diff options
Diffstat (limited to 'src/lib/libssl/src/demos/tunala/tunala.c')
| -rw-r--r-- | src/lib/libssl/src/demos/tunala/tunala.c | 1109 | 
1 files changed, 0 insertions, 1109 deletions
| diff --git a/src/lib/libssl/src/demos/tunala/tunala.c b/src/lib/libssl/src/demos/tunala/tunala.c deleted file mode 100644 index ec49d3e943..0000000000 --- a/src/lib/libssl/src/demos/tunala/tunala.c +++ /dev/null | |||
| @@ -1,1109 +0,0 @@ | |||
| 1 | #if defined(NO_BUFFER) || defined(NO_IP) || defined(NO_OPENSSL) | ||
| 2 | #error "Badness, NO_BUFFER, NO_IP or NO_OPENSSL is defined, turn them *off*" | ||
| 3 | #endif | ||
| 4 | |||
| 5 | /* Include our bits'n'pieces */ | ||
| 6 | #include "tunala.h" | ||
| 7 | |||
| 8 | |||
| 9 | /********************************************/ | ||
| 10 | /* Our local types that specify our "world" */ | ||
| 11 | /********************************************/ | ||
| 12 | |||
| 13 | /* These represent running "tunnels". Eg. if you wanted to do SSL in a | ||
| 14 | * "message-passing" scanario, the "int" file-descriptors might be replaced by | ||
| 15 | * thread or process IDs, and the "select" code might be replaced by message | ||
| 16 | * handling code. Whatever. */ | ||
| 17 | typedef struct _tunala_item_t { | ||
| 18 | /* The underlying SSL state machine. This is a data-only processing unit | ||
| 19 | * and we communicate with it by talking to its four "buffers". */ | ||
| 20 | state_machine_t sm; | ||
| 21 | /* The file-descriptors for the "dirty" (encrypted) side of the SSL | ||
| 22 | * setup. In actuality, this is typically a socket and both values are | ||
| 23 | * identical. */ | ||
| 24 | int dirty_read, dirty_send; | ||
| 25 | /* The file-descriptors for the "clean" (unencrypted) side of the SSL | ||
| 26 | * setup. These could be stdin/stdout, a socket (both values the same), | ||
| 27 | * or whatever you like. */ | ||
| 28 | int clean_read, clean_send; | ||
| 29 | } tunala_item_t; | ||
| 30 | |||
| 31 | /* This structure is used as the data for running the main loop. Namely, in a | ||
| 32 | * network format such as this, it is stuff for select() - but as pointed out, | ||
| 33 | * when moving the real-world to somewhere else, this might be replaced by | ||
| 34 | * something entirely different. It's basically the stuff that controls when | ||
| 35 | * it's time to do some "work". */ | ||
| 36 | typedef struct _select_sets_t { | ||
| 37 | int max; /* As required as the first argument to select() */ | ||
| 38 | fd_set reads, sends, excepts; /* As passed to select() */ | ||
| 39 | } select_sets_t; | ||
| 40 | typedef struct _tunala_selector_t { | ||
| 41 | select_sets_t last_selected; /* Results of the last select() */ | ||
| 42 | select_sets_t next_select; /* What we'll next select on */ | ||
| 43 | } tunala_selector_t; | ||
| 44 | |||
| 45 | /* This structure is *everything*. We do it to avoid the use of globals so that, | ||
| 46 | * for example, it would be easier to shift things around between async-IO, | ||
| 47 | * thread-based, or multi-fork()ed (or combinations thereof). */ | ||
| 48 | typedef struct _tunala_world_t { | ||
| 49 | /* The file-descriptor we "listen" on for new connections */ | ||
| 50 | int listen_fd; | ||
| 51 | /* The array of tunnels */ | ||
| 52 | tunala_item_t *tunnels; | ||
| 53 | /* the number of tunnels in use and allocated, respectively */ | ||
| 54 | unsigned int tunnels_used, tunnels_size; | ||
| 55 | /* Our outside "loop" context stuff */ | ||
| 56 | tunala_selector_t selector; | ||
| 57 | /* Our SSL_CTX, which is configured as the SSL client or server and has | ||
| 58 | * the various cert-settings and callbacks configured. */ | ||
| 59 | SSL_CTX *ssl_ctx; | ||
| 60 | /* Simple flag with complex logic :-) Indicates whether we're an SSL | ||
| 61 | * server or an SSL client. */ | ||
| 62 | int server_mode; | ||
| 63 | } tunala_world_t; | ||
| 64 | |||
| 65 | /*****************************/ | ||
| 66 | /* Internal static functions */ | ||
| 67 | /*****************************/ | ||
| 68 | |||
| 69 | static SSL_CTX *initialise_ssl_ctx(int server_mode, const char *engine_id, | ||
| 70 | const char *CAfile, const char *cert, const char *key, | ||
| 71 | const char *dcert, const char *dkey, const char *cipher_list, | ||
| 72 | const char *dh_file, const char *dh_special, int tmp_rsa, | ||
| 73 | int ctx_options, int out_state, int out_verify, int verify_mode, | ||
| 74 | unsigned int verify_depth); | ||
| 75 | static void selector_init(tunala_selector_t *selector); | ||
| 76 | static void selector_add_listener(tunala_selector_t *selector, int fd); | ||
| 77 | static void selector_add_tunala(tunala_selector_t *selector, tunala_item_t *t); | ||
| 78 | static int selector_select(tunala_selector_t *selector); | ||
| 79 | /* This returns -1 for error, 0 for no new connections, or 1 for success, in | ||
| 80 | * which case *newfd is populated. */ | ||
| 81 | static int selector_get_listener(tunala_selector_t *selector, int fd, int *newfd); | ||
| 82 | static int tunala_world_new_item(tunala_world_t *world, int fd, | ||
| 83 | const char *ip, unsigned short port, int flipped); | ||
| 84 | static void tunala_world_del_item(tunala_world_t *world, unsigned int idx); | ||
| 85 | static int tunala_item_io(tunala_selector_t *selector, tunala_item_t *item); | ||
| 86 | |||
| 87 | /*********************************************/ | ||
| 88 | /* MAIN FUNCTION (and its utility functions) */ | ||
| 89 | /*********************************************/ | ||
| 90 | |||
| 91 | static const char *def_proxyhost = "127.0.0.1:443"; | ||
| 92 | static const char *def_listenhost = "127.0.0.1:8080"; | ||
| 93 | static int def_max_tunnels = 50; | ||
| 94 | static const char *def_cacert = NULL; | ||
| 95 | static const char *def_cert = NULL; | ||
| 96 | static const char *def_key = NULL; | ||
| 97 | static const char *def_dcert = NULL; | ||
| 98 | static const char *def_dkey = NULL; | ||
| 99 | static const char *def_engine_id = NULL; | ||
| 100 | static int def_server_mode = 0; | ||
| 101 | static int def_flipped = 0; | ||
| 102 | static const char *def_cipher_list = NULL; | ||
| 103 | static const char *def_dh_file = NULL; | ||
| 104 | static const char *def_dh_special = NULL; | ||
| 105 | static int def_tmp_rsa = 1; | ||
| 106 | static int def_ctx_options = 0; | ||
| 107 | static int def_verify_mode = 0; | ||
| 108 | static unsigned int def_verify_depth = 10; | ||
| 109 | static int def_out_state = 0; | ||
| 110 | static unsigned int def_out_verify = 0; | ||
| 111 | static int def_out_totals = 0; | ||
| 112 | static int def_out_conns = 0; | ||
| 113 | |||
| 114 | static const char *helpstring = | ||
| 115 | "\n'Tunala' (A tunneler with a New Zealand accent)\n" | ||
| 116 | "Usage: tunala [options], where options are from;\n" | ||
| 117 | " -listen [host:]<port> (default = 127.0.0.1:8080)\n" | ||
| 118 | " -proxy <host>:<port> (default = 127.0.0.1:443)\n" | ||
| 119 | " -maxtunnels <num> (default = 50)\n" | ||
| 120 | " -cacert <path|NULL> (default = NULL)\n" | ||
| 121 | " -cert <path|NULL> (default = NULL)\n" | ||
| 122 | " -key <path|NULL> (default = whatever '-cert' is)\n" | ||
| 123 | " -dcert <path|NULL> (usually for DSA, default = NULL)\n" | ||
| 124 | " -dkey <path|NULL> (usually for DSA, default = whatever '-dcert' is)\n" | ||
| 125 | " -engine <id|NULL> (default = NULL)\n" | ||
| 126 | " -server <0|1> (default = 0, ie. an SSL client)\n" | ||
| 127 | " -flipped <0|1> (makes SSL servers be network clients, and vice versa)\n" | ||
| 128 | " -cipher <list> (specifies cipher list to use)\n" | ||
| 129 | " -dh_file <path> (a PEM file containing DH parameters to use)\n" | ||
| 130 | " -dh_special <NULL|generate|standard> (see below: def=NULL)\n" | ||
| 131 | " -no_tmp_rsa (don't generate temporary RSA keys)\n" | ||
| 132 | " -no_ssl2 (disable SSLv2)\n" | ||
| 133 | " -no_ssl3 (disable SSLv3)\n" | ||
| 134 | " -no_tls1 (disable TLSv1)\n" | ||
| 135 | " -v_peer (verify the peer certificate)\n" | ||
| 136 | " -v_strict (do not continue if peer doesn't authenticate)\n" | ||
| 137 | " -v_once (no verification in renegotiates)\n" | ||
| 138 | " -v_depth <num> (limit certificate chain depth, default = 10)\n" | ||
| 139 | " -out_conns (prints client connections and disconnections)\n" | ||
| 140 | " -out_state (prints SSL handshake states)\n" | ||
| 141 | " -out_verify <0|1|2|3> (prints certificate verification states: def=1)\n" | ||
| 142 | " -out_totals (prints out byte-totals when a tunnel closes)\n" | ||
| 143 | " -<h|help|?> (displays this help screen)\n" | ||
| 144 | "Notes:\n" | ||
| 145 | "(1) It is recommended to specify a cert+key when operating as an SSL server.\n" | ||
| 146 | " If you only specify '-cert', the same file must contain a matching\n" | ||
| 147 | " private key.\n" | ||
| 148 | "(2) Either dh_file or dh_special can be used to specify where DH parameters\n" | ||
| 149 | " will be obtained from (or '-dh_special NULL' for the default choice) but\n" | ||
| 150 | " you cannot specify both. For dh_special, 'generate' will create new DH\n" | ||
| 151 | " parameters on startup, and 'standard' will use embedded parameters\n" | ||
| 152 | " instead.\n" | ||
| 153 | "(3) Normally an ssl client connects to an ssl server - so that an 'ssl client\n" | ||
| 154 | " tunala' listens for 'clean' client connections and proxies ssl, and an\n" | ||
| 155 | " 'ssl server tunala' listens for ssl connections and proxies 'clean'. With\n" | ||
| 156 | " '-flipped 1', this behaviour is reversed so that an 'ssl server tunala'\n" | ||
| 157 | " listens for clean client connections and proxies ssl (but participating\n" | ||
| 158 | " as an ssl *server* in the SSL/TLS protocol), and an 'ssl client tunala'\n" | ||
| 159 | " listens for ssl connections (participating as an ssl *client* in the\n" | ||
| 160 | " SSL/TLS protocol) and proxies 'clean' to the end destination. This can\n" | ||
| 161 | " be useful for allowing network access to 'servers' where only the server\n" | ||
| 162 | " needs to authenticate the client (ie. the other way is not required).\n" | ||
| 163 | " Even with client and server authentication, this 'technique' mitigates\n" | ||
| 164 | " some DoS (denial-of-service) potential as it will be the network client\n" | ||
| 165 | " having to perform the first private key operation rather than the other\n" | ||
| 166 | " way round.\n" | ||
| 167 | "(4) The 'technique' used by setting '-flipped 1' is probably compatible with\n" | ||
| 168 | " absolutely nothing except another complimentary instance of 'tunala'\n" | ||
| 169 | " running with '-flipped 1'. :-)\n"; | ||
| 170 | |||
| 171 | /* Default DH parameters for use with "-dh_special standard" ... stolen striaght | ||
| 172 | * from s_server. */ | ||
| 173 | static unsigned char dh512_p[]={ | ||
| 174 | 0xDA,0x58,0x3C,0x16,0xD9,0x85,0x22,0x89,0xD0,0xE4,0xAF,0x75, | ||
| 175 | 0x6F,0x4C,0xCA,0x92,0xDD,0x4B,0xE5,0x33,0xB8,0x04,0xFB,0x0F, | ||
| 176 | 0xED,0x94,0xEF,0x9C,0x8A,0x44,0x03,0xED,0x57,0x46,0x50,0xD3, | ||
| 177 | 0x69,0x99,0xDB,0x29,0xD7,0x76,0x27,0x6B,0xA2,0xD3,0xD4,0x12, | ||
| 178 | 0xE2,0x18,0xF4,0xDD,0x1E,0x08,0x4C,0xF6,0xD8,0x00,0x3E,0x7C, | ||
| 179 | 0x47,0x74,0xE8,0x33, | ||
| 180 | }; | ||
| 181 | static unsigned char dh512_g[]={ | ||
| 182 | 0x02, | ||
| 183 | }; | ||
| 184 | |||
| 185 | /* And the function that parses the above "standard" parameters, again, straight | ||
| 186 | * out of s_server. */ | ||
| 187 | static DH *get_dh512(void) | ||
| 188 | { | ||
| 189 | DH *dh=NULL; | ||
| 190 | |||
| 191 | if ((dh=DH_new()) == NULL) return(NULL); | ||
| 192 | dh->p=BN_bin2bn(dh512_p,sizeof(dh512_p),NULL); | ||
| 193 | dh->g=BN_bin2bn(dh512_g,sizeof(dh512_g),NULL); | ||
| 194 | if ((dh->p == NULL) || (dh->g == NULL)) | ||
| 195 | return(NULL); | ||
| 196 | return(dh); | ||
| 197 | } | ||
| 198 | |||
| 199 | /* Various help/error messages used by main() */ | ||
| 200 | static int usage(const char *errstr, int isunknownarg) | ||
| 201 | { | ||
| 202 | if(isunknownarg) | ||
| 203 | fprintf(stderr, "Error: unknown argument '%s'\n", errstr); | ||
| 204 | else | ||
| 205 | fprintf(stderr, "Error: %s\n", errstr); | ||
| 206 | fprintf(stderr, "%s\n", helpstring); | ||
| 207 | return 1; | ||
| 208 | } | ||
| 209 | |||
| 210 | static int err_str0(const char *str0) | ||
| 211 | { | ||
| 212 | fprintf(stderr, "%s\n", str0); | ||
| 213 | return 1; | ||
| 214 | } | ||
| 215 | |||
| 216 | static int err_str1(const char *fmt, const char *str1) | ||
| 217 | { | ||
| 218 | fprintf(stderr, fmt, str1); | ||
| 219 | fprintf(stderr, "\n"); | ||
| 220 | return 1; | ||
| 221 | } | ||
| 222 | |||
| 223 | static int parse_max_tunnels(const char *s, unsigned int *maxtunnels) | ||
| 224 | { | ||
| 225 | unsigned long l; | ||
| 226 | if(!int_strtoul(s, &l) || (l < 1) || (l > 1024)) { | ||
| 227 | fprintf(stderr, "Error, '%s' is an invalid value for " | ||
| 228 | "maxtunnels\n", s); | ||
| 229 | return 0; | ||
| 230 | } | ||
| 231 | *maxtunnels = (unsigned int)l; | ||
| 232 | return 1; | ||
| 233 | } | ||
| 234 | |||
| 235 | static int parse_server_mode(const char *s, int *servermode) | ||
| 236 | { | ||
| 237 | unsigned long l; | ||
| 238 | if(!int_strtoul(s, &l) || (l > 1)) { | ||
| 239 | fprintf(stderr, "Error, '%s' is an invalid value for the " | ||
| 240 | "server mode\n", s); | ||
| 241 | return 0; | ||
| 242 | } | ||
| 243 | *servermode = (int)l; | ||
| 244 | return 1; | ||
| 245 | } | ||
| 246 | |||
| 247 | static int parse_dh_special(const char *s, const char **dh_special) | ||
| 248 | { | ||
| 249 | if((strcmp(s, "NULL") == 0) || (strcmp(s, "generate") == 0) || | ||
| 250 | (strcmp(s, "standard") == 0)) { | ||
| 251 | *dh_special = s; | ||
| 252 | return 1; | ||
| 253 | } | ||
| 254 | fprintf(stderr, "Error, '%s' is an invalid value for 'dh_special'\n", s); | ||
| 255 | return 0; | ||
| 256 | } | ||
| 257 | |||
| 258 | static int parse_verify_level(const char *s, unsigned int *verify_level) | ||
| 259 | { | ||
| 260 | unsigned long l; | ||
| 261 | if(!int_strtoul(s, &l) || (l > 3)) { | ||
| 262 | fprintf(stderr, "Error, '%s' is an invalid value for " | ||
| 263 | "out_verify\n", s); | ||
| 264 | return 0; | ||
| 265 | } | ||
| 266 | *verify_level = (unsigned int)l; | ||
| 267 | return 1; | ||
| 268 | } | ||
| 269 | |||
| 270 | static int parse_verify_depth(const char *s, unsigned int *verify_depth) | ||
| 271 | { | ||
| 272 | unsigned long l; | ||
| 273 | if(!int_strtoul(s, &l) || (l < 1) || (l > 50)) { | ||
| 274 | fprintf(stderr, "Error, '%s' is an invalid value for " | ||
| 275 | "verify_depth\n", s); | ||
| 276 | return 0; | ||
| 277 | } | ||
| 278 | *verify_depth = (unsigned int)l; | ||
| 279 | return 1; | ||
| 280 | } | ||
| 281 | |||
| 282 | /* Some fprintf format strings used when tunnels close */ | ||
| 283 | static const char *io_stats_dirty = | ||
| 284 | " SSL traffic; %8lu bytes in, %8lu bytes out\n"; | ||
| 285 | static const char *io_stats_clean = | ||
| 286 | " clear traffic; %8lu bytes in, %8lu bytes out\n"; | ||
| 287 | |||
| 288 | int main(int argc, char *argv[]) | ||
| 289 | { | ||
| 290 | unsigned int loop; | ||
| 291 | int newfd; | ||
| 292 | tunala_world_t world; | ||
| 293 | tunala_item_t *t_item; | ||
| 294 | const char *proxy_ip; | ||
| 295 | unsigned short proxy_port; | ||
| 296 | /* Overridables */ | ||
| 297 | const char *proxyhost = def_proxyhost; | ||
| 298 | const char *listenhost = def_listenhost; | ||
| 299 | unsigned int max_tunnels = def_max_tunnels; | ||
| 300 | const char *cacert = def_cacert; | ||
| 301 | const char *cert = def_cert; | ||
| 302 | const char *key = def_key; | ||
| 303 | const char *dcert = def_dcert; | ||
| 304 | const char *dkey = def_dkey; | ||
| 305 | const char *engine_id = def_engine_id; | ||
| 306 | int server_mode = def_server_mode; | ||
| 307 | int flipped = def_flipped; | ||
| 308 | const char *cipher_list = def_cipher_list; | ||
| 309 | const char *dh_file = def_dh_file; | ||
| 310 | const char *dh_special = def_dh_special; | ||
| 311 | int tmp_rsa = def_tmp_rsa; | ||
| 312 | int ctx_options = def_ctx_options; | ||
| 313 | int verify_mode = def_verify_mode; | ||
| 314 | unsigned int verify_depth = def_verify_depth; | ||
| 315 | int out_state = def_out_state; | ||
| 316 | unsigned int out_verify = def_out_verify; | ||
| 317 | int out_totals = def_out_totals; | ||
| 318 | int out_conns = def_out_conns; | ||
| 319 | |||
| 320 | /* Parse command-line arguments */ | ||
| 321 | next_arg: | ||
| 322 | argc--; argv++; | ||
| 323 | if(argc > 0) { | ||
| 324 | if(strcmp(*argv, "-listen") == 0) { | ||
| 325 | if(argc < 2) | ||
| 326 | return usage("-listen requires an argument", 0); | ||
| 327 | argc--; argv++; | ||
| 328 | listenhost = *argv; | ||
| 329 | goto next_arg; | ||
| 330 | } else if(strcmp(*argv, "-proxy") == 0) { | ||
| 331 | if(argc < 2) | ||
| 332 | return usage("-proxy requires an argument", 0); | ||
| 333 | argc--; argv++; | ||
| 334 | proxyhost = *argv; | ||
| 335 | goto next_arg; | ||
| 336 | } else if(strcmp(*argv, "-maxtunnels") == 0) { | ||
| 337 | if(argc < 2) | ||
| 338 | return usage("-maxtunnels requires an argument", 0); | ||
| 339 | argc--; argv++; | ||
| 340 | if(!parse_max_tunnels(*argv, &max_tunnels)) | ||
| 341 | return 1; | ||
| 342 | goto next_arg; | ||
| 343 | } else if(strcmp(*argv, "-cacert") == 0) { | ||
| 344 | if(argc < 2) | ||
| 345 | return usage("-cacert requires an argument", 0); | ||
| 346 | argc--; argv++; | ||
| 347 | if(strcmp(*argv, "NULL") == 0) | ||
| 348 | cacert = NULL; | ||
| 349 | else | ||
| 350 | cacert = *argv; | ||
| 351 | goto next_arg; | ||
| 352 | } else if(strcmp(*argv, "-cert") == 0) { | ||
| 353 | if(argc < 2) | ||
| 354 | return usage("-cert requires an argument", 0); | ||
| 355 | argc--; argv++; | ||
| 356 | if(strcmp(*argv, "NULL") == 0) | ||
| 357 | cert = NULL; | ||
| 358 | else | ||
| 359 | cert = *argv; | ||
| 360 | goto next_arg; | ||
| 361 | } else if(strcmp(*argv, "-key") == 0) { | ||
| 362 | if(argc < 2) | ||
| 363 | return usage("-key requires an argument", 0); | ||
| 364 | argc--; argv++; | ||
| 365 | if(strcmp(*argv, "NULL") == 0) | ||
| 366 | key = NULL; | ||
| 367 | else | ||
| 368 | key = *argv; | ||
| 369 | goto next_arg; | ||
| 370 | } else if(strcmp(*argv, "-dcert") == 0) { | ||
| 371 | if(argc < 2) | ||
| 372 | return usage("-dcert requires an argument", 0); | ||
| 373 | argc--; argv++; | ||
| 374 | if(strcmp(*argv, "NULL") == 0) | ||
| 375 | dcert = NULL; | ||
| 376 | else | ||
| 377 | dcert = *argv; | ||
| 378 | goto next_arg; | ||
| 379 | } else if(strcmp(*argv, "-dkey") == 0) { | ||
| 380 | if(argc < 2) | ||
| 381 | return usage("-dkey requires an argument", 0); | ||
| 382 | argc--; argv++; | ||
| 383 | if(strcmp(*argv, "NULL") == 0) | ||
| 384 | dkey = NULL; | ||
| 385 | else | ||
| 386 | dkey = *argv; | ||
| 387 | goto next_arg; | ||
| 388 | } else if(strcmp(*argv, "-engine") == 0) { | ||
| 389 | if(argc < 2) | ||
| 390 | return usage("-engine requires an argument", 0); | ||
| 391 | argc--; argv++; | ||
| 392 | engine_id = *argv; | ||
| 393 | goto next_arg; | ||
| 394 | } else if(strcmp(*argv, "-server") == 0) { | ||
| 395 | if(argc < 2) | ||
| 396 | return usage("-server requires an argument", 0); | ||
| 397 | argc--; argv++; | ||
| 398 | if(!parse_server_mode(*argv, &server_mode)) | ||
| 399 | return 1; | ||
| 400 | goto next_arg; | ||
| 401 | } else if(strcmp(*argv, "-flipped") == 0) { | ||
| 402 | if(argc < 2) | ||
| 403 | return usage("-flipped requires an argument", 0); | ||
| 404 | argc--; argv++; | ||
| 405 | if(!parse_server_mode(*argv, &flipped)) | ||
| 406 | return 1; | ||
| 407 | goto next_arg; | ||
| 408 | } else if(strcmp(*argv, "-cipher") == 0) { | ||
| 409 | if(argc < 2) | ||
| 410 | return usage("-cipher requires an argument", 0); | ||
| 411 | argc--; argv++; | ||
| 412 | cipher_list = *argv; | ||
| 413 | goto next_arg; | ||
| 414 | } else if(strcmp(*argv, "-dh_file") == 0) { | ||
| 415 | if(argc < 2) | ||
| 416 | return usage("-dh_file requires an argument", 0); | ||
| 417 | if(dh_special) | ||
| 418 | return usage("cannot mix -dh_file with " | ||
| 419 | "-dh_special", 0); | ||
| 420 | argc--; argv++; | ||
| 421 | dh_file = *argv; | ||
| 422 | goto next_arg; | ||
| 423 | } else if(strcmp(*argv, "-dh_special") == 0) { | ||
| 424 | if(argc < 2) | ||
| 425 | return usage("-dh_special requires an argument", 0); | ||
| 426 | if(dh_file) | ||
| 427 | return usage("cannot mix -dh_file with " | ||
| 428 | "-dh_special", 0); | ||
| 429 | argc--; argv++; | ||
| 430 | if(!parse_dh_special(*argv, &dh_special)) | ||
| 431 | return 1; | ||
| 432 | goto next_arg; | ||
| 433 | } else if(strcmp(*argv, "-no_tmp_rsa") == 0) { | ||
| 434 | tmp_rsa = 0; | ||
| 435 | goto next_arg; | ||
| 436 | } else if(strcmp(*argv, "-no_ssl2") == 0) { | ||
| 437 | ctx_options |= SSL_OP_NO_SSLv2; | ||
| 438 | goto next_arg; | ||
| 439 | } else if(strcmp(*argv, "-no_ssl3") == 0) { | ||
| 440 | ctx_options |= SSL_OP_NO_SSLv3; | ||
| 441 | goto next_arg; | ||
| 442 | } else if(strcmp(*argv, "-no_tls1") == 0) { | ||
| 443 | ctx_options |= SSL_OP_NO_TLSv1; | ||
| 444 | goto next_arg; | ||
| 445 | } else if(strcmp(*argv, "-v_peer") == 0) { | ||
| 446 | verify_mode |= SSL_VERIFY_PEER; | ||
| 447 | goto next_arg; | ||
| 448 | } else if(strcmp(*argv, "-v_strict") == 0) { | ||
| 449 | verify_mode |= SSL_VERIFY_FAIL_IF_NO_PEER_CERT; | ||
| 450 | goto next_arg; | ||
| 451 | } else if(strcmp(*argv, "-v_once") == 0) { | ||
| 452 | verify_mode |= SSL_VERIFY_CLIENT_ONCE; | ||
| 453 | goto next_arg; | ||
| 454 | } else if(strcmp(*argv, "-v_depth") == 0) { | ||
| 455 | if(argc < 2) | ||
| 456 | return usage("-v_depth requires an argument", 0); | ||
| 457 | argc--; argv++; | ||
| 458 | if(!parse_verify_depth(*argv, &verify_depth)) | ||
| 459 | return 1; | ||
| 460 | goto next_arg; | ||
| 461 | } else if(strcmp(*argv, "-out_state") == 0) { | ||
| 462 | out_state = 1; | ||
| 463 | goto next_arg; | ||
| 464 | } else if(strcmp(*argv, "-out_verify") == 0) { | ||
| 465 | if(argc < 2) | ||
| 466 | return usage("-out_verify requires an argument", 0); | ||
| 467 | argc--; argv++; | ||
| 468 | if(!parse_verify_level(*argv, &out_verify)) | ||
| 469 | return 1; | ||
| 470 | goto next_arg; | ||
| 471 | } else if(strcmp(*argv, "-out_totals") == 0) { | ||
| 472 | out_totals = 1; | ||
| 473 | goto next_arg; | ||
| 474 | } else if(strcmp(*argv, "-out_conns") == 0) { | ||
| 475 | out_conns = 1; | ||
| 476 | goto next_arg; | ||
| 477 | } else if((strcmp(*argv, "-h") == 0) || | ||
| 478 | (strcmp(*argv, "-help") == 0) || | ||
| 479 | (strcmp(*argv, "-?") == 0)) { | ||
| 480 | fprintf(stderr, "%s\n", helpstring); | ||
| 481 | return 0; | ||
| 482 | } else | ||
| 483 | return usage(*argv, 1); | ||
| 484 | } | ||
| 485 | /* Run any sanity checks we want here */ | ||
| 486 | if(!cert && !dcert && server_mode) | ||
| 487 | fprintf(stderr, "WARNING: you are running an SSL server without " | ||
| 488 | "a certificate - this may not work!\n"); | ||
| 489 | |||
| 490 | /* Initialise network stuff */ | ||
| 491 | if(!ip_initialise()) | ||
| 492 | return err_str0("ip_initialise failed"); | ||
| 493 | /* Create the SSL_CTX */ | ||
| 494 | if((world.ssl_ctx = initialise_ssl_ctx(server_mode, engine_id, | ||
| 495 | cacert, cert, key, dcert, dkey, cipher_list, dh_file, | ||
| 496 | dh_special, tmp_rsa, ctx_options, out_state, out_verify, | ||
| 497 | verify_mode, verify_depth)) == NULL) | ||
| 498 | return err_str1("initialise_ssl_ctx(engine_id=%s) failed", | ||
| 499 | (engine_id == NULL) ? "NULL" : engine_id); | ||
| 500 | if(engine_id) | ||
| 501 | fprintf(stderr, "Info, engine '%s' initialised\n", engine_id); | ||
| 502 | /* Create the listener */ | ||
| 503 | if((world.listen_fd = ip_create_listener(listenhost)) == -1) | ||
| 504 | return err_str1("ip_create_listener(%s) failed", listenhost); | ||
| 505 | fprintf(stderr, "Info, listening on '%s'\n", listenhost); | ||
| 506 | if(!ip_parse_address(proxyhost, &proxy_ip, &proxy_port, 0)) | ||
| 507 | return err_str1("ip_parse_address(%s) failed", proxyhost); | ||
| 508 | fprintf(stderr, "Info, proxying to '%s' (%d.%d.%d.%d:%d)\n", proxyhost, | ||
| 509 | (int)proxy_ip[0], (int)proxy_ip[1], | ||
| 510 | (int)proxy_ip[2], (int)proxy_ip[3], (int)proxy_port); | ||
| 511 | fprintf(stderr, "Info, set maxtunnels to %d\n", (int)max_tunnels); | ||
| 512 | fprintf(stderr, "Info, set to operate as an SSL %s\n", | ||
| 513 | (server_mode ? "server" : "client")); | ||
| 514 | /* Initialise the rest of the stuff */ | ||
| 515 | world.tunnels_used = world.tunnels_size = 0; | ||
| 516 | world.tunnels = NULL; | ||
| 517 | world.server_mode = server_mode; | ||
| 518 | selector_init(&world.selector); | ||
| 519 | |||
| 520 | /* We're ready to loop */ | ||
| 521 | main_loop: | ||
| 522 | /* Should we listen for *new* tunnels? */ | ||
| 523 | if(world.tunnels_used < max_tunnels) | ||
| 524 | selector_add_listener(&world.selector, world.listen_fd); | ||
| 525 | /* We should add in our existing tunnels */ | ||
| 526 | for(loop = 0; loop < world.tunnels_used; loop++) | ||
| 527 | selector_add_tunala(&world.selector, world.tunnels + loop); | ||
| 528 | /* Now do the select */ | ||
| 529 | switch(selector_select(&world.selector)) { | ||
| 530 | case -1: | ||
| 531 | if(errno != EINTR) { | ||
| 532 | fprintf(stderr, "selector_select returned a " | ||
| 533 | "badness error.\n"); | ||
| 534 | goto shouldnt_happen; | ||
| 535 | } | ||
| 536 | fprintf(stderr, "Warn, selector interrupted by a signal\n"); | ||
| 537 | goto main_loop; | ||
| 538 | case 0: | ||
| 539 | fprintf(stderr, "Warn, selector_select returned 0 - signal?""?\n"); | ||
| 540 | goto main_loop; | ||
| 541 | default: | ||
| 542 | break; | ||
| 543 | } | ||
| 544 | /* Accept new connection if we should and can */ | ||
| 545 | if((world.tunnels_used < max_tunnels) && (selector_get_listener( | ||
| 546 | &world.selector, world.listen_fd, | ||
| 547 | &newfd) == 1)) { | ||
| 548 | /* We have a new connection */ | ||
| 549 | if(!tunala_world_new_item(&world, newfd, proxy_ip, | ||
| 550 | proxy_port, flipped)) | ||
| 551 | fprintf(stderr, "tunala_world_new_item failed\n"); | ||
| 552 | else if(out_conns) | ||
| 553 | fprintf(stderr, "Info, new tunnel opened, now up to " | ||
| 554 | "%d\n", world.tunnels_used); | ||
| 555 | } | ||
| 556 | /* Give each tunnel its moment, note the while loop is because it makes | ||
| 557 | * the logic easier than with "for" to deal with an array that may shift | ||
| 558 | * because of deletes. */ | ||
| 559 | loop = 0; | ||
| 560 | t_item = world.tunnels; | ||
| 561 | while(loop < world.tunnels_used) { | ||
| 562 | if(!tunala_item_io(&world.selector, t_item)) { | ||
| 563 | /* We're closing whether for reasons of an error or a | ||
| 564 | * natural close. Don't increment loop or t_item because | ||
| 565 | * the next item is moving to us! */ | ||
| 566 | if(!out_totals) | ||
| 567 | goto skip_totals; | ||
| 568 | fprintf(stderr, "Tunnel closing, traffic stats follow\n"); | ||
| 569 | /* Display the encrypted (over the network) stats */ | ||
| 570 | fprintf(stderr, io_stats_dirty, | ||
| 571 | buffer_total_in(state_machine_get_buffer( | ||
| 572 | &t_item->sm,SM_DIRTY_IN)), | ||
| 573 | buffer_total_out(state_machine_get_buffer( | ||
| 574 | &t_item->sm,SM_DIRTY_OUT))); | ||
| 575 | /* Display the local (tunnelled) stats. NB: Data we | ||
| 576 | * *receive* is data sent *out* of the state_machine on | ||
| 577 | * its 'clean' side. Hence the apparent back-to-front | ||
| 578 | * OUT/IN mixup here :-) */ | ||
| 579 | fprintf(stderr, io_stats_clean, | ||
| 580 | buffer_total_out(state_machine_get_buffer( | ||
| 581 | &t_item->sm,SM_CLEAN_OUT)), | ||
| 582 | buffer_total_in(state_machine_get_buffer( | ||
| 583 | &t_item->sm,SM_CLEAN_IN))); | ||
| 584 | skip_totals: | ||
| 585 | tunala_world_del_item(&world, loop); | ||
| 586 | if(out_conns) | ||
| 587 | fprintf(stderr, "Info, tunnel closed, down to %d\n", | ||
| 588 | world.tunnels_used); | ||
| 589 | } | ||
| 590 | else { | ||
| 591 | /* Move to the next item */ | ||
| 592 | loop++; | ||
| 593 | t_item++; | ||
| 594 | } | ||
| 595 | } | ||
| 596 | goto main_loop; | ||
| 597 | /* Should never get here */ | ||
| 598 | shouldnt_happen: | ||
| 599 | abort(); | ||
| 600 | return 1; | ||
| 601 | } | ||
| 602 | |||
| 603 | /****************/ | ||
| 604 | /* OpenSSL bits */ | ||
| 605 | /****************/ | ||
| 606 | |||
| 607 | static int ctx_set_cert(SSL_CTX *ctx, const char *cert, const char *key) | ||
| 608 | { | ||
| 609 | FILE *fp = NULL; | ||
| 610 | X509 *x509 = NULL; | ||
| 611 | EVP_PKEY *pkey = NULL; | ||
| 612 | int toret = 0; /* Assume an error */ | ||
| 613 | |||
| 614 | /* cert */ | ||
| 615 | if(cert) { | ||
| 616 | if((fp = fopen(cert, "r")) == NULL) { | ||
| 617 | fprintf(stderr, "Error opening cert file '%s'\n", cert); | ||
| 618 | goto err; | ||
| 619 | } | ||
| 620 | if(!PEM_read_X509(fp, &x509, NULL, NULL)) { | ||
| 621 | fprintf(stderr, "Error reading PEM cert from '%s'\n", | ||
| 622 | cert); | ||
| 623 | goto err; | ||
| 624 | } | ||
| 625 | if(!SSL_CTX_use_certificate(ctx, x509)) { | ||
| 626 | fprintf(stderr, "Error, cert in '%s' can not be used\n", | ||
| 627 | cert); | ||
| 628 | goto err; | ||
| 629 | } | ||
| 630 | /* Clear the FILE* for reuse in the "key" code */ | ||
| 631 | fclose(fp); | ||
| 632 | fp = NULL; | ||
| 633 | fprintf(stderr, "Info, operating with cert in '%s'\n", cert); | ||
| 634 | /* If a cert was given without matching key, we assume the same | ||
| 635 | * file contains the required key. */ | ||
| 636 | if(!key) | ||
| 637 | key = cert; | ||
| 638 | } else { | ||
| 639 | if(key) | ||
| 640 | fprintf(stderr, "Error, can't specify a key without a " | ||
| 641 | "corresponding certificate\n"); | ||
| 642 | else | ||
| 643 | fprintf(stderr, "Error, ctx_set_cert called with " | ||
| 644 | "NULLs!\n"); | ||
| 645 | goto err; | ||
| 646 | } | ||
| 647 | /* key */ | ||
| 648 | if(key) { | ||
| 649 | if((fp = fopen(key, "r")) == NULL) { | ||
| 650 | fprintf(stderr, "Error opening key file '%s'\n", key); | ||
| 651 | goto err; | ||
| 652 | } | ||
| 653 | if(!PEM_read_PrivateKey(fp, &pkey, NULL, NULL)) { | ||
| 654 | fprintf(stderr, "Error reading PEM key from '%s'\n", | ||
| 655 | key); | ||
| 656 | goto err; | ||
| 657 | } | ||
| 658 | if(!SSL_CTX_use_PrivateKey(ctx, pkey)) { | ||
| 659 | fprintf(stderr, "Error, key in '%s' can not be used\n", | ||
| 660 | key); | ||
| 661 | goto err; | ||
| 662 | } | ||
| 663 | fprintf(stderr, "Info, operating with key in '%s'\n", key); | ||
| 664 | } else | ||
| 665 | fprintf(stderr, "Info, operating without a cert or key\n"); | ||
| 666 | /* Success */ | ||
| 667 | toret = 1; err: | ||
| 668 | if(x509) | ||
| 669 | X509_free(x509); | ||
| 670 | if(pkey) | ||
| 671 | EVP_PKEY_free(pkey); | ||
| 672 | if(fp) | ||
| 673 | fclose(fp); | ||
| 674 | return toret; | ||
| 675 | } | ||
| 676 | |||
| 677 | static int ctx_set_dh(SSL_CTX *ctx, const char *dh_file, const char *dh_special) | ||
| 678 | { | ||
| 679 | DH *dh = NULL; | ||
| 680 | FILE *fp = NULL; | ||
| 681 | |||
| 682 | if(dh_special) { | ||
| 683 | if(strcmp(dh_special, "NULL") == 0) | ||
| 684 | return 1; | ||
| 685 | if(strcmp(dh_special, "standard") == 0) { | ||
| 686 | if((dh = get_dh512()) == NULL) { | ||
| 687 | fprintf(stderr, "Error, can't parse 'standard'" | ||
| 688 | " DH parameters\n"); | ||
| 689 | return 0; | ||
| 690 | } | ||
| 691 | fprintf(stderr, "Info, using 'standard' DH parameters\n"); | ||
| 692 | goto do_it; | ||
| 693 | } | ||
| 694 | if(strcmp(dh_special, "generate") != 0) | ||
| 695 | /* This shouldn't happen - screening values is handled | ||
| 696 | * in main(). */ | ||
| 697 | abort(); | ||
| 698 | fprintf(stderr, "Info, generating DH parameters ... "); | ||
| 699 | fflush(stderr); | ||
| 700 | if(!(dh = DH_new()) || !DH_generate_parameters_ex(dh, 512, | ||
| 701 | DH_GENERATOR_5, NULL)) { | ||
| 702 | fprintf(stderr, "error!\n"); | ||
| 703 | if(dh) | ||
| 704 | DH_free(dh); | ||
| 705 | return 0; | ||
| 706 | } | ||
| 707 | fprintf(stderr, "complete\n"); | ||
| 708 | goto do_it; | ||
| 709 | } | ||
| 710 | /* So, we're loading dh_file */ | ||
| 711 | if((fp = fopen(dh_file, "r")) == NULL) { | ||
| 712 | fprintf(stderr, "Error, couldn't open '%s' for DH parameters\n", | ||
| 713 | dh_file); | ||
| 714 | return 0; | ||
| 715 | } | ||
| 716 | dh = PEM_read_DHparams(fp, NULL, NULL, NULL); | ||
| 717 | fclose(fp); | ||
| 718 | if(dh == NULL) { | ||
| 719 | fprintf(stderr, "Error, could not parse DH parameters from '%s'\n", | ||
| 720 | dh_file); | ||
| 721 | return 0; | ||
| 722 | } | ||
| 723 | fprintf(stderr, "Info, using DH parameters from file '%s'\n", dh_file); | ||
| 724 | do_it: | ||
| 725 | SSL_CTX_set_tmp_dh(ctx, dh); | ||
| 726 | DH_free(dh); | ||
| 727 | return 1; | ||
| 728 | } | ||
| 729 | |||
| 730 | static SSL_CTX *initialise_ssl_ctx(int server_mode, const char *engine_id, | ||
| 731 | const char *CAfile, const char *cert, const char *key, | ||
| 732 | const char *dcert, const char *dkey, const char *cipher_list, | ||
| 733 | const char *dh_file, const char *dh_special, int tmp_rsa, | ||
| 734 | int ctx_options, int out_state, int out_verify, int verify_mode, | ||
| 735 | unsigned int verify_depth) | ||
| 736 | { | ||
| 737 | SSL_CTX *ctx = NULL, *ret = NULL; | ||
| 738 | const SSL_METHOD *meth; | ||
| 739 | ENGINE *e = NULL; | ||
| 740 | |||
| 741 | OpenSSL_add_ssl_algorithms(); | ||
| 742 | SSL_load_error_strings(); | ||
| 743 | |||
| 744 | meth = (server_mode ? SSLv23_server_method() : SSLv23_client_method()); | ||
| 745 | if(meth == NULL) | ||
| 746 | goto err; | ||
| 747 | if(engine_id) { | ||
| 748 | ENGINE_load_builtin_engines(); | ||
| 749 | if((e = ENGINE_by_id(engine_id)) == NULL) { | ||
| 750 | fprintf(stderr, "Error obtaining '%s' engine, openssl " | ||
| 751 | "errors follow\n", engine_id); | ||
| 752 | goto err; | ||
| 753 | } | ||
| 754 | if(!ENGINE_set_default(e, ENGINE_METHOD_ALL)) { | ||
| 755 | fprintf(stderr, "Error assigning '%s' engine, openssl " | ||
| 756 | "errors follow\n", engine_id); | ||
| 757 | goto err; | ||
| 758 | } | ||
| 759 | ENGINE_free(e); | ||
| 760 | } | ||
| 761 | if((ctx = SSL_CTX_new(meth)) == NULL) | ||
| 762 | goto err; | ||
| 763 | /* cacert */ | ||
| 764 | if(CAfile) { | ||
| 765 | if(!X509_STORE_load_locations(SSL_CTX_get_cert_store(ctx), | ||
| 766 | CAfile, NULL)) { | ||
| 767 | fprintf(stderr, "Error loading CA cert(s) in '%s'\n", | ||
| 768 | CAfile); | ||
| 769 | goto err; | ||
| 770 | } | ||
| 771 | fprintf(stderr, "Info, operating with CA cert(s) in '%s'\n", | ||
| 772 | CAfile); | ||
| 773 | } else | ||
| 774 | fprintf(stderr, "Info, operating without a CA cert(-list)\n"); | ||
| 775 | if(!SSL_CTX_set_default_verify_paths(ctx)) { | ||
| 776 | fprintf(stderr, "Error setting default verify paths\n"); | ||
| 777 | goto err; | ||
| 778 | } | ||
| 779 | |||
| 780 | /* cert and key */ | ||
| 781 | if((cert || key) && !ctx_set_cert(ctx, cert, key)) | ||
| 782 | goto err; | ||
| 783 | /* dcert and dkey */ | ||
| 784 | if((dcert || dkey) && !ctx_set_cert(ctx, dcert, dkey)) | ||
| 785 | goto err; | ||
| 786 | /* temporary RSA key generation */ | ||
| 787 | if(tmp_rsa) | ||
| 788 | SSL_CTX_set_tmp_rsa_callback(ctx, cb_generate_tmp_rsa); | ||
| 789 | |||
| 790 | /* cipher_list */ | ||
| 791 | if(cipher_list) { | ||
| 792 | if(!SSL_CTX_set_cipher_list(ctx, cipher_list)) { | ||
| 793 | fprintf(stderr, "Error setting cipher list '%s'\n", | ||
| 794 | cipher_list); | ||
| 795 | goto err; | ||
| 796 | } | ||
| 797 | fprintf(stderr, "Info, set cipher list '%s'\n", cipher_list); | ||
| 798 | } else | ||
| 799 | fprintf(stderr, "Info, operating with default cipher list\n"); | ||
| 800 | |||
| 801 | /* dh_file & dh_special */ | ||
| 802 | if((dh_file || dh_special) && !ctx_set_dh(ctx, dh_file, dh_special)) | ||
| 803 | goto err; | ||
| 804 | |||
| 805 | /* ctx_options */ | ||
| 806 | SSL_CTX_set_options(ctx, ctx_options); | ||
| 807 | |||
| 808 | /* out_state (output of SSL handshake states to screen). */ | ||
| 809 | if(out_state) | ||
| 810 | cb_ssl_info_set_output(stderr); | ||
| 811 | |||
| 812 | /* out_verify */ | ||
| 813 | if(out_verify > 0) { | ||
| 814 | cb_ssl_verify_set_output(stderr); | ||
| 815 | cb_ssl_verify_set_level(out_verify); | ||
| 816 | } | ||
| 817 | |||
| 818 | /* verify_depth */ | ||
| 819 | cb_ssl_verify_set_depth(verify_depth); | ||
| 820 | |||
| 821 | /* Success! (includes setting verify_mode) */ | ||
| 822 | SSL_CTX_set_info_callback(ctx, cb_ssl_info); | ||
| 823 | SSL_CTX_set_verify(ctx, verify_mode, cb_ssl_verify); | ||
| 824 | ret = ctx; | ||
| 825 | err: | ||
| 826 | if(!ret) { | ||
| 827 | ERR_print_errors_fp(stderr); | ||
| 828 | if(ctx) | ||
| 829 | SSL_CTX_free(ctx); | ||
| 830 | } | ||
| 831 | return ret; | ||
| 832 | } | ||
| 833 | |||
| 834 | /*****************/ | ||
| 835 | /* Selector bits */ | ||
| 836 | /*****************/ | ||
| 837 | |||
| 838 | static void selector_sets_init(select_sets_t *s) | ||
| 839 | { | ||
| 840 | s->max = 0; | ||
| 841 | FD_ZERO(&s->reads); | ||
| 842 | FD_ZERO(&s->sends); | ||
| 843 | FD_ZERO(&s->excepts); | ||
| 844 | } | ||
| 845 | static void selector_init(tunala_selector_t *selector) | ||
| 846 | { | ||
| 847 | selector_sets_init(&selector->last_selected); | ||
| 848 | selector_sets_init(&selector->next_select); | ||
| 849 | } | ||
| 850 | |||
| 851 | #define SEL_EXCEPTS 0x00 | ||
| 852 | #define SEL_READS 0x01 | ||
| 853 | #define SEL_SENDS 0x02 | ||
| 854 | static void selector_add_raw_fd(tunala_selector_t *s, int fd, int flags) | ||
| 855 | { | ||
| 856 | FD_SET(fd, &s->next_select.excepts); | ||
| 857 | if(flags & SEL_READS) | ||
| 858 | FD_SET(fd, &s->next_select.reads); | ||
| 859 | if(flags & SEL_SENDS) | ||
| 860 | FD_SET(fd, &s->next_select.sends); | ||
| 861 | /* Adjust "max" */ | ||
| 862 | if(s->next_select.max < (fd + 1)) | ||
| 863 | s->next_select.max = fd + 1; | ||
| 864 | } | ||
| 865 | |||
| 866 | static void selector_add_listener(tunala_selector_t *selector, int fd) | ||
| 867 | { | ||
| 868 | selector_add_raw_fd(selector, fd, SEL_READS); | ||
| 869 | } | ||
| 870 | |||
| 871 | static void selector_add_tunala(tunala_selector_t *s, tunala_item_t *t) | ||
| 872 | { | ||
| 873 | /* Set clean read if sm.clean_in is not full */ | ||
| 874 | if(t->clean_read != -1) { | ||
| 875 | selector_add_raw_fd(s, t->clean_read, | ||
| 876 | (buffer_full(state_machine_get_buffer(&t->sm, | ||
| 877 | SM_CLEAN_IN)) ? SEL_EXCEPTS : SEL_READS)); | ||
| 878 | } | ||
| 879 | /* Set clean send if sm.clean_out is not empty */ | ||
| 880 | if(t->clean_send != -1) { | ||
| 881 | selector_add_raw_fd(s, t->clean_send, | ||
| 882 | (buffer_empty(state_machine_get_buffer(&t->sm, | ||
| 883 | SM_CLEAN_OUT)) ? SEL_EXCEPTS : SEL_SENDS)); | ||
| 884 | } | ||
| 885 | /* Set dirty read if sm.dirty_in is not full */ | ||
| 886 | if(t->dirty_read != -1) { | ||
| 887 | selector_add_raw_fd(s, t->dirty_read, | ||
| 888 | (buffer_full(state_machine_get_buffer(&t->sm, | ||
| 889 | SM_DIRTY_IN)) ? SEL_EXCEPTS : SEL_READS)); | ||
| 890 | } | ||
| 891 | /* Set dirty send if sm.dirty_out is not empty */ | ||
| 892 | if(t->dirty_send != -1) { | ||
| 893 | selector_add_raw_fd(s, t->dirty_send, | ||
| 894 | (buffer_empty(state_machine_get_buffer(&t->sm, | ||
| 895 | SM_DIRTY_OUT)) ? SEL_EXCEPTS : SEL_SENDS)); | ||
| 896 | } | ||
| 897 | } | ||
| 898 | |||
| 899 | static int selector_select(tunala_selector_t *selector) | ||
| 900 | { | ||
| 901 | memcpy(&selector->last_selected, &selector->next_select, | ||
| 902 | sizeof(select_sets_t)); | ||
| 903 | selector_sets_init(&selector->next_select); | ||
| 904 | return select(selector->last_selected.max, | ||
| 905 | &selector->last_selected.reads, | ||
| 906 | &selector->last_selected.sends, | ||
| 907 | &selector->last_selected.excepts, NULL); | ||
| 908 | } | ||
| 909 | |||
| 910 | /* This returns -1 for error, 0 for no new connections, or 1 for success, in | ||
| 911 | * which case *newfd is populated. */ | ||
| 912 | static int selector_get_listener(tunala_selector_t *selector, int fd, int *newfd) | ||
| 913 | { | ||
| 914 | if(FD_ISSET(fd, &selector->last_selected.excepts)) | ||
| 915 | return -1; | ||
| 916 | if(!FD_ISSET(fd, &selector->last_selected.reads)) | ||
| 917 | return 0; | ||
| 918 | if((*newfd = ip_accept_connection(fd)) == -1) | ||
| 919 | return -1; | ||
| 920 | return 1; | ||
| 921 | } | ||
| 922 | |||
| 923 | /************************/ | ||
| 924 | /* "Tunala" world stuff */ | ||
| 925 | /************************/ | ||
| 926 | |||
| 927 | static int tunala_world_make_room(tunala_world_t *world) | ||
| 928 | { | ||
| 929 | unsigned int newsize; | ||
| 930 | tunala_item_t *newarray; | ||
| 931 | |||
| 932 | if(world->tunnels_used < world->tunnels_size) | ||
| 933 | return 1; | ||
| 934 | newsize = (world->tunnels_size == 0 ? 16 : | ||
| 935 | ((world->tunnels_size * 3) / 2)); | ||
| 936 | if((newarray = malloc(newsize * sizeof(tunala_item_t))) == NULL) | ||
| 937 | return 0; | ||
| 938 | memset(newarray, 0, newsize * sizeof(tunala_item_t)); | ||
| 939 | if(world->tunnels_used > 0) | ||
| 940 | memcpy(newarray, world->tunnels, | ||
| 941 | world->tunnels_used * sizeof(tunala_item_t)); | ||
| 942 | if(world->tunnels_size > 0) | ||
| 943 | free(world->tunnels); | ||
| 944 | /* migrate */ | ||
| 945 | world->tunnels = newarray; | ||
| 946 | world->tunnels_size = newsize; | ||
| 947 | return 1; | ||
| 948 | } | ||
| 949 | |||
| 950 | static int tunala_world_new_item(tunala_world_t *world, int fd, | ||
| 951 | const char *ip, unsigned short port, int flipped) | ||
| 952 | { | ||
| 953 | tunala_item_t *item; | ||
| 954 | int newfd; | ||
| 955 | SSL *new_ssl = NULL; | ||
| 956 | |||
| 957 | if(!tunala_world_make_room(world)) | ||
| 958 | return 0; | ||
| 959 | if((new_ssl = SSL_new(world->ssl_ctx)) == NULL) { | ||
| 960 | fprintf(stderr, "Error creating new SSL\n"); | ||
| 961 | ERR_print_errors_fp(stderr); | ||
| 962 | return 0; | ||
| 963 | } | ||
| 964 | item = world->tunnels + (world->tunnels_used++); | ||
| 965 | state_machine_init(&item->sm); | ||
| 966 | item->clean_read = item->clean_send = | ||
| 967 | item->dirty_read = item->dirty_send = -1; | ||
| 968 | if((newfd = ip_create_connection_split(ip, port)) == -1) | ||
| 969 | goto err; | ||
| 970 | /* Which way round? If we're a server, "fd" is the dirty side and the | ||
| 971 | * connection we open is the clean one. For a client, it's the other way | ||
| 972 | * around. Unless, of course, we're "flipped" in which case everything | ||
| 973 | * gets reversed. :-) */ | ||
| 974 | if((world->server_mode && !flipped) || | ||
| 975 | (!world->server_mode && flipped)) { | ||
| 976 | item->dirty_read = item->dirty_send = fd; | ||
| 977 | item->clean_read = item->clean_send = newfd; | ||
| 978 | } else { | ||
| 979 | item->clean_read = item->clean_send = fd; | ||
| 980 | item->dirty_read = item->dirty_send = newfd; | ||
| 981 | } | ||
| 982 | /* We use the SSL's "app_data" to indicate a call-back induced "kill" */ | ||
| 983 | SSL_set_app_data(new_ssl, NULL); | ||
| 984 | if(!state_machine_set_SSL(&item->sm, new_ssl, world->server_mode)) | ||
| 985 | goto err; | ||
| 986 | return 1; | ||
| 987 | err: | ||
| 988 | tunala_world_del_item(world, world->tunnels_used - 1); | ||
| 989 | return 0; | ||
| 990 | |||
| 991 | } | ||
| 992 | |||
| 993 | static void tunala_world_del_item(tunala_world_t *world, unsigned int idx) | ||
| 994 | { | ||
| 995 | tunala_item_t *item = world->tunnels + idx; | ||
| 996 | if(item->clean_read != -1) | ||
| 997 | close(item->clean_read); | ||
| 998 | if(item->clean_send != item->clean_read) | ||
| 999 | close(item->clean_send); | ||
| 1000 | item->clean_read = item->clean_send = -1; | ||
| 1001 | if(item->dirty_read != -1) | ||
| 1002 | close(item->dirty_read); | ||
| 1003 | if(item->dirty_send != item->dirty_read) | ||
| 1004 | close(item->dirty_send); | ||
| 1005 | item->dirty_read = item->dirty_send = -1; | ||
| 1006 | state_machine_close(&item->sm); | ||
| 1007 | /* OK, now we fix the item array */ | ||
| 1008 | if(idx + 1 < world->tunnels_used) | ||
| 1009 | /* We need to scroll entries to the left */ | ||
| 1010 | memmove(world->tunnels + idx, | ||
| 1011 | world->tunnels + (idx + 1), | ||
| 1012 | (world->tunnels_used - (idx + 1)) * | ||
| 1013 | sizeof(tunala_item_t)); | ||
| 1014 | world->tunnels_used--; | ||
| 1015 | } | ||
| 1016 | |||
| 1017 | static int tunala_item_io(tunala_selector_t *selector, tunala_item_t *item) | ||
| 1018 | { | ||
| 1019 | int c_r, c_s, d_r, d_s; /* Four boolean flags */ | ||
| 1020 | |||
| 1021 | /* Take ourselves out of the gene-pool if there was an except */ | ||
| 1022 | if((item->clean_read != -1) && FD_ISSET(item->clean_read, | ||
| 1023 | &selector->last_selected.excepts)) | ||
| 1024 | return 0; | ||
| 1025 | if((item->clean_send != -1) && FD_ISSET(item->clean_send, | ||
| 1026 | &selector->last_selected.excepts)) | ||
| 1027 | return 0; | ||
| 1028 | if((item->dirty_read != -1) && FD_ISSET(item->dirty_read, | ||
| 1029 | &selector->last_selected.excepts)) | ||
| 1030 | return 0; | ||
| 1031 | if((item->dirty_send != -1) && FD_ISSET(item->dirty_send, | ||
| 1032 | &selector->last_selected.excepts)) | ||
| 1033 | return 0; | ||
| 1034 | /* Grab our 4 IO flags */ | ||
| 1035 | c_r = c_s = d_r = d_s = 0; | ||
| 1036 | if(item->clean_read != -1) | ||
| 1037 | c_r = FD_ISSET(item->clean_read, &selector->last_selected.reads); | ||
| 1038 | if(item->clean_send != -1) | ||
| 1039 | c_s = FD_ISSET(item->clean_send, &selector->last_selected.sends); | ||
| 1040 | if(item->dirty_read != -1) | ||
| 1041 | d_r = FD_ISSET(item->dirty_read, &selector->last_selected.reads); | ||
| 1042 | if(item->dirty_send != -1) | ||
| 1043 | d_s = FD_ISSET(item->dirty_send, &selector->last_selected.sends); | ||
| 1044 | /* If no IO has happened for us, skip needless data looping */ | ||
| 1045 | if(!c_r && !c_s && !d_r && !d_s) | ||
| 1046 | return 1; | ||
| 1047 | if(c_r) | ||
| 1048 | c_r = (buffer_from_fd(state_machine_get_buffer(&item->sm, | ||
| 1049 | SM_CLEAN_IN), item->clean_read) <= 0); | ||
| 1050 | if(c_s) | ||
| 1051 | c_s = (buffer_to_fd(state_machine_get_buffer(&item->sm, | ||
| 1052 | SM_CLEAN_OUT), item->clean_send) <= 0); | ||
| 1053 | if(d_r) | ||
| 1054 | d_r = (buffer_from_fd(state_machine_get_buffer(&item->sm, | ||
| 1055 | SM_DIRTY_IN), item->dirty_read) <= 0); | ||
| 1056 | if(d_s) | ||
| 1057 | d_s = (buffer_to_fd(state_machine_get_buffer(&item->sm, | ||
| 1058 | SM_DIRTY_OUT), item->dirty_send) <= 0); | ||
| 1059 | /* If any of the flags is non-zero, that means they need closing */ | ||
| 1060 | if(c_r) { | ||
| 1061 | close(item->clean_read); | ||
| 1062 | if(item->clean_send == item->clean_read) | ||
| 1063 | item->clean_send = -1; | ||
| 1064 | item->clean_read = -1; | ||
| 1065 | } | ||
| 1066 | if(c_s && (item->clean_send != -1)) { | ||
| 1067 | close(item->clean_send); | ||
| 1068 | if(item->clean_send == item->clean_read) | ||
| 1069 | item->clean_read = -1; | ||
| 1070 | item->clean_send = -1; | ||
| 1071 | } | ||
| 1072 | if(d_r) { | ||
| 1073 | close(item->dirty_read); | ||
| 1074 | if(item->dirty_send == item->dirty_read) | ||
| 1075 | item->dirty_send = -1; | ||
| 1076 | item->dirty_read = -1; | ||
| 1077 | } | ||
| 1078 | if(d_s && (item->dirty_send != -1)) { | ||
| 1079 | close(item->dirty_send); | ||
| 1080 | if(item->dirty_send == item->dirty_read) | ||
| 1081 | item->dirty_read = -1; | ||
| 1082 | item->dirty_send = -1; | ||
| 1083 | } | ||
| 1084 | /* This function name is attributed to the term donated by David | ||
| 1085 | * Schwartz on openssl-dev, message-ID: | ||
| 1086 | * <NCBBLIEPOCNJOAEKBEAKEEDGLIAA.davids@webmaster.com>. :-) */ | ||
| 1087 | if(!state_machine_churn(&item->sm)) | ||
| 1088 | /* If the SSL closes, it will also zero-out the _in buffers | ||
| 1089 | * and will in future process just outgoing data. As and | ||
| 1090 | * when the outgoing data has gone, it will return zero | ||
| 1091 | * here to tell us to bail out. */ | ||
| 1092 | return 0; | ||
| 1093 | /* Otherwise, we return zero if both sides are dead. */ | ||
| 1094 | if(((item->clean_read == -1) || (item->clean_send == -1)) && | ||
| 1095 | ((item->dirty_read == -1) || (item->dirty_send == -1))) | ||
| 1096 | return 0; | ||
| 1097 | /* If only one side closed, notify the SSL of this so it can take | ||
| 1098 | * appropriate action. */ | ||
| 1099 | if((item->clean_read == -1) || (item->clean_send == -1)) { | ||
| 1100 | if(!state_machine_close_clean(&item->sm)) | ||
| 1101 | return 0; | ||
| 1102 | } | ||
| 1103 | if((item->dirty_read == -1) || (item->dirty_send == -1)) { | ||
| 1104 | if(!state_machine_close_dirty(&item->sm)) | ||
| 1105 | return 0; | ||
| 1106 | } | ||
| 1107 | return 1; | ||
| 1108 | } | ||
| 1109 | |||
