2020-08-22 00:50:38 +02:00
|
|
|
module openssl
|
|
|
|
|
|
|
|
import net.openssl
|
2020-11-15 21:54:47 +01:00
|
|
|
import net
|
2020-08-22 00:50:38 +02:00
|
|
|
import time
|
|
|
|
|
|
|
|
// const (
|
|
|
|
// is_used = openssl.is_used
|
|
|
|
// )
|
|
|
|
pub struct SSLConn {
|
|
|
|
mut:
|
|
|
|
sslctx &C.SSL_CTX
|
|
|
|
ssl &C.SSL
|
|
|
|
handle int
|
|
|
|
duration time.Duration
|
|
|
|
}
|
|
|
|
|
|
|
|
enum Select {
|
|
|
|
read
|
|
|
|
write
|
|
|
|
except
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn new_ssl_conn() &SSLConn {
|
|
|
|
return &SSLConn{
|
|
|
|
sslctx: 0
|
|
|
|
ssl: 0
|
|
|
|
handle: 0
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// shutdown closes the ssl connection and do clean up
|
|
|
|
pub fn (mut s SSLConn) shutdown() ? {
|
|
|
|
if s.ssl != 0 {
|
|
|
|
mut res := 0
|
|
|
|
for {
|
2020-11-21 14:45:45 +01:00
|
|
|
res = C.SSL_shutdown(s.ssl)
|
2020-08-22 00:50:38 +02:00
|
|
|
if res < 0 {
|
|
|
|
err_res := openssl.ssl_error(res, s.ssl) or {
|
|
|
|
break // We break to free rest of resources
|
|
|
|
}
|
|
|
|
if err_res == .ssl_error_want_read {
|
|
|
|
for {
|
|
|
|
ready := @select(s.handle, .read, s.duration)?
|
|
|
|
if ready {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
} else if err_res == .ssl_error_want_write {
|
|
|
|
for {
|
|
|
|
ready := @select(s.handle, .write, s.duration)?
|
|
|
|
if ready {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
} else {
|
2020-11-21 14:45:45 +01:00
|
|
|
C.SSL_free(s.ssl)
|
|
|
|
if s.sslctx != 0 {
|
|
|
|
C.SSL_CTX_free(s.sslctx)
|
|
|
|
}
|
2020-08-22 00:50:38 +02:00
|
|
|
return error('unexepedted ssl error $err_res')
|
|
|
|
}
|
2020-11-21 14:45:45 +01:00
|
|
|
if s.ssl != 0 {
|
|
|
|
C.SSL_free(s.ssl)
|
|
|
|
}
|
2020-08-22 00:50:38 +02:00
|
|
|
if s.sslctx != 0 {
|
|
|
|
C.SSL_CTX_free(s.sslctx)
|
|
|
|
}
|
|
|
|
return error('Could not connect using SSL. ($err_res),err')
|
|
|
|
} else if res == 0 {
|
|
|
|
continue
|
|
|
|
} else if res == 1 {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
C.SSL_free(s.ssl)
|
|
|
|
}
|
|
|
|
if s.sslctx != 0 {
|
|
|
|
C.SSL_CTX_free(s.sslctx)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// connect to server using open ssl
|
|
|
|
pub fn (mut s SSLConn) connect(mut tcp_conn net.TcpConn) ? {
|
|
|
|
s.handle = tcp_conn.sock.handle
|
|
|
|
s.duration = tcp_conn.read_timeout()
|
|
|
|
// C.SSL_load_error_strings()
|
|
|
|
s.sslctx = C.SSL_CTX_new(C.SSLv23_client_method())
|
|
|
|
if s.sslctx == 0 {
|
|
|
|
return error("Couldn't get ssl context")
|
|
|
|
}
|
|
|
|
s.ssl = C.SSL_new(s.sslctx)
|
|
|
|
if s.ssl == 0 {
|
|
|
|
return error("Couldn't create OpenSSL instance.")
|
|
|
|
}
|
|
|
|
if C.SSL_set_fd(s.ssl, tcp_conn.sock.handle) != 1 {
|
|
|
|
return error("Couldn't assign ssl to socket.")
|
|
|
|
}
|
|
|
|
for {
|
|
|
|
res := C.SSL_connect(s.ssl)
|
|
|
|
if res != 1 {
|
|
|
|
err_res := openssl.ssl_error(res, s.ssl)?
|
|
|
|
if err_res == .ssl_error_want_read {
|
|
|
|
for {
|
|
|
|
ready := @select(s.handle, .read, s.duration)?
|
|
|
|
if ready {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
} else if err_res == .ssl_error_want_write {
|
|
|
|
for {
|
|
|
|
ready := @select(s.handle, .write, s.duration)?
|
|
|
|
if ready {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
return error('Could not connect using SSL. ($err_res),err')
|
|
|
|
}
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn (mut s SSLConn) socket_read_into_ptr(buf_ptr byteptr, len int) ?int {
|
|
|
|
mut res := 0
|
|
|
|
for {
|
|
|
|
res = C.SSL_read(s.ssl, buf_ptr, len)
|
|
|
|
if res < 0 {
|
|
|
|
err_res := openssl.ssl_error(res, s.ssl)?
|
|
|
|
if err_res == .ssl_error_want_read {
|
|
|
|
for {
|
|
|
|
ready := @select(s.handle, .read, s.duration)?
|
|
|
|
if ready {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
} else if err_res == .ssl_error_want_write {
|
|
|
|
for {
|
|
|
|
ready := @select(s.handle, .write, s.duration)?
|
|
|
|
if ready {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
} else if err_res == .ssl_error_zero_return {
|
|
|
|
return 0
|
|
|
|
}
|
2020-11-21 14:45:45 +01:00
|
|
|
return error('Could not read using SSL. ($err_res)')
|
2020-08-22 00:50:38 +02:00
|
|
|
}
|
|
|
|
break
|
|
|
|
}
|
|
|
|
return res
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn (mut s SSLConn) read_into(mut buffer []Byte) ?int {
|
|
|
|
res := s.socket_read_into_ptr(byteptr(buffer.data), buffer.len)?
|
|
|
|
return res
|
|
|
|
}
|
|
|
|
|
|
|
|
// write number of bytes to SSL connection
|
|
|
|
pub fn (mut s SSLConn) write(bytes []Byte) ? {
|
|
|
|
unsafe {
|
|
|
|
mut ptr_base := byteptr(bytes.data)
|
|
|
|
mut total_sent := 0
|
|
|
|
for total_sent < bytes.len {
|
|
|
|
ptr := ptr_base + total_sent
|
|
|
|
remaining := bytes.len - total_sent
|
|
|
|
mut sent := C.SSL_write(s.ssl, ptr, remaining)
|
|
|
|
if sent <= 0 {
|
|
|
|
err_res := openssl.ssl_error(sent, s.ssl)?
|
|
|
|
if err_res == .ssl_error_want_read {
|
|
|
|
for {
|
|
|
|
ready := @select(s.handle, .read, s.duration)?
|
|
|
|
if ready {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else if err_res == .ssl_error_want_write {
|
|
|
|
for {
|
|
|
|
ready := @select(s.handle, .write, s.duration)?
|
|
|
|
if ready {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
} else if err_res == .ssl_error_zero_return {
|
|
|
|
return error('ssl write on closed connection') // Todo error_with_code close
|
|
|
|
}
|
|
|
|
return error_with_code('Could not write SSL. ($err_res),err', err_res)
|
|
|
|
}
|
|
|
|
total_sent += sent
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
This is basically a copy of Emily socket implementation of select.
|
|
|
|
This have to be consolidated into common net lib features
|
|
|
|
when merging this to V
|
|
|
|
*/
|
|
|
|
[typedef]
|
|
|
|
pub struct C.fd_set {
|
|
|
|
}
|
|
|
|
|
|
|
|
// Select waits for an io operation (specified by parameter `test`) to be available
|
|
|
|
fn @select(handle int, test Select, timeout time.Duration) ?bool {
|
2020-11-18 18:21:49 +01:00
|
|
|
set := C.fd_set{}
|
|
|
|
|
|
|
|
C.FD_ZERO(&set)
|
|
|
|
C.FD_SET(handle, &set)
|
|
|
|
|
|
|
|
seconds := timeout.milliseconds() / 1000
|
|
|
|
microseconds := timeout - (seconds * time.second)
|
|
|
|
|
|
|
|
mut tt := C.timeval{
|
|
|
|
tv_sec: u64(seconds)
|
|
|
|
tv_usec: u64(microseconds)
|
|
|
|
}
|
|
|
|
|
|
|
|
mut timeval_timeout := &tt
|
|
|
|
|
|
|
|
// infinite timeout is signaled by passing null as the timeout to
|
|
|
|
// select
|
|
|
|
if timeout == net.infinite_timeout {
|
|
|
|
timeval_timeout = &C.timeval(0)
|
|
|
|
}
|
|
|
|
|
|
|
|
match test {
|
|
|
|
.read {
|
|
|
|
net.socket_error(C.@select(handle+1, &set, C.NULL, C.NULL, timeval_timeout))?
|
|
|
|
}
|
|
|
|
.write {
|
|
|
|
net.socket_error(C.@select(handle+1, C.NULL, &set, C.NULL, timeval_timeout))?
|
|
|
|
}
|
|
|
|
.except {
|
|
|
|
net.socket_error(C.@select(handle+1, C.NULL, C.NULL, &set, timeval_timeout))?
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return C.FD_ISSET(handle, &set)
|
2020-08-22 00:50:38 +02:00
|
|
|
}
|