1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
|
// **********************************************************************
//
// Copyright (c) 2001
// MutableRealms, Inc.
// Huntsville, AL, USA
//
// All Rights Reserved
//
// **********************************************************************
#ifndef ICE_SSL_CONNECTION_OPENSSL_H
#define ICE_SSL_CONNECTION_OPENSSL_H
#include <openssl/ssl.h>
#include <IceUtil/Mutex.h>
#include <Ice/SslConnection.h>
#include <Ice/SslSystem.h>
namespace IceSecurity
{
namespace Ssl
{
namespace OpenSSL
{
using namespace Ice;
class SafeFlag
{
public:
SafeFlag(bool flagVal = false)
{
_flag = flagVal;
}
~SafeFlag()
{
}
bool checkAndSet()
{
::IceUtil::Mutex::Lock sync(_mutex);
if (_flag)
{
return false;
}
else
{
_flag = true;
return true;
}
}
bool check()
{
::IceUtil::Mutex::Lock sync(_mutex);
return _flag;
}
void set()
{
::IceUtil::Mutex::Lock sync(_mutex);
_flag = true;
}
void unset()
{
::IceUtil::Mutex::Lock sync(_mutex);
_flag = false;
}
private:
::IceUtil::Mutex _mutex;
bool _flag;
};
class HandshakeSentinel
{
public:
HandshakeSentinel(SafeFlag& handshakeFlag) :
_flag(handshakeFlag)
{
_ownHandshake = _flag.checkAndSet();
}
~HandshakeSentinel()
{
if (_ownHandshake)
{
_flag.unset();
}
}
bool ownHandshake()
{
return _ownHandshake;
}
private:
bool _ownHandshake;
SafeFlag& _flag;
};
class Connection : public IceSecurity::Ssl::Connection
{
public:
Connection(SSL*, string&);
virtual ~Connection();
virtual void shutdown();
virtual int read(Buffer&, int) = 0;
virtual int write(Buffer&, int) = 0;
virtual int init(int timeout = 0) = 0;
void setTrace(TraceLevelsPtr traceLevels) { _traceLevels = traceLevels; };
void setLogger(LoggerPtr traceLevels) { _logger = traceLevels; };
void setHandshakeReadTimeout(int timeout) { _handshakeReadTimeout = timeout; };
protected:
int connect();
int accept();
int renegotiate();
int initialize(int timeout);
inline int pending() { return SSL_pending(_sslConnection); };
inline int getLastError() const { return SSL_get_error(_sslConnection, _lastError); };
int sslRead(char*, int);
int sslWrite(char*, int);
void printGetError(int);
void protocolWrite();
int readInBuffer(Buffer&);
int readSelect(int);
int writeSelect(int);
int readSSL(Buffer&, int);
// Retrieves errors from the OpenSSL library.
string sslGetErrors();
virtual void showConnectionInfo() = 0;
void showCertificateChain(BIO*);
void showPeerCertificate(BIO*, const char*);
void showSharedCiphers(BIO*);
void showSessionInfo(BIO*);
void showSelectedCipherInfo(BIO*);
void showHandshakeStats(BIO*);
void showClientCAList(BIO*, const char*);
void setLastError(int errorCode) { _lastError = errorCode; };
// Pointer to the OpenSSL Connection structure.
SSL* _sslConnection;
int _lastError;
// TODO: Review this after a healthy stint of testing
// Buffer for application data that may be returned during handshake
// (probably won't contain anything, may be removed later).
Buffer _inBuffer;
::IceUtil::Mutex _inBufferMutex;
::IceUtil::Mutex _handshakeWaitMutex;
TraceLevelsPtr _traceLevels;
LoggerPtr _logger;
System* _system;
SafeFlag _handshakeFlag;
int _initWantRead;
int _initWantWrite;
bool _timeoutEncountered;
int _handshakeReadTimeout;
int _readTimeout;
};
}
}
}
#endif
|