Mirror of BoringSSL (grpc依赖)
https://boringssl.googlesource.com/boringssl
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
265 lines
6.4 KiB
265 lines
6.4 KiB
/* Copyright (c) 2014, Google Inc. |
|
* |
|
* Permission to use, copy, modify, and/or distribute this software for any |
|
* purpose with or without fee is hereby granted, provided that the above |
|
* copyright notice and this permission notice appear in all copies. |
|
* |
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY |
|
* SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION |
|
* OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN |
|
* CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ |
|
|
|
#include "packeted_bio.h" |
|
|
|
#include <assert.h> |
|
#include <limits.h> |
|
#include <stdio.h> |
|
#include <string.h> |
|
|
|
#include <openssl/mem.h> |
|
|
|
#include "../../crypto/internal.h" |
|
|
|
|
|
namespace { |
|
|
|
extern const BIO_METHOD g_packeted_bio_method; |
|
|
|
const uint8_t kOpcodePacket = 'P'; |
|
const uint8_t kOpcodeTimeout = 'T'; |
|
const uint8_t kOpcodeTimeoutAck = 't'; |
|
|
|
struct PacketedBio { |
|
explicit PacketedBio(timeval *clock_arg) |
|
: clock(clock_arg) { |
|
OPENSSL_memset(&timeout, 0, sizeof(timeout)); |
|
} |
|
|
|
bool HasTimeout() const { |
|
return timeout.tv_sec != 0 || timeout.tv_usec != 0; |
|
} |
|
|
|
timeval timeout; |
|
timeval *clock; |
|
}; |
|
|
|
PacketedBio *GetData(BIO *bio) { |
|
if (bio->method != &g_packeted_bio_method) { |
|
return NULL; |
|
} |
|
return (PacketedBio *)bio->ptr; |
|
} |
|
|
|
// ReadAll reads |len| bytes from |bio| into |out|. It returns 1 on success and |
|
// 0 or -1 on error. |
|
static int ReadAll(BIO *bio, uint8_t *out, size_t len) { |
|
while (len > 0) { |
|
int chunk_len = INT_MAX; |
|
if (len <= INT_MAX) { |
|
chunk_len = (int)len; |
|
} |
|
int ret = BIO_read(bio, out, chunk_len); |
|
if (ret <= 0) { |
|
return ret; |
|
} |
|
out += ret; |
|
len -= ret; |
|
} |
|
return 1; |
|
} |
|
|
|
static int PacketedWrite(BIO *bio, const char *in, int inl) { |
|
if (bio->next_bio == NULL) { |
|
return 0; |
|
} |
|
|
|
BIO_clear_retry_flags(bio); |
|
|
|
// Write the header. |
|
uint8_t header[5]; |
|
header[0] = kOpcodePacket; |
|
header[1] = (inl >> 24) & 0xff; |
|
header[2] = (inl >> 16) & 0xff; |
|
header[3] = (inl >> 8) & 0xff; |
|
header[4] = inl & 0xff; |
|
int ret = BIO_write(bio->next_bio, header, sizeof(header)); |
|
if (ret <= 0) { |
|
BIO_copy_next_retry(bio); |
|
return ret; |
|
} |
|
|
|
// Write the buffer. |
|
ret = BIO_write(bio->next_bio, in, inl); |
|
if (ret < 0 || (inl > 0 && ret == 0)) { |
|
BIO_copy_next_retry(bio); |
|
return ret; |
|
} |
|
assert(ret == inl); |
|
return ret; |
|
} |
|
|
|
static int PacketedRead(BIO *bio, char *out, int outl) { |
|
PacketedBio *data = GetData(bio); |
|
if (bio->next_bio == NULL) { |
|
return 0; |
|
} |
|
|
|
BIO_clear_retry_flags(bio); |
|
|
|
// Read the opcode. |
|
uint8_t opcode; |
|
int ret = ReadAll(bio->next_bio, &opcode, sizeof(opcode)); |
|
if (ret <= 0) { |
|
BIO_copy_next_retry(bio); |
|
return ret; |
|
} |
|
|
|
if (opcode == kOpcodeTimeout) { |
|
// The caller is required to advance any pending timeouts before continuing. |
|
if (data->HasTimeout()) { |
|
fprintf(stderr, "Unprocessed timeout!\n"); |
|
return -1; |
|
} |
|
|
|
// Process the timeout. |
|
uint8_t buf[8]; |
|
ret = ReadAll(bio->next_bio, buf, sizeof(buf)); |
|
if (ret <= 0) { |
|
BIO_copy_next_retry(bio); |
|
return ret; |
|
} |
|
uint64_t timeout = (static_cast<uint64_t>(buf[0]) << 56) | |
|
(static_cast<uint64_t>(buf[1]) << 48) | |
|
(static_cast<uint64_t>(buf[2]) << 40) | |
|
(static_cast<uint64_t>(buf[3]) << 32) | |
|
(static_cast<uint64_t>(buf[4]) << 24) | |
|
(static_cast<uint64_t>(buf[5]) << 16) | |
|
(static_cast<uint64_t>(buf[6]) << 8) | |
|
static_cast<uint64_t>(buf[7]); |
|
timeout /= 1000; // Convert nanoseconds to microseconds. |
|
|
|
data->timeout.tv_usec = timeout % 1000000; |
|
data->timeout.tv_sec = timeout / 1000000; |
|
|
|
// Send an ACK to the peer. |
|
ret = BIO_write(bio->next_bio, &kOpcodeTimeoutAck, 1); |
|
if (ret <= 0) { |
|
return ret; |
|
} |
|
assert(ret == 1); |
|
|
|
// Signal to the caller to retry the read, after advancing the clock. |
|
BIO_set_retry_read(bio); |
|
return -1; |
|
} |
|
|
|
if (opcode != kOpcodePacket) { |
|
fprintf(stderr, "Unknown opcode, %u\n", opcode); |
|
return -1; |
|
} |
|
|
|
// Read the length prefix. |
|
uint8_t len_bytes[4]; |
|
ret = ReadAll(bio->next_bio, len_bytes, sizeof(len_bytes)); |
|
if (ret <= 0) { |
|
BIO_copy_next_retry(bio); |
|
return ret; |
|
} |
|
|
|
uint32_t len = (len_bytes[0] << 24) | (len_bytes[1] << 16) | |
|
(len_bytes[2] << 8) | len_bytes[3]; |
|
uint8_t *buf = (uint8_t *)OPENSSL_malloc(len); |
|
if (buf == NULL) { |
|
return -1; |
|
} |
|
ret = ReadAll(bio->next_bio, buf, len); |
|
if (ret <= 0) { |
|
fprintf(stderr, "Packeted BIO was truncated\n"); |
|
return -1; |
|
} |
|
|
|
if (outl > (int)len) { |
|
outl = len; |
|
} |
|
OPENSSL_memcpy(out, buf, outl); |
|
OPENSSL_free(buf); |
|
return outl; |
|
} |
|
|
|
static long PacketedCtrl(BIO *bio, int cmd, long num, void *ptr) { |
|
if (bio->next_bio == NULL) { |
|
return 0; |
|
} |
|
|
|
BIO_clear_retry_flags(bio); |
|
long ret = BIO_ctrl(bio->next_bio, cmd, num, ptr); |
|
BIO_copy_next_retry(bio); |
|
return ret; |
|
} |
|
|
|
static int PacketedNew(BIO *bio) { |
|
bio->init = 1; |
|
return 1; |
|
} |
|
|
|
static int PacketedFree(BIO *bio) { |
|
if (bio == NULL) { |
|
return 0; |
|
} |
|
|
|
delete GetData(bio); |
|
bio->init = 0; |
|
return 1; |
|
} |
|
|
|
static long PacketedCallbackCtrl(BIO *bio, int cmd, bio_info_cb fp) { |
|
if (bio->next_bio == NULL) { |
|
return 0; |
|
} |
|
return BIO_callback_ctrl(bio->next_bio, cmd, fp); |
|
} |
|
|
|
const BIO_METHOD g_packeted_bio_method = { |
|
BIO_TYPE_FILTER, |
|
"packeted bio", |
|
PacketedWrite, |
|
PacketedRead, |
|
NULL /* puts */, |
|
NULL /* gets */, |
|
PacketedCtrl, |
|
PacketedNew, |
|
PacketedFree, |
|
PacketedCallbackCtrl, |
|
}; |
|
|
|
} // namespace |
|
|
|
bssl::UniquePtr<BIO> PacketedBioCreate(timeval *clock) { |
|
bssl::UniquePtr<BIO> bio(BIO_new(&g_packeted_bio_method)); |
|
if (!bio) { |
|
return nullptr; |
|
} |
|
bio->ptr = new PacketedBio(clock); |
|
return bio; |
|
} |
|
|
|
bool PacketedBioAdvanceClock(BIO *bio) { |
|
PacketedBio *data = GetData(bio); |
|
if (data == nullptr) { |
|
return false; |
|
} |
|
|
|
if (!data->HasTimeout()) { |
|
return false; |
|
} |
|
|
|
data->clock->tv_usec += data->timeout.tv_usec; |
|
data->clock->tv_sec += data->clock->tv_usec / 1000000; |
|
data->clock->tv_usec %= 1000000; |
|
data->clock->tv_sec += data->timeout.tv_sec; |
|
OPENSSL_memset(&data->timeout, 0, sizeof(data->timeout)); |
|
return true; |
|
}
|
|
|