -#ifdef _WIN32 - unsigned long on = 1; - ioctlsocket(sock, FIONBIO, &on); -#else - int flags = fcntl(sock, F_GETFL, 0); - fcntl(sock, F_SETFL, flags | O_NONBLOCK); -#endif -} - -#ifndef NS_DISABLE_SOCKETPAIR -int ns_socketpair2(sock_t sp[2], int sock_type) { - union socket_address sa; - sock_t sock; - socklen_t len = sizeof(sa.sin); - int ret = 0; - - sp[0] = sp[1] = INVALID_SOCKET; - - (void) memset(&sa, 0, sizeof(sa)); - sa.sin.sin_family = AF_INET; - sa.sin.sin_port = htons(0); - sa.sin.sin_addr.s_addr = htonl(0x7f000001); - - if ((sock = socket(AF_INET, sock_type, 0)) != INVALID_SOCKET && - !bind(sock, &sa.sa, len) && - (sock_type == SOCK_DGRAM || !listen(sock, 1)) && - !getsockname(sock, &sa.sa, &len) && - (sp[0] = socket(AF_INET, sock_type, 0)) != INVALID_SOCKET && - !connect(sp[0], &sa.sa, len) && - (sock_type == SOCK_STREAM || - (!getsockname(sp[0], &sa.sa, &len) && !connect(sock, &sa.sa, len))) && - (sp[1] = (sock_type == SOCK_DGRAM ? sock : - accept(sock, &sa.sa, &len))) != INVALID_SOCKET) { - ns_set_close_on_exec(sp[0]); - ns_set_close_on_exec(sp[1]); - ret = 1; - } else { - if (sp[0] != INVALID_SOCKET) closesocket(sp[0]); - if (sp[1] != INVALID_SOCKET) closesocket(sp[1]); - sp[0] = sp[1] = INVALID_SOCKET; - } - if (sock_type != SOCK_DGRAM) closesocket(sock); - - return ret; -} - -int ns_socketpair(sock_t sp[2]) { - return ns_socketpair2(sp, SOCK_STREAM); -} -#endif // NS_DISABLE_SOCKETPAIR - -// TODO(lsm): use non-blocking resolver -static int ns_resolve2(const char *host, struct in_addr *ina) { - struct hostent *he; - if ((he = gethostbyname(host)) == NULL) { - DBG(("gethostbyname(%s) failed: %s", host, strerror(errno))); - } else { - memcpy(ina, he->h_addr_list[0], sizeof(*ina)); - return 1; - } - return 0; -} - -// Resolve FDQN "host", store IP address in the "ip". -// Return > 0 (IP address length) on success. -int ns_resolve(const char *host, char *buf, size_t n) { - struct in_addr ad; - return ns_resolve2(host, &ad) ? snprintf(buf, n, "%s", inet_ntoa(ad)) : 0; -} - -// Address format: [PROTO://][IP_ADDRESS:]PORT[:CERT][:CA_CERT] -static int ns_parse_address(const char *str, union socket_address *sa, - int *proto, int *use_ssl, char *cert, char *ca) { - unsigned int a, b, c, d, port; - int n = 0, len = 0; - char host[200]; -#ifdef NS_ENABLE_IPV6 - char buf[100]; -#endif - - // MacOS needs that. If we do not zero it, subsequent bind() will fail. - // Also, all-zeroes in the socket address means binding to all addresses - // for both IPv4 and IPv6 (INADDR_ANY and IN6ADDR_ANY_INIT). - memset(sa, 0, sizeof(*sa)); - sa->sin.sin_family = AF_INET; - - *proto = SOCK_STREAM; - *use_ssl = 0; - cert[0] = ca[0] = '\0'; - - if (memcmp(str, "ssl://", 6) == 0) { - str += 6; - *use_ssl = 1; - } else if (memcmp(str, "udp://", 6) == 0) { - str += 6; - *proto = SOCK_DGRAM; - } else if (memcmp(str, "tcp://", 6) == 0) { - str += 6; - } - - if (sscanf(str, "%u.%u.%u.%u:%u%n", &a, &b, &c, &d, &port, &len) == 5) { - // Bind to a specific IPv4 address, e.g. 192.168.1.5:8080 - sa->sin.sin_addr.s_addr = htonl((a << 24) | (b << 16) | (c << 8) | d); - sa->sin.sin_port = htons((uint16_t) port); -#ifdef NS_ENABLE_IPV6 - } else if (sscanf(str, "[%99[^]]]:%u%n", buf, &port, &len) == 2 && - inet_pton(AF_INET6, buf, &sa->sin6.sin6_addr)) { - // IPv6 address, e.g. [3ffe:2a00:100:7031::1]:8080 - sa->sin6.sin6_family = AF_INET6; - sa->sin6.sin6_port = htons((uint16_t) port); -#endif - } else if (sscanf(str, "%199[^ :]:%u%n", host, &port, &len) == 2) { - sa->sin.sin_port = htons((uint16_t) port); - ns_resolve2(host, &sa->sin.sin_addr); - } else if (sscanf(str, "%u%n", &port, &len) == 1) { - // If only port is specified, bind to IPv4, INADDR_ANY - sa->sin.sin_port = htons((uint16_t) port); - } - - if (*use_ssl && (sscanf(str + len, ":%99[^:]:%99[^:]%n", cert, ca, &n) == 2 || - sscanf(str + len, ":%99[^:]%n", cert, &n) == 1)) { - len += n; - } - - return port < 0xffff && str[len] == '\0' ? len : 0; -} - -// 'sa' must be an initialized address to bind to -static sock_t ns_open_listening_socket(union socket_address *sa, int proto) { - socklen_t sa_len = (sa->sa.sa_family == AF_INET) ? - sizeof(sa->sin) : sizeof(sa->sin6); - sock_t sock = INVALID_SOCKET; -#ifndef _WIN32 - int on = 1; -#endif - - if ((sock = socket(sa->sa.sa_family, proto, 0)) != INVALID_SOCKET && -#ifndef _WIN32 - // SO_RESUSEADDR is not enabled on Windows because the semantics of - // SO_REUSEADDR on UNIX and Windows is different. On Windows, - // SO_REUSEADDR allows to bind a socket to a port without error even if - // the port is already open by another program. This is not the behavior - // SO_REUSEADDR was designed for, and leads to hard-to-track failure - // scenarios. Therefore, SO_REUSEADDR was disabled on Windows. - !setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (void *) &on, sizeof(on)) && -#endif - !bind(sock, &sa->sa, sa_len) && - (proto == SOCK_DGRAM || listen(sock, SOMAXCONN) == 0)) { - ns_set_non_blocking_mode(sock); - // In case port was set to 0, get the real port number - (void) getsockname(sock, &sa->sa, &sa_len); - } else if (sock != INVALID_SOCKET) { - closesocket(sock); - sock = INVALID_SOCKET; - } - - return sock; -} - -#ifdef NS_ENABLE_SSL -// Certificate generation script is at -// https://github.com/cesanta/net_skeleton/blob/master/scripts/gen_certs.sh - -static int ns_use_ca_cert(SSL_CTX *ctx, const char *cert) { - if (ctx == NULL) { - return -1; - } else if (cert == NULL || cert[0] == '\0') { - return 0; - } - SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT, 0); - return SSL_CTX_load_verify_locations(ctx, cert, NULL) == 1 ? 0 : -2; -} - -static int ns_use_cert(SSL_CTX *ctx, const char *pem_file) { - if (ctx == NULL) { - return -1; - } else if (pem_file == NULL || pem_file[0] == '\0') { - return 0; - } else if (SSL_CTX_use_certificate_file(ctx, pem_file, 1) == 0 || - SSL_CTX_use_PrivateKey_file(ctx, pem_file, 1) == 0) { - return -2; - } else { - SSL_CTX_set_mode(ctx, SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER); - SSL_CTX_use_certificate_chain_file(ctx, pem_file); - return 0; - } -} -#endif // NS_ENABLE_SSL - -struct ns_connection *ns_bind(struct ns_mgr *srv, const char *str, - ns_callback_t callback, void *user_data) { - union socket_address sa; - struct ns_connection *nc = NULL; - int use_ssl, proto; - char cert[100], ca_cert[100]; - sock_t sock; - - ns_parse_address(str, &sa, &proto, &use_ssl, cert, ca_cert); - if (use_ssl && cert[0] == '\0') return NULL; - - if ((sock = ns_open_listening_socket(&sa, proto)) == INVALID_SOCKET) { - } else if ((nc = ns_add_sock(srv, sock, callback, NULL)) == NULL) { - closesocket(sock); - } else { - nc->sa = sa; - nc->flags |= NSF_LISTENING; - nc->user_data = user_data; - nc->callback = callback; - - if (proto == SOCK_DGRAM) { - nc->flags |= NSF_UDP; - } - -#ifdef NS_ENABLE_SSL - if (use_ssl) { - nc->ssl_ctx = SSL_CTX_new(SSLv23_server_method()); - if (ns_use_cert(nc->ssl_ctx, cert) != 0 || - ns_use_ca_cert(nc->ssl_ctx, ca_cert) != 0) { - ns_close_conn(nc); - nc = NULL; - } - } -#endif - - DBG(("%p sock %d/%d ssl %p %p", nc, sock, proto, nc->ssl_ctx, nc->ssl)); - } - - return nc; -} - -static struct ns_connection *accept_conn(struct ns_connection *ls) { - struct ns_connection *c = NULL; - union socket_address sa; - socklen_t len = sizeof(sa); - sock_t sock = INVALID_SOCKET; - - // NOTE(lsm): on Windows, sock is always > FD_SETSIZE - if ((sock = accept(ls->sock, &sa.sa, &len)) == INVALID_SOCKET) { - } else if ((c = ns_add_sock(ls->mgr, sock, ls->callback, - ls->user_data)) == NULL) { - closesocket(sock); -#ifdef NS_ENABLE_SSL - } else if (ls->ssl_ctx != NULL && - ((c->ssl = SSL_new(ls->ssl_ctx)) == NULL || - SSL_set_fd(c->ssl, sock) != 1)) { - DBG(("SSL error")); - ns_close_conn(c); - c = NULL; -#endif - } else { - c->listener = ls; - c->proto_data = ls->proto_data; - ns_call(c, NS_ACCEPT, &sa); - DBG(("%p %d %p %p", c, c->sock, c->ssl_ctx, c->ssl)); - } - - return c; -} - -static int ns_is_error(int n) { - return n == 0 || - (n < 0 && errno != EINTR && errno != EINPROGRESS && - errno != EAGAIN && errno != EWOULDBLOCK -#ifdef _WIN32 - && WSAGetLastError() != WSAEINTR && WSAGetLastError() != WSAEWOULDBLOCK -#endif - ); -} - -void ns_sock_to_str(sock_t sock, char *buf, size_t len, int flags) { - union socket_address sa; - socklen_t slen = sizeof(sa); - - if (buf != NULL && len > 0) { - buf[0] = '\0'; - memset(&sa, 0, sizeof(sa)); - if (flags & 4) { - getpeername(sock, &sa.sa, &slen); - } else { - getsockname(sock, &sa.sa, &slen); - } - if (flags & 1) { -#if defined(NS_ENABLE_IPV6) - inet_ntop(sa.sa.sa_family, sa.sa.sa_family == AF_INET ? - (void *) &sa.sin.sin_addr : - (void *) &sa.sin6.sin6_addr, buf, len); -#elif defined(_WIN32) - // Only Windoze Vista (and newer) have inet_ntop() - strncpy(buf, inet_ntoa(sa.sin.sin_addr), len); -#else - inet_ntop(sa.sa.sa_family, (void *) &sa.sin.sin_addr, buf,(socklen_t)len); -#endif - } - if (flags & 2) { - snprintf(buf + strlen(buf), len - (strlen(buf) + 1), "%s%d", - flags & 1 ? ":" : "", (int) ntohs(sa.sin.sin_port)); - } - } -} - -int ns_hexdump(const void *buf, int len, char *dst, int dst_len) { - const unsigned char *p = (const unsigned char *) buf; - char ascii[17] = ""; - int i, idx, n = 0; - - for (i = 0; i < len; i++) { - idx = i % 16; - if (idx == 0) { - if (i > 0) n += snprintf(dst + n, dst_len - n, " %s\n", ascii); - n += snprintf(dst + n, dst_len - n, "%04x ", i); - } - n += snprintf(dst + n, dst_len - n, " %02x", p[i]); - ascii[idx] = p[i] < 0x20 || p[i] > 0x7e ? '.' : p[i]; - ascii[idx + 1] = '\0'; - } - - while (i++ % 16) n += snprintf(dst + n, dst_len - n, "%s", " "); - n += snprintf(dst + n, dst_len - n, " %s\n\n", ascii); - - return n; -} - -#ifdef NS_ENABLE_SSL -static int ns_ssl_err(struct ns_connection *conn, int res) { - int ssl_err = SSL_get_error(conn->ssl, res); - if (ssl_err == SSL_ERROR_WANT_READ) conn->flags |= NSF_WANT_READ; - if (ssl_err == SSL_ERROR_WANT_WRITE) conn->flags |= NSF_WANT_WRITE; - return ssl_err; -} -#endif - -static void ns_read_from_socket(struct ns_connection *conn) { - char buf[2048]; - int n = 0; - - if (conn->flags & NSF_CONNECTING) { - int ok = 1, ret; - socklen_t len = sizeof(ok); - - ret = getsockopt(conn->sock, SOL_SOCKET, SO_ERROR, (char *) &ok, &len); - (void) ret; -#ifdef NS_ENABLE_SSL - if (ret == 0 && ok == 0 && conn->ssl != NULL) { - int res = SSL_connect(conn->ssl); - int ssl_err = ns_ssl_err(conn, res); - if (res == 1) { - conn->flags |= NSF_SSL_HANDSHAKE_DONE; - } else if (ssl_err == SSL_ERROR_WANT_READ || - ssl_err == SSL_ERROR_WANT_WRITE) { - return; // Call us again - } else { - ok = 1; - } - } -#endif - conn->flags &= ~NSF_CONNECTING; - DBG(("%p ok=%d", conn, ok)); - if (ok != 0) { - conn->flags |= NSF_CLOSE_IMMEDIATELY; - } - ns_call(conn, NS_CONNECT, &ok); - return; - } - -#ifdef NS_ENABLE_SSL - if (conn->ssl != NULL) { - if (conn->flags & NSF_SSL_HANDSHAKE_DONE) { - // SSL library may have more bytes ready to read then we ask to read. - // Therefore, read in a loop until we read everything. Without the loop, - // we skip to the next select() cycle which can just timeout. - while ((n = SSL_read(conn->ssl, buf, sizeof(buf))) > 0) { - DBG(("%p %d <- %d bytes (SSL)", conn, conn->flags, n)); - iobuf_append(&conn->recv_iobuf, buf, n); - ns_call(conn, NS_RECV, &n); - } - ns_ssl_err(conn, n); - } else { - int res = SSL_accept(conn->ssl); - int ssl_err = ns_ssl_err(conn, res); - if (res == 1) { - conn->flags |= NSF_SSL_HANDSHAKE_DONE; - } else if (ssl_err == SSL_ERROR_WANT_READ || - ssl_err == SSL_ERROR_WANT_WRITE) { - return; // Call us again - } else { - conn->flags |= NSF_CLOSE_IMMEDIATELY; - } - return; - } - } else -#endif - { - while ((n = (int) recv(conn->sock, buf, sizeof(buf), 0)) > 0) { - DBG(("%p %d <- %d bytes (PLAIN)", conn, conn->flags, n)); - iobuf_append(&conn->recv_iobuf, buf, n); - ns_call(conn, NS_RECV, &n); - } - } - - if (ns_is_error(n)) { - conn->flags |= NSF_CLOSE_IMMEDIATELY; - } -} - -static void ns_write_to_socket(struct ns_connection *conn) { - struct iobuf *io = &conn->send_iobuf; - int n = 0; - -#ifdef NS_ENABLE_SSL - if (conn->ssl != NULL) { - n = SSL_write(conn->ssl, io->buf, io->len); - if (n <= 0) { - int ssl_err = ns_ssl_err(conn, n); - if (ssl_err == SSL_ERROR_WANT_READ || ssl_err == SSL_ERROR_WANT_WRITE) { - return; // Call us again - } else { - conn->flags |= NSF_CLOSE_IMMEDIATELY; - } - } - } else -#endif - { n = (int) send(conn->sock, io->buf, io->len, 0); } - - DBG(("%p %d -> %d bytes", conn, conn->flags, n)); - - ns_call(conn, NS_SEND, &n); - if (ns_is_error(n)) { - conn->flags |= NSF_CLOSE_IMMEDIATELY; - } else if (n > 0) { - iobuf_remove(io, n); - } -} - -int ns_send(struct ns_connection *conn, const void *buf, int len) { - return (int) ns_out(conn, buf, len); -} - -static void ns_handle_udp(struct ns_connection *ls) { - struct ns_connection nc; - char buf[NS_UDP_RECEIVE_BUFFER_SIZE]; - int n; - socklen_t s_len = sizeof(nc.sa); - - memset(&nc, 0, sizeof(nc)); - n = recvfrom(ls->sock, buf, sizeof(buf), 0, &nc.sa.sa, &s_len); - if (n <= 0) { - DBG(("%p recvfrom: %s", ls, strerror(errno))); - } else { - nc.mgr = ls->mgr; - nc.recv_iobuf.buf = buf; - nc.recv_iobuf.len = nc.recv_iobuf.size = n; - nc.sock = ls->sock; - nc.callback = ls->callback; - nc.user_data = ls->user_data; - nc.proto_data = ls->proto_data; - nc.mgr = ls->mgr; - nc.listener = ls; - nc.flags = NSF_UDP; - DBG(("%p %d bytes received", ls, n)); - ns_call(&nc, NS_RECV, &n); - } -} - -static void ns_add_to_set(sock_t sock, fd_set *set, sock_t *max_fd) { - if (sock != INVALID_SOCKET) { - FD_SET(sock, set); - if (*max_fd == INVALID_SOCKET || sock > *max_fd) { - *max_fd = sock; - } - } -} - -time_t ns_mgr_poll(struct ns_mgr *mgr, int milli) { - struct ns_connection *conn, *tmp_conn; - struct timeval tv; - fd_set read_set, write_set; - sock_t max_fd = INVALID_SOCKET; - time_t current_time = time(NULL); - - FD_ZERO(&read_set); - FD_ZERO(&write_set); - ns_add_to_set(mgr->ctl[1], &read_set, &max_fd); - - for (conn = mgr->active_connections; conn != NULL; conn = tmp_conn) { - tmp_conn = conn->next; - if (!(conn->flags & (NSF_LISTENING | NSF_CONNECTING))) { - ns_call(conn, NS_POLL, ¤t_time); - } - if (!(conn->flags & NSF_WANT_WRITE)) { - //DBG(("%p read_set", conn)); - ns_add_to_set(conn->sock, &read_set, &max_fd); - } - if (((conn->flags & NSF_CONNECTING) && !(conn->flags & NSF_WANT_READ)) || - (conn->send_iobuf.len > 0 && !(conn->flags & NSF_CONNECTING) && - !(conn->flags & NSF_BUFFER_BUT_DONT_SEND))) { - //DBG(("%p write_set", conn)); - ns_add_to_set(conn->sock, &write_set, &max_fd); - } - if (conn->flags & NSF_CLOSE_IMMEDIATELY) { - ns_close_conn(conn); - } - } - - tv.tv_sec = milli / 1000; - tv.tv_usec = (milli % 1000) * 1000; - - if (select((int) max_fd + 1, &read_set, &write_set, NULL, &tv) > 0) { - // select() might have been waiting for a long time, reset current_time - // now to prevent last_io_time being set to the past. - current_time = time(NULL); - - // Read wakeup messages - if (mgr->ctl[1] != INVALID_SOCKET && - FD_ISSET(mgr->ctl[1], &read_set)) { - struct ctl_msg ctl_msg; - int len = (int) recv(mgr->ctl[1], (char *) &ctl_msg, sizeof(ctl_msg), 0); - send(mgr->ctl[1], ctl_msg.message, 1, 0); - if (len >= (int) sizeof(ctl_msg.callback) && ctl_msg.callback != NULL) { - struct ns_connection *c; - for (c = ns_next(mgr, NULL); c != NULL; c = ns_next(mgr, c)) { - ctl_msg.callback(c, NS_POLL, ctl_msg.message); - } - } - } - - for (conn = mgr->active_connections; conn != NULL; conn = tmp_conn) { - tmp_conn = conn->next; - if (FD_ISSET(conn->sock, &read_set)) { - if (conn->flags & NSF_LISTENING) { - if (conn->flags & NSF_UDP) { - ns_handle_udp(conn); - } else { - // We're not looping here, and accepting just one connection at - // a time. The reason is that eCos does not respect non-blocking - // flag on a listening socket and hangs in a loop. - accept_conn(conn); - } - } else { - conn->last_io_time = current_time; - ns_read_from_socket(conn); - } - } - - if (FD_ISSET(conn->sock, &write_set)) { - if (conn->flags & NSF_CONNECTING) { - ns_read_from_socket(conn); - } else if (!(conn->flags & NSF_BUFFER_BUT_DONT_SEND)) { - conn->last_io_time = current_time; - ns_write_to_socket(conn); - } - } - } - } - - for (conn = mgr->active_connections; conn != NULL; conn = tmp_conn) { - tmp_conn = conn->next; - if ((conn->flags & NSF_CLOSE_IMMEDIATELY) || - (conn->send_iobuf.len == 0 && - (conn->flags & NSF_FINISHED_SENDING_DATA))) { - ns_close_conn(conn); - } - } - - return current_time; -} - -struct ns_connection *ns_connect(struct ns_mgr *mgr, const char *address, - ns_callback_t callback, void *user_data) { - sock_t sock = INVALID_SOCKET; - struct ns_connection *nc = NULL; - union socket_address sa; - char cert[100], ca_cert[100]; - int rc, use_ssl, proto; - - ns_parse_address(address, &sa, &proto, &use_ssl, cert, ca_cert); - if ((sock = socket(AF_INET, proto, 0)) == INVALID_SOCKET) { - return NULL; - } - ns_set_non_blocking_mode(sock); - rc = (proto == SOCK_DGRAM) ? 0 : connect(sock, &sa.sa, sizeof(sa.sin)); - - if (rc != 0 && ns_is_error(rc)) { - closesocket(sock); - return NULL; - } else if ((nc = ns_add_sock(mgr, sock, callback, user_data)) == NULL) { - closesocket(sock); - return NULL; - } - - nc->sa = sa; // Important, cause UDP conns will use sendto() - nc->flags = (proto == SOCK_DGRAM) ? NSF_UDP : NSF_CONNECTING; - -#ifdef NS_ENABLE_SSL - if (use_ssl) { - if ((nc->ssl_ctx = SSL_CTX_new(SSLv23_client_method())) == NULL || - ns_use_cert(nc->ssl_ctx, cert) != 0 || - ns_use_ca_cert(nc->ssl_ctx, ca_cert) != 0 || - (nc->ssl = SSL_new(nc->ssl_ctx)) == NULL) { - ns_close_conn(nc); - return NULL; - } else { - SSL_set_fd(nc->ssl, sock); - } - } -#endif - - return nc; -} - -struct ns_connection *ns_add_sock(struct ns_mgr *s, sock_t sock, - ns_callback_t callback, void *user_data) { - struct ns_connection *conn; - if ((conn = (struct ns_connection *) NS_MALLOC(sizeof(*conn))) != NULL) { - memset(conn, 0, sizeof(*conn)); - ns_set_non_blocking_mode(sock); - ns_set_close_on_exec(sock); - conn->sock = sock; - conn->user_data = user_data; - conn->callback = callback; - conn->mgr = s; - conn->last_io_time = time(NULL); - ns_add_conn(s, conn); - DBG(("%p %d", conn, sock)); - } - return conn; -} - -struct ns_connection *ns_next(struct ns_mgr *s, struct ns_connection *conn) { - return conn == NULL ? s->active_connections : conn->next; -} - -void ns_broadcast(struct ns_mgr *mgr, ns_callback_t cb,void *data, size_t len) { - struct ctl_msg ctl_msg; - if (mgr->ctl[0] != INVALID_SOCKET && data != NULL && - len < sizeof(ctl_msg.message)) { - ctl_msg.callback = cb; - memcpy(ctl_msg.message, data, len); - send(mgr->ctl[0], (char *) &ctl_msg, - offsetof(struct ctl_msg, message) + len, 0); - recv(mgr->ctl[0], (char *) &len, 1, 0); - } -} - -void ns_mgr_init(struct ns_mgr *s, void *user_data) { - memset(s, 0, sizeof(*s)); - s->ctl[0] = s->ctl[1] = INVALID_SOCKET; - s->user_data = user_data; - -#ifdef _WIN32 - { WSADATA data; WSAStartup(MAKEWORD(2, 2), &data); } -#else - // Ignore SIGPIPE signal, so if client cancels the request, it - // won't kill the whole process. - signal(SIGPIPE, SIG_IGN); -#endif - -#ifndef NS_DISABLE_SOCKETPAIR - do { - ns_socketpair2(s->ctl, SOCK_DGRAM); - } while (s->ctl[0] == INVALID_SOCKET); -#endif - -#ifdef NS_ENABLE_SSL - {static int init_done; if (!init_done) { SSL_library_init(); init_done++; }} -#endif -} - -void ns_mgr_free(struct ns_mgr *s) { - struct ns_connection *conn, *tmp_conn; - - DBG(("%p", s)); - if (s == NULL) return; - // Do one last poll, see https://github.com/cesanta/mongoose/issues/286 - ns_mgr_poll(s, 0); - - if (s->ctl[0] != INVALID_SOCKET) closesocket(s->ctl[0]); - if (s->ctl[1] != INVALID_SOCKET) closesocket(s->ctl[1]); - s->ctl[0] = s->ctl[1] = INVALID_SOCKET; - - for (conn = s->active_connections; conn != NULL; conn = tmp_conn) { - tmp_conn = conn->next; - ns_close_conn(conn); - } -}