1 Star 1 Fork 44

Jvmlz / facil.io

forked from 三字经 / facil.io 
加入 Gitee
与超过 1200万 开发者一起发现、参与优秀开源项目,私有仓库也完全免费 :)
免费加入
克隆/下载
fio_tls_missing.c 20.44 KB
一键复制 编辑 原始数据 按行查看 历史
Bo 提交于 2019-08-28 23:00 . Fix leak in example code
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635
/*
Copyright: Boaz Segev, 2018-2019
License: MIT
Feel free to copy, use and enjoy according to the license provided.
*/
#include <fio.h>
/**
* This implementation of the facil.io SSL/TLS wrapper API is the default
* implementation that will be used when no SSL/TLS library is available...
*
* ... without modification, this implementation crashes the program.
*
* The implementation can be USED AS A TEMPLATE for future implementations.
*
* This implementation is optimized for ease of development rather than memory
* consumption.
*/
#include "fio_tls.h"
#if !defined(FIO_TLS_FOUND) /* Library compiler flags */
#define REQUIRE_LIBRARY()
#define FIO_TLS_WEAK
/* TODO: delete me! */
#undef FIO_TLS_WEAK
#define FIO_TLS_WEAK __attribute__((weak))
#if !FIO_IGNORE_TLS_IF_MISSING
#undef REQUIRE_LIBRARY
#define REQUIRE_LIBRARY() \
FIO_LOG_FATAL("No supported SSL/TLS library available."); \
exit(-1);
#endif
/* STOP deleting after this line */
/* *****************************************************************************
The SSL/TLS helper data types (can be left as is)
***************************************************************************** */
#define FIO_INCLUDE_STR 1
#define FIO_FORCE_MALLOC_TMP 1
#include <fio.h>
typedef struct {
fio_str_s private_key;
fio_str_s public_key;
fio_str_s password;
} cert_s;
static inline int fio_tls_cert_cmp(const cert_s *dest, const cert_s *src) {
return fio_str_iseq(&dest->private_key, &src->private_key);
}
static inline void fio_tls_cert_copy(cert_s *dest, cert_s *src) {
*dest = (cert_s){
.private_key = FIO_STR_INIT,
.public_key = FIO_STR_INIT,
.password = FIO_STR_INIT,
};
fio_str_concat(&dest->private_key, &src->private_key);
fio_str_concat(&dest->public_key, &src->public_key);
fio_str_concat(&dest->password, &src->password);
}
static inline void fio_tls_cert_destroy(cert_s *obj) {
fio_str_free(&obj->private_key);
fio_str_free(&obj->public_key);
fio_str_free(&obj->password);
}
#define FIO_ARY_NAME cert_ary
#define FIO_ARY_TYPE cert_s
#define FIO_ARY_COMPARE(k1, k2) (fio_tls_cert_cmp(&(k1), &(k2)))
#define FIO_ARY_COPY(dest, obj) fio_tls_cert_copy(&(dest), &(obj))
#define FIO_ARY_DESTROY(key) fio_tls_cert_destroy(&(key))
#define FIO_FORCE_MALLOC_TMP 1
#include <fio.h>
typedef struct {
fio_str_s pem;
} trust_s;
static inline int fio_tls_trust_cmp(const trust_s *dest, const trust_s *src) {
return fio_str_iseq(&dest->pem, &src->pem);
}
static inline void fio_tls_trust_copy(trust_s *dest, trust_s *src) {
*dest = (trust_s){
.pem = FIO_STR_INIT,
};
fio_str_concat(&dest->pem, &src->pem);
}
static inline void fio_tls_trust_destroy(trust_s *obj) {
fio_str_free(&obj->pem);
}
#define FIO_ARY_NAME trust_ary
#define FIO_ARY_TYPE trust_s
#define FIO_ARY_COMPARE(k1, k2) (fio_tls_trust_cmp(&(k1), &(k2)))
#define FIO_ARY_COPY(dest, obj) fio_tls_trust_copy(&(dest), &(obj))
#define FIO_ARY_DESTROY(key) fio_tls_trust_destroy(&(key))
#define FIO_FORCE_MALLOC_TMP 1
#include <fio.h>
typedef struct {
fio_str_s name; /* fio_str_s provides cache locality for small strings */
void (*on_selected)(intptr_t uuid, void *udata_connection, void *udata_tls);
void *udata_tls;
void (*on_cleanup)(void *udata_tls);
} alpn_s;
static inline int fio_alpn_cmp(const alpn_s *dest, const alpn_s *src) {
return fio_str_iseq(&dest->name, &src->name);
}
static inline void fio_alpn_copy(alpn_s *dest, alpn_s *src) {
*dest = (alpn_s){
.name = FIO_STR_INIT,
.on_selected = src->on_selected,
.udata_tls = src->udata_tls,
.on_cleanup = src->on_cleanup,
};
fio_str_concat(&dest->name, &src->name);
}
static inline void fio_alpn_destroy(alpn_s *obj) {
if (obj->on_cleanup)
obj->on_cleanup(obj->udata_tls);
fio_str_free(&obj->name);
}
#define FIO_SET_NAME alpn_list
#define FIO_SET_OBJ_TYPE alpn_s
#define FIO_SET_OBJ_COMPARE(k1, k2) fio_alpn_cmp(&(k1), &(k2))
#define FIO_SET_OBJ_COPY(dest, obj) fio_alpn_copy(&(dest), &(obj))
#define FIO_SET_OBJ_DESTROY(key) fio_alpn_destroy(&(key))
#define FIO_FORCE_MALLOC_TMP 1
#include <fio.h>
/* *****************************************************************************
The SSL/TLS Context type
***************************************************************************** */
/** An opaque type used for the SSL/TLS functions. */
struct fio_tls_s {
size_t ref; /* Reference counter, to guards the ALPN registry */
alpn_list_s alpn; /* ALPN is the name for the protocol selection extension */
/*** the next two components could be optimized away with tweaking stuff ***/
cert_ary_s sni; /* SNI (server name extension) stores ID certificates */
trust_ary_s trust; /* Trusted certificate registry (peer verification) */
/************ TODO: implementation data fields go here ******************/
};
/* *****************************************************************************
ALPN Helpers
***************************************************************************** */
/** Returns a pointer to the ALPN data (callback, etc') IF exists in the TLS. */
FIO_FUNC inline alpn_s *alpn_find(fio_tls_s *tls, char *name, size_t len) {
alpn_s tmp = {.name = FIO_STR_INIT_STATIC2(name, len)};
alpn_list__map_s_ *pos =
alpn_list__find_map_pos_(&tls->alpn, fio_str_hash(&tmp.name), tmp);
if (!pos || !pos->pos)
return NULL;
return &pos->pos->obj;
}
/** Adds an ALPN data object to the ALPN "list" (set) */
FIO_FUNC inline void alpn_add(
fio_tls_s *tls, const char *protocol_name,
void (*on_selected)(intptr_t uuid, void *udata_connection, void *udata_tls),
void *udata_tls, void (*on_cleanup)(void *udata_tls)) {
alpn_s tmp = {
.name = FIO_STR_INIT_STATIC(protocol_name),
.on_selected = on_selected,
.udata_tls = udata_tls,
.on_cleanup = on_cleanup,
};
if (fio_str_len(&tmp.name) > 255) {
FIO_LOG_ERROR("ALPN protocol names are limited to 255 bytes.");
return;
}
alpn_list_overwrite(&tls->alpn, fio_str_hash(&tmp.name), tmp, NULL);
tmp.on_cleanup = NULL;
fio_alpn_destroy(&tmp);
}
/** Returns a pointer to the default (first) ALPN object in the TLS (if any). */
FIO_FUNC inline alpn_s *alpn_default(fio_tls_s *tls) {
if (!tls || !alpn_list_count(&tls->alpn) || !tls->alpn.ordered)
return NULL;
return &tls->alpn.ordered[0].obj;
}
typedef struct {
alpn_s alpn;
intptr_t uuid;
void *udata_connection;
} alpn_task_s;
FIO_FUNC inline void alpn_select___task(void *t_, void *ignr_) {
alpn_task_s *t = t_;
if (fio_is_valid(t->uuid))
t->alpn.on_selected(t->uuid, t->udata_connection, t->alpn.udata_tls);
fio_free(t);
(void)ignr_;
}
/** Schedules the ALPN protocol callback. */
FIO_FUNC inline void alpn_select(alpn_s *alpn, intptr_t uuid,
void *udata_connection) {
if (!alpn || !alpn->on_selected)
return;
alpn_task_s *t = fio_malloc(sizeof(*t));
*t = (alpn_task_s){
.alpn = *alpn,
.uuid = uuid,
.udata_connection = udata_connection,
};
/* move task out of the socket's lock */
fio_defer(alpn_select___task, t, NULL);
}
/* *****************************************************************************
SSL/TLS Context (re)-building - TODO: add implementation details
***************************************************************************** */
/** Called when the library specific data for the context should be destroyed */
static void fio_tls_destroy_context(fio_tls_s *tls) {
/* TODO: Library specific implementation */
FIO_LOG_DEBUG("destroyed TLS context %p", (void *)tls);
}
/** Called when the library specific data for the context should be built */
static void fio_tls_build_context(fio_tls_s *tls) {
fio_tls_destroy_context(tls);
/* TODO: Library specific implementation */
/* Certificates */
FIO_ARY_FOR(&tls->sni, pos) {
fio_str_info_s k = fio_str_info(&pos->private_key);
fio_str_info_s p = fio_str_info(&pos->public_key);
fio_str_info_s pw = fio_str_info(&pos->password);
if (p.len && k.len) {
/* TODO: attache certificate */
(void)pw;
} else {
/* TODO: self signed certificate */
}
}
/* ALPN Protocols */
FIO_SET_FOR_LOOP(&tls->alpn, pos) {
fio_str_info_s name = fio_str_info(&pos->obj.name);
(void)name;
// map to pos->callback;
}
/* Peer Verification / Trust */
if (trust_ary_count(&tls->trust)) {
/* TODO: enable peer verification */
/* TODO: Add each ceriticate in the PEM to the trust "store" */
FIO_ARY_FOR(&tls->trust, pos) {
fio_str_info_s pem = fio_str_info(&pos->pem);
(void)pem;
}
}
FIO_LOG_DEBUG("(re)built TLS context %p", (void *)tls);
}
/* *****************************************************************************
SSL/TLS RW Hooks - TODO: add implementation details
***************************************************************************** */
/* TODO: this is an example implementation - fix for specific library. */
#define TLS_BUFFER_LENGTH (1 << 15)
typedef struct {
fio_tls_s *tls;
size_t len;
uint8_t alpn_ok;
char buffer[TLS_BUFFER_LENGTH];
} buffer_s;
/**
* Implement reading from a file descriptor. Should behave like the file
* system `read` call, including the setup or errno to EAGAIN / EWOULDBLOCK.
*
* Note: facil.io library functions MUST NEVER be called by any r/w hook, or a
* deadlock might occur.
*/
static ssize_t fio_tls_read(intptr_t uuid, void *udata, void *buf,
size_t count) {
ssize_t ret = read(fio_uuid2fd(uuid), buf, count);
if (ret > 0) {
FIO_LOG_DEBUG("Read %zd bytes from %p", ret, (void *)uuid);
}
return ret;
(void)udata;
}
/**
* When implemented, this function will be called to flush any data remaining
* in the internal buffer.
*
* The function should return the number of bytes remaining in the internal
* buffer (0 is a valid response) or -1 (on error).
*
* Note: facil.io library functions MUST NEVER be called by any r/w hook, or a
* deadlock might occur.
*/
static ssize_t fio_tls_flush(intptr_t uuid, void *udata) {
buffer_s *buffer = udata;
if (!buffer->len) {
FIO_LOG_DEBUG("Flush empty for %p", (void *)uuid);
return 0;
}
ssize_t r = write(fio_uuid2fd(uuid), buffer->buffer, buffer->len);
if (r < 0)
return -1;
if (r == 0) {
errno = ECONNRESET;
return -1;
}
size_t len = buffer->len - r;
if (len)
memmove(buffer->buffer, buffer->buffer + r, len);
buffer->len = len;
FIO_LOG_DEBUG("Sent %zd bytes to %p", r, (void *)uuid);
return r;
}
/**
* Implement writing to a file descriptor. Should behave like the file system
* `write` call.
*
* If an internal buffer is implemented and it is full, errno should be set to
* EWOULDBLOCK and the function should return -1.
*
* Note: facil.io library functions MUST NEVER be called by any r/w hook, or a
* deadlock might occur.
*/
static ssize_t fio_tls_write(intptr_t uuid, void *udata, const void *buf,
size_t count) {
buffer_s *buffer = udata;
size_t can_copy = TLS_BUFFER_LENGTH - buffer->len;
if (can_copy > count)
can_copy = count;
if (!can_copy)
goto would_block;
memcpy(buffer->buffer + buffer->len, buf, can_copy);
buffer->len += can_copy;
FIO_LOG_DEBUG("Copied %zu bytes to %p", can_copy, (void *)uuid);
fio_tls_flush(uuid, udata);
return can_copy;
would_block:
errno = EWOULDBLOCK;
return -1;
}
/**
* The `close` callback should close the underlying socket / file descriptor.
*
* If the function returns a non-zero value, it will be called again after an
* attempt to flush the socket and any pending outgoing buffer.
*
* Note: facil.io library functions MUST NEVER be called by any r/w hook, or a
* deadlock might occur.
* */
static ssize_t fio_tls_before_close(intptr_t uuid, void *udata) {
FIO_LOG_DEBUG("The `before_close` callback was called for %p", (void *)uuid);
return 1;
(void)udata;
}
/**
* Called to perform cleanup after the socket was closed.
* */
static void fio_tls_cleanup(void *udata) {
buffer_s *buffer = udata;
/* make sure the ALPN callback was called, just in case cleanup is required */
if (!buffer->alpn_ok) {
alpn_select(alpn_default(buffer->tls), -1, NULL /* ALPN udata */);
}
fio_tls_destroy(buffer->tls); /* manage reference count */
fio_free(udata);
}
static fio_rw_hook_s FIO_TLS_HOOKS = {
.read = fio_tls_read,
.write = fio_tls_write,
.before_close = fio_tls_before_close,
.flush = fio_tls_flush,
.cleanup = fio_tls_cleanup,
};
static size_t fio_tls_handshake(intptr_t uuid, void *udata) {
/*TODO: test for handshake completion */
if (0 /*handshake didn't complete */)
return 0;
if (fio_rw_hook_replace_unsafe(uuid, &FIO_TLS_HOOKS, udata) == 0) {
FIO_LOG_DEBUG("Completed TLS handshake for %p", (void *)uuid);
/*
* make sure the connection is re-added to the reactor...
* in case, while waiting for ALPN, it was suspended for missing a protocol.
*/
fio_force_event(uuid, FIO_EVENT_ON_DATA);
} else {
FIO_LOG_DEBUG("Something went wrong during TLS handshake for %p",
(void *)uuid);
}
return 1;
}
static ssize_t fio_tls_read4handshake(intptr_t uuid, void *udata, void *buf,
size_t count) {
FIO_LOG_DEBUG("TLS handshake from read %p", (void *)uuid);
if (fio_tls_handshake(uuid, udata))
return fio_tls_read(uuid, udata, buf, count);
errno = EWOULDBLOCK;
return -1;
}
static ssize_t fio_tls_write4handshake(intptr_t uuid, void *udata,
const void *buf, size_t count) {
FIO_LOG_DEBUG("TLS handshake from write %p", (void *)uuid);
if (fio_tls_handshake(uuid, udata))
return fio_tls_write(uuid, udata, buf, count);
errno = EWOULDBLOCK;
return -1;
}
static ssize_t fio_tls_flush4handshake(intptr_t uuid, void *udata) {
FIO_LOG_DEBUG("TLS handshake from flush %p", (void *)uuid);
if (fio_tls_handshake(uuid, udata))
return fio_tls_flush(uuid, udata);
/* TODO: return a positive value only if handshake requires a write */
return 1;
}
static fio_rw_hook_s FIO_TLS_HANDSHAKE_HOOKS = {
.read = fio_tls_read4handshake,
.write = fio_tls_write4handshake,
.before_close = fio_tls_before_close,
.flush = fio_tls_flush4handshake,
.cleanup = fio_tls_cleanup,
};
static inline void fio_tls_attach2uuid(intptr_t uuid, fio_tls_s *tls,
void *udata, uint8_t is_server) {
fio_atomic_add(&tls->ref, 1); /* manage reference count */
/* TODO: this is only an example implementation - fix for specific library */
if (is_server) {
/* Server mode (accept) */
FIO_LOG_DEBUG("Attaching TLS read/write hook for %p (server mode).",
(void *)uuid);
} else {
/* Client mode (connect) */
FIO_LOG_DEBUG("Attaching TLS read/write hook for %p (client mode).",
(void *)uuid);
}
/* common implementation (TODO) */
buffer_s *connection_data = fio_malloc(sizeof(*connection_data));
FIO_ASSERT_ALLOC(connection_data);
fio_rw_hook_set(uuid, &FIO_TLS_HANDSHAKE_HOOKS,
connection_data); /* 32Kb buffer */
alpn_select(alpn_default(tls), uuid, udata);
connection_data->alpn_ok = 1;
}
/* *****************************************************************************
SSL/TLS API implementation - this can be pretty much used as is...
***************************************************************************** */
/**
* Creates a new SSL/TLS context / settings object with a default certificate
* (if any).
*/
fio_tls_s *FIO_TLS_WEAK fio_tls_new(const char *server_name, const char *cert,
const char *key, const char *pk_password) {
REQUIRE_LIBRARY();
fio_tls_s *tls = calloc(sizeof(*tls), 1);
tls->ref = 1;
fio_tls_cert_add(tls, server_name, key, cert, pk_password);
return tls;
}
/**
* Adds a certificate a new SSL/TLS context / settings object.
*/
void FIO_TLS_WEAK fio_tls_cert_add(fio_tls_s *tls, const char *server_name,
const char *cert, const char *key,
const char *pk_password) {
REQUIRE_LIBRARY();
cert_s c = {
.private_key = FIO_STR_INIT,
.public_key = FIO_STR_INIT,
.password = FIO_STR_INIT_STATIC2(pk_password,
(pk_password ? strlen(pk_password) : 0)),
};
if (key && cert) {
if (fio_str_readfile(&c.private_key, key, 0, 0).data == NULL)
goto file_missing;
if (fio_str_readfile(&c.public_key, cert, 0, 0).data == NULL)
goto file_missing;
cert_ary_push(&tls->sni, c);
} else if (server_name) {
/* Self-Signed TLS Certificates */
c.private_key = FIO_STR_INIT_STATIC(server_name);
cert_ary_push(&tls->sni, c);
}
fio_tls_cert_destroy(&c);
fio_tls_build_context(tls);
return;
file_missing:
FIO_LOG_FATAL("TLS certificate file missing for either %s or %s or both.",
key, cert);
exit(-1);
}
/**
* Adds an ALPN protocol callback to the SSL/TLS context.
*
* The first protocol added will act as the default protocol to be selected.
*
* The callback should accept the `uuid`, the user data pointer passed to either
* `fio_tls_accept` or `fio_tls_connect` (here: `udata_connetcion`) and the user
* data pointer passed to the `fio_tls_alpn_add` function (`udata_tls`).
*
* The `on_cleanup` callback will be called when the TLS object is destroyed (or
* `fio_tls_alpn_add` is called again with the same protocol name). The
* `udata_tls` argumrnt will be passed along, as is, to the callback (if set).
*
* Except for the `tls` and `protocol_name` arguments, all arguments can be
* NULL.
*/
void FIO_TLS_WEAK fio_tls_alpn_add(
fio_tls_s *tls, const char *protocol_name,
void (*on_selected)(intptr_t uuid, void *udata_connection, void *udata_tls),
void *udata_tls, void (*on_cleanup)(void *udata_tls)) {
REQUIRE_LIBRARY();
alpn_add(tls, protocol_name, on_selected, udata_tls, on_cleanup);
fio_tls_build_context(tls);
}
/**
* Returns the number of registered ALPN protocol names.
*
* This could be used when deciding if protocol selection should be delegated to
* the ALPN mechanism, or whether a protocol should be immediately assigned.
*
* If no ALPN protocols are registered, zero (0) is returned.
*/
uintptr_t FIO_TLS_WEAK fio_tls_alpn_count(fio_tls_s *tls) {
return tls ? alpn_list_count(&tls->alpn) : 0;
}
/**
* Adds a certificate to the "trust" list, which automatically adds a peer
* verification requirement.
*
* fio_tls_trust(tls, "google-ca.pem" );
*/
void FIO_TLS_WEAK fio_tls_trust(fio_tls_s *tls, const char *public_cert_file) {
REQUIRE_LIBRARY();
trust_s c = {
.pem = FIO_STR_INIT,
};
if (!public_cert_file)
return;
if (fio_str_readfile(&c.pem, public_cert_file, 0, 0).data == NULL)
goto file_missing;
trust_ary_push(&tls->trust, c);
fio_tls_trust_destroy(&c);
fio_tls_build_context(tls);
return;
file_missing:
FIO_LOG_FATAL("TLS certificate file missing for %s ", public_cert_file);
exit(-1);
}
/**
* Establishes an SSL/TLS connection as an SSL/TLS Server, using the specified
* context / settings object.
*
* The `uuid` should be a socket UUID that is already connected to a peer (i.e.,
* the result of `fio_accept`).
*
* The `udata` is an opaque user data pointer that is passed along to the
* protocol selected (if any protocols were added using `fio_tls_alpn_add`).
*/
void FIO_TLS_WEAK fio_tls_accept(intptr_t uuid, fio_tls_s *tls, void *udata) {
REQUIRE_LIBRARY();
fio_tls_attach2uuid(uuid, tls, udata, 1);
}
/**
* Establishes an SSL/TLS connection as an SSL/TLS Client, using the specified
* context / settings object.
*
* The `uuid` should be a socket UUID that is already connected to a peer (i.e.,
* one received by a `fio_connect` specified callback `on_connect`).
*
* The `udata` is an opaque user data pointer that is passed along to the
* protocol selected (if any protocols were added using `fio_tls_alpn_add`).
*/
void FIO_TLS_WEAK fio_tls_connect(intptr_t uuid, fio_tls_s *tls, void *udata) {
REQUIRE_LIBRARY();
fio_tls_attach2uuid(uuid, tls, udata, 0);
}
/**
* Increase the reference count for the TLS object.
*
* Decrease with `fio_tls_destroy`.
*/
void FIO_TLS_WEAK fio_tls_dup(fio_tls_s *tls) { fio_atomic_add(&tls->ref, 1); }
/**
* Destroys the SSL/TLS context / settings object and frees any related
* resources / memory.
*/
void FIO_TLS_WEAK fio_tls_destroy(fio_tls_s *tls) {
if (!tls)
return;
REQUIRE_LIBRARY();
if (fio_atomic_sub(&tls->ref, 1))
return;
fio_tls_destroy_context(tls);
alpn_list_free(&tls->alpn);
cert_ary_free(&tls->sni);
trust_ary_free(&tls->trust);
free(tls);
}
#endif /* Library compiler flags */
C
1
https://gitee.com/vmlz/facil.io.git
git@gitee.com:vmlz/facil.io.git
vmlz
facil.io
facil.io
master

搜索帮助