summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorjsing <>2015-02-07 09:50:09 +0000
committerjsing <>2015-02-07 09:50:09 +0000
commitff826d3cb94a579275eb6e97b3cf80ca69016d4b (patch)
tree91db1503e055d43a30b1aa24f0307097e2bfb2ed
parentfa55b09a9d68c9b8034bc1953d02a2baf74096e1 (diff)
downloadopenbsd-ff826d3cb94a579275eb6e97b3cf80ca69016d4b.tar.gz
openbsd-ff826d3cb94a579275eb6e97b3cf80ca69016d4b.tar.bz2
openbsd-ff826d3cb94a579275eb6e97b3cf80ca69016d4b.zip
Convert tls_connect_fds() and tls_accept_socket() to the new OpenSSL error
dance handling code. This means that we get slightly useful messages when a TLS connection or accept fails. Requested by reyk@
-rw-r--r--src/lib/libtls/tls.c4
-rw-r--r--src/lib/libtls/tls_client.c18
-rw-r--r--src/lib/libtls/tls_internal.h3
-rw-r--r--src/lib/libtls/tls_server.c17
4 files changed, 16 insertions, 26 deletions
diff --git a/src/lib/libtls/tls.c b/src/lib/libtls/tls.c
index 696c35b459..9fc81b5a64 100644
--- a/src/lib/libtls/tls.c
+++ b/src/lib/libtls/tls.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls.c,v 1.6 2015/02/07 04:33:51 jsing Exp $ */ 1/* $OpenBSD: tls.c,v 1.7 2015/02/07 09:50:09 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2014 Joel Sing <jsing@openbsd.org>
4 * 4 *
@@ -236,7 +236,7 @@ tls_reset(struct tls *ctx)
236 ctx->errmsg = NULL; 236 ctx->errmsg = NULL;
237} 237}
238 238
239static int 239int
240tls_ssl_error(struct tls *ctx, int ssl_ret, const char *prefix) 240tls_ssl_error(struct tls *ctx, int ssl_ret, const char *prefix)
241{ 241{
242 const char *errstr = "unknown error"; 242 const char *errstr = "unknown error";
diff --git a/src/lib/libtls/tls_client.c b/src/lib/libtls/tls_client.c
index d9354c3140..85733cdd5e 100644
--- a/src/lib/libtls/tls_client.c
+++ b/src/lib/libtls/tls_client.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls_client.c,v 1.10 2015/01/30 14:25:37 bluhm Exp $ */ 1/* $OpenBSD: tls_client.c,v 1.11 2015/02/07 09:50:09 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2014 Joel Sing <jsing@openbsd.org>
4 * 4 *
@@ -136,7 +136,7 @@ tls_connect_fds(struct tls *ctx, int fd_read, int fd_write,
136{ 136{
137 union { struct in_addr ip4; struct in6_addr ip6; } addrbuf; 137 union { struct in_addr ip4; struct in6_addr ip6; } addrbuf;
138 X509 *cert = NULL; 138 X509 *cert = NULL;
139 int ret, ssl_err; 139 int ret, err;
140 140
141 if (ctx->flags & TLS_CONNECTING) 141 if (ctx->flags & TLS_CONNECTING)
142 goto connecting; 142 goto connecting;
@@ -216,18 +216,12 @@ tls_connect_fds(struct tls *ctx, int fd_read, int fd_write,
216 216
217 connecting: 217 connecting:
218 if ((ret = SSL_connect(ctx->ssl_conn)) != 1) { 218 if ((ret = SSL_connect(ctx->ssl_conn)) != 1) {
219 ssl_err = SSL_get_error(ctx->ssl_conn, ret); 219 err = tls_ssl_error(ctx, ret, "connect");
220 switch (ssl_err) { 220 if (err == TLS_READ_AGAIN || err == TLS_WRITE_AGAIN) {
221 case SSL_ERROR_WANT_READ:
222 ctx->flags |= TLS_CONNECTING; 221 ctx->flags |= TLS_CONNECTING;
223 return (TLS_READ_AGAIN); 222 return (err);
224 case SSL_ERROR_WANT_WRITE:
225 ctx->flags |= TLS_CONNECTING;
226 return (TLS_WRITE_AGAIN);
227 default:
228 tls_set_error(ctx, "TLS connect failed (%i)", ssl_err);
229 goto err;
230 } 223 }
224 goto err;
231 } 225 }
232 ctx->flags &= ~TLS_CONNECTING; 226 ctx->flags &= ~TLS_CONNECTING;
233 227
diff --git a/src/lib/libtls/tls_internal.h b/src/lib/libtls/tls_internal.h
index 18fcf539c3..f0feddcf5b 100644
--- a/src/lib/libtls/tls_internal.h
+++ b/src/lib/libtls/tls_internal.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls_internal.h,v 1.8 2015/02/07 06:19:26 jsing Exp $ */ 1/* $OpenBSD: tls_internal.h,v 1.9 2015/02/07 09:50:09 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2014 Jeremie Courreges-Anglas <jca@openbsd.org> 3 * Copyright (c) 2014 Jeremie Courreges-Anglas <jca@openbsd.org>
4 * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> 4 * Copyright (c) 2014 Joel Sing <jsing@openbsd.org>
@@ -74,5 +74,6 @@ int tls_host_port(const char *hostport, char **host, char **port);
74int tls_set_error(struct tls *ctx, char *fmt, ...) 74int tls_set_error(struct tls *ctx, char *fmt, ...)
75 __attribute__((__format__ (printf, 2, 3))) 75 __attribute__((__format__ (printf, 2, 3)))
76 __attribute__((__nonnull__ (2))); 76 __attribute__((__nonnull__ (2)));
77int tls_ssl_error(struct tls *ctx, int ssl_ret, const char *prefix);
77 78
78#endif /* HEADER_TLS_INTERNAL_H */ 79#endif /* HEADER_TLS_INTERNAL_H */
diff --git a/src/lib/libtls/tls_server.c b/src/lib/libtls/tls_server.c
index 8d71d2790f..8f34ecdded 100644
--- a/src/lib/libtls/tls_server.c
+++ b/src/lib/libtls/tls_server.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls_server.c,v 1.4 2015/02/07 06:19:26 jsing Exp $ */ 1/* $OpenBSD: tls_server.c,v 1.5 2015/02/07 09:50:09 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2014 Joel Sing <jsing@openbsd.org>
4 * 4 *
@@ -102,7 +102,7 @@ int
102tls_accept_socket(struct tls *ctx, struct tls **cctx, int socket) 102tls_accept_socket(struct tls *ctx, struct tls **cctx, int socket)
103{ 103{
104 struct tls *conn_ctx = *cctx; 104 struct tls *conn_ctx = *cctx;
105 int ret, ssl_err; 105 int ret, err;
106 106
107 if ((ctx->flags & TLS_SERVER) == 0) { 107 if ((ctx->flags & TLS_SERVER) == 0) {
108 tls_set_error(ctx, "not a server context"); 108 tls_set_error(ctx, "not a server context");
@@ -131,16 +131,11 @@ tls_accept_socket(struct tls *ctx, struct tls **cctx, int socket)
131 } 131 }
132 132
133 if ((ret = SSL_accept(conn_ctx->ssl_conn)) != 1) { 133 if ((ret = SSL_accept(conn_ctx->ssl_conn)) != 1) {
134 ssl_err = SSL_get_error(conn_ctx->ssl_conn, ret); 134 err = tls_ssl_error(conn_ctx, ret, "accept");
135 switch (ssl_err) { 135 if (err == TLS_READ_AGAIN || err == TLS_WRITE_AGAIN) {
136 case SSL_ERROR_WANT_READ: 136 return (err);
137 return (TLS_READ_AGAIN);
138 case SSL_ERROR_WANT_WRITE:
139 return (TLS_WRITE_AGAIN);
140 default:
141 tls_set_error(ctx, "TLS accept failed (%i)", ssl_err);
142 goto err;
143 } 137 }
138 goto err;
144 } 139 }
145 140
146 return (0); 141 return (0);