openssl/demos/quic/poll-server/quic-server-ssl-poll-http.c

1955 lines
54 KiB
C

/*
* Copyright 2024-2025 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the Apache License 2.0 (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
* in the file LICENSE in the source distribution or at
* https://www.openssl.org/source/license.html
*/
/*
* Implementation of hq-interop and http/1.0 QUIC server built on top of
* SSL_poll(3ossl). The server is able to deal with simultaneous connections
* All I/O operations are non-blocking.
*
* The only supported request is get. No HTTP errors are sent back. If
* request is not understood the channel is reset.
*
* If client sends request for example GET /foo_1024.txt the server
* replies with HTTP/1.0 200 OK with plain-text body. The body is
* 1k of text foo_1024.txtfoo_1024,txtfoo...
*
* To run the server use command as follows:
* ./quic-server-ssl-poll-http 8080 chain.pem pkey.pem
* command above starts server which listens to port localhost:8080
* Although the server is simple one can use it with tquic_client
* found at https://tquic.net/. Other 3rd party clients were not tested yet.
*
* The main() function creates instance of poll_manager which manages
* all events (poll_event). If all is good execution calls to
* run_quic_server() function where QUIC listener is created and passed
* to manager. Then the polling loop is entered to serve remote clients.
*
* Some naming conventions are followed in code:
* - pe is used for poll event, it can be associated with listener,
* connection or stream.
* - pec is used for poll event which handles connection
* - pes is used for poll event which handles stream
*
* there is also response buffer which helps server to dispatch reply:
* - rb is used for any response buffer type
* - rts is used for simple text buffer (just data with no HTTP/1.0
* headers)
* - rtf is used for response text buffers which carry HTTP/1.0 headers
* (response text full)
*/
#include <string.h>
#include <stdio.h>
#include <assert.h>
#include <ctype.h>
#include <sys/types.h>
#include <time.h>
/* Include the appropriate header file for SOCK_STREAM */
#ifdef _WIN32 /* Windows */
# include <stdarg.h>
# include <winsock2.h>
#else /* Linux/Unix */
# include <err.h>
# include <sys/socket.h>
# include <sys/select.h>
# include <netinet/in.h>
# include <unistd.h>
# include <poll.h>
# include <libgen.h>
#endif
#include <openssl/bio.h>
#include <openssl/ssl.h>
#include <openssl/err.h>
#include <openssl/quic.h>
#include "internal/list.h"
/*
* This is a simple non-blocking QUIC HTTP/1.0 server application.
* Server accepts QUIC connections. It then accepts bi-directional
* stream from client and reads request. By default it sends
* 12345 bytes back as HHTTP/1.0 response to any GET request.
* If GET request comes with URL for example as follows:
* /foo/bar/file_65535.txt
* then the server sends 64kB of data in HTTP/1.0 response.
*/
#ifdef DEBUG
# define DPRINTF fprintf
#else
# define DPRINTF(...) (void)(0)
#endif
/*
* format string so we can print SSL_poll() events in more informative
* way. To print events one does this:
* int events = SSL_POLL_EVENT_F | SSL_POLL_EVENT_R;
* printf("%s We got events: " POLL_FMT "\n", __func__, POLL_PRINTA(events));
*/
#define POLL_FMT "%s%s%s%s%s%s%s%s%s%s%s%s%s"
#define POLL_PRINTA(_revents_) \
(_revents_) & SSL_POLL_EVENT_F ? "SSL_POLL_EVENT_F " : "", \
(_revents_) & SSL_POLL_EVENT_EL ? "SSL_POLL_EVENT_EL" : "", \
(_revents_) & SSL_POLL_EVENT_EC ? "SSL_POLL_EVENT_EC " : "", \
(_revents_) & SSL_POLL_EVENT_ECD ? "SSL_POLL_EVENT_ECD " : "", \
(_revents_) & SSL_POLL_EVENT_ER ? "SSL_POLL_EVENT_ER " : "", \
(_revents_) & SSL_POLL_EVENT_EW ? "SSL_POLL_EVENT_EW " : "", \
(_revents_) & SSL_POLL_EVENT_R ? "SSL_POLL_EVENT_R " : "", \
(_revents_) & SSL_POLL_EVENT_W ? "SSL_POLL_EVENT_W " : "", \
(_revents_) & SSL_POLL_EVENT_IC ? "SSL_POLL_EVENT_IC " : "", \
(_revents_) & SSL_POLL_EVENT_ISB ? "SSL_POLL_EVENT_ISB " : "", \
(_revents_) & SSL_POLL_EVENT_ISU ? "SSL_POLL_EVENT_ISU " : "", \
(_revents_) & SSL_POLL_EVENT_OSB ? "SSL_POLL_EVENT_OSB " : "", \
(_revents_) & SSL_POLL_EVENT_OSU ? "SSL_POLL_EVENT_OSU " : ""
/*
* every poll_event structure has members enumerated here in poll_event_base
* The poll events are kept in list which is managed by poll_manager instance.
* However SSL_poll(9ossl) expects an array of SSL_POLL_ITEM structures. Therefore
* the poll manager needs to construct array of poll_event structures from list.
* We get two copies of poll_event structures:
* - one copy is held in list (original)
* - one copy is held in array (copy for SSL_poll())
* We use pe_self member to easily reach from SSL_poll() copy instance back to
* original managed by poll manager and used by our application.
* There are four callbacks:
* - pe_cb_in() - triggered when inbound data/stream/connection is coming
* - pe_cb_out() - triggered when outbound data/stream/connection is coming
* - pe_cb_error() - triggered when polled object enters an error state
* - pe_cb_destroy() - this a destructor, application destroy pe_appdata
* The remaining members are rather self explanatory.
*/
#define poll_event_base \
SSL_POLL_ITEM pe_poll_item; \
OSSL_LIST_MEMBER(pe, struct poll_event);\
uint64_t pe_want_events; \
uint64_t pe_want_mask; \
struct poll_manager *pe_my_pm; \
unsigned char pe_type; \
struct poll_event *pe_self; \
void *pe_appdata; \
int(*pe_cb_in)(struct poll_event *); \
int(*pe_cb_out)(struct poll_event *); \
int(*pe_cb_error)(struct poll_event *); \
void(*pe_cb_ondestroy)(struct poll_event *)
struct poll_event {
poll_event_base;
};
struct poll_event_listener {
poll_event_base;
};
/*
* Each poll_event holds pe_appdata context. The poll_event is associated with
* SSL object which is typically QUIC stream. There are two types of streams
* in QUIC:
* - uni-directional (simplex)
* - bi-directional (duplex)
* bi-directional are easy to handle: we create them, then we read request
* from client and write reply back. Then stream gets destroyed.
* This request-reply handling is more tricky with uni-directional streams.
* We need a pair of streams: server reads a request from one stream and
* then must create a stream for reply. For echo-reply server we need to
* pass data we read from input stream to output stream. The poll_event_context
* here is to do it for us. The echo-reply server handling with simplex
* (unidirectional) streams goes as follows:
* - we read data from input stream and parse request
* - then we request poll manager to create an outbound stream,
* at this point we also create a response (response_buffer).
* the response buffer is added to connection.
* - connection keeps list of responses to be dispatched because
* client may establish more streams to send more requests
* - once outbound stream is created, poll manager moves response
* connection to outbound stream.
*/
struct poll_event_context {
OSSL_LIST_MEMBER(peccx, struct poll_event_context);
void *peccx;
void(*peccx_cb_ondestroy)(void *);
};
DEFINE_LIST_OF(pe, struct poll_event);
DEFINE_LIST_OF(peccx, struct poll_event_context);
/*
* It facilitates transfer of app data from one stream to the other.
* There are two lists:
* - pec_stream_cx for bi-directioanl streams (this list is unused
* currently).
* - pec_unistream_cx for uni-direcitonal (simplex) streams.
*
* Then there are two counters:
* - pec_want_stream bumbped up when application requests duplex stream,
* bumped down when stream is created
* - pec_want_unistream bumped up when application requests simplex stream.
* bumped down when stream is created
*/
struct poll_event_connection {
poll_event_base;
OSSL_LIST(peccx) pec_stream_cx;
OSSL_LIST(peccx) pec_unistream_cx;
uint64_t pec_want_stream;
uint64_t pec_want_unistream;
};
/*
* We always allocate more slots than we need. If POLL_GROW slots get
* deplepted then we allocate POLL_GROW more for the next one.
* Downsizing is similar. This is very naive and leads to oscillations
* (where we may end up freeing and reallocating poll event set) we need to
* figure out better strategy.
*/
#define POLL_GROW 20
#define POLL_DOWNSIZ 20
/*
* Members in poll manager deserve some explanation:
* - pm_head, holds a list of poll_event structures (connections and
* streams)
* - pm_event_count number of events to montior in SSL_poll(3ossl)
* - pm_poll_set array of events to poll on
* - pm_poll_set_sz number of slots (space) available in pm_poll_set
* - pm_need_rebuild whenever list of events to monitor in a list changes
* poll mamnager must rebuild pm_poll_set
* - pm_continue a flag indicates whether event loop should continue to
* run or if it should be terminated (pm_continue == 0)
* - pm_wconn_in() callback fires when there is a new connection
* - pm qconn
*/
struct poll_manager {
OSSL_LIST(pe) pm_head;
unsigned int pm_event_count;
struct poll_event *pm_poll_set;
unsigned int pm_poll_set_sz;
int pm_need_rebuild;
int pm_continue;
};
#define SSL_POLL_ERROR (SSL_POLL_EVENT_F | SSL_POLL_EVENT_EL | \
SSL_POLL_EVENT_EC | SSL_POLL_EVENT_ECD | \
SSL_POLL_EVENT_ER | SSL_POLL_EVENT_EW)
#define SSL_POLL_IN (SSL_POLL_EVENT_R | SSL_POLL_EVENT_IC | \
SSL_POLL_EVENT_ISB | SSL_POLL_EVENT_ISU)
#define SSL_POLL_OUT (SSL_POLL_EVENT_W | SSL_POLL_EVENT_OSB | \
SSL_POLL_EVENT_OSU)
struct poll_event_stream {
poll_event_base;
struct poll_event_connection *pes_conn;
char *pes_wpos;
unsigned int pes_wpos_sz;
int pes_got_request;
char pes_reqbuf[8192];
};
/*
* Response buffer.
*/
enum {
RB_TYPE_NONE,
RB_TYPE_TEXT_SIMPLE,
RB_TYPE_TEXT_FULL
};
#define response_buffer_base \
unsigned char rb_type; \
unsigned int rb_rpos; \
void (*rb_advrpos_cb)(struct response_buffer *, unsigned int);\
unsigned int (*rb_read_cb)(struct response_buffer *, char *, \
unsigned int); \
int (*rb_eof_cb)(struct response_buffer *); \
void (*rb_ondestroy_cb)(struct response_buffer *)
struct response_buffer {
response_buffer_base;
};
struct response_txt_simple {
response_buffer_base;
char *rts_pattern;
unsigned int rts_pattern_len;
unsigned int rts_len;
};
struct response_txt_full {
response_buffer_base;
char rtf_headers[1024];
char *rtf_pattern;
unsigned int rtf_pattern_len;
unsigned int rtf_hdr_len;
unsigned int rtf_len; /* headers + data */
};
static void destroy_pe(struct poll_event *);
static int pe_return_error(struct poll_event *);
static void pe_return_void(struct poll_event *);
#ifdef _WIN32
static const char *progname;
static void
vwarnx(const char *fmt, va_list ap)
{
if (progname != NULL)
fprintf(stderr, "%s: ", progname);
vfprintf(stderr, fmt, ap);
putc('\n', stderr);
}
static void
errx(int status, const char *fmt, ...)
{
va_list ap;
va_start(ap, fmt);
vwarnx(fmt, ap);
va_end(ap);
exit(status);
}
static void
warnx(const char *fmt, ...)
{
va_list ap;
va_start(ap, fmt);
vwarnx(fmt, ap);
va_end(ap);
}
/*
* we can get away with this mock-up on windows.
* we generate payload for any URL we obtain in
* GET request. mock-up is good enough for us.
*/
static char *
basename(char *path)
{
return path;
}
# define strncasecmp(_a_, _b_, _c_) _strnicmp((_a_), (_b_), (_c_))
# define ctime_r(_t_, _b_) ctime_s((_b_), sizeof ((_b_)), (_t_))
#endif
enum pe_types {
PE_NONE,
PE_LISTENER,
PE_CONNECTION,
PE_STREAM,
PE_STREAM_UNI_IN,
PE_STREAM_UNI_OUT,
PE_INVALID
};
static struct response_txt_simple *
rb_to_txt_simple(struct response_buffer *rb)
{
if (rb == NULL || rb->rb_type != RB_TYPE_TEXT_SIMPLE)
return NULL;
return (struct response_txt_simple *)rb;
}
static struct response_txt_full *
rb_to_txt_full(struct response_buffer *rb)
{
if (rb == NULL || rb->rb_type != RB_TYPE_TEXT_FULL)
return NULL;
return (struct response_txt_full *)rb;
}
static void
rb_advrpos_cb(struct response_buffer *rb, unsigned int rpos)
{
/* we assume base response_buffer is unlimited */
rb->rb_rpos += rpos;
}
static void
rb_ondestroy_cb(struct response_buffer *rb)
{
OPENSSL_free(rb);
}
static unsigned int
rb_null_read_cb(struct response_buffer *rb, char *buf, unsigned int buf_sz)
{
return 0;
}
static int
rb_eof_cb(struct response_buffer *rb)
{
return 1;
}
static void
rb_init(struct response_buffer *rb)
{
rb->rb_type = RB_TYPE_NONE;
rb->rb_advrpos_cb = rb_advrpos_cb;
rb->rb_read_cb = rb_null_read_cb;
rb->rb_eof_cb = rb_eof_cb;
rb->rb_ondestroy_cb = rb_ondestroy_cb;
rb->rb_rpos = 0;
}
static void
rb_advrpos(struct response_buffer *rb, unsigned int rpos)
{
if (rb != NULL)
rb->rb_advrpos_cb(rb, rpos);
}
static unsigned int
rb_read(struct response_buffer *rb, char *buf, unsigned int buf_sz)
{
if (rb != NULL)
return rb->rb_read_cb(rb, buf, buf_sz);
else
return 0;
}
static unsigned int
rb_eof(struct response_buffer *rb)
{
if (rb != NULL)
return rb->rb_eof_cb(rb);
else
return 1;
}
static void
rb_destroy(struct response_buffer *rb)
{
if (rb != NULL)
rb->rb_ondestroy_cb(rb);
}
static int
rb_txt_simple_eof_cb(struct response_buffer *rb)
{
struct response_txt_simple *rts = rb_to_txt_simple(rb);
if (rb_to_txt_full(rb) == NULL)
return 1;
if (rb->rb_rpos >= rts->rts_len)
return 1;
else
return 0;
}
static unsigned int
rb_txt_simple_read_cb(struct response_buffer *rb, char *buf,
unsigned int buf_sz)
{
struct response_txt_simple *rts = rb_to_txt_simple(rb);
unsigned int i = rb->rb_rpos;
unsigned int rv = 0;
if (rts == NULL || rb_eof(rb))
return 0;
while ((i < rts->rts_len) && (rv < buf_sz)) {
*buf++ = rts->rts_pattern[i % rts->rts_pattern_len];
i++;
rv++;
}
return rv;
}
static void
rb_txt_simple_ondestroy_cb(struct response_buffer *rb)
{
struct response_txt_simple *rts = rb_to_txt_simple(rb);
if (rts != NULL) {
OPENSSL_free(rts->rts_pattern);
OPENSSL_free(rts);
}
}
static void
rb_txt_simple_advrpos_cb(struct response_buffer *rb, unsigned int sz)
{
struct response_txt_simple *rts = rb_to_txt_simple(rb);
if (rts != NULL) {
rb->rb_rpos += sz;
if (rb->rb_rpos >= rts->rts_len)
rb->rb_rpos = rts->rts_len;
}
}
static ossl_unused struct response_txt_simple *
new_txt_simple_respoonse(const char *fill_pattern, unsigned int fsize)
{
struct response_txt_simple *rts;
struct response_buffer *rb;
rts = OPENSSL_malloc(sizeof (struct response_txt_simple));
if (rts == NULL)
return NULL;
if ((rts->rts_pattern = OPENSSL_strdup(fill_pattern)) == NULL) {
OPENSSL_free(rts);
return NULL;
}
rts->rts_pattern_len = (unsigned int)strlen(fill_pattern);
rts->rts_len = fsize;
rb = (struct response_buffer *)rts;
rb_init(rb);
rb->rb_type = RB_TYPE_TEXT_SIMPLE;
rb->rb_eof_cb = rb_txt_simple_eof_cb;
rb->rb_read_cb = rb_txt_simple_read_cb;
rb->rb_ondestroy_cb = rb_txt_simple_ondestroy_cb;
rb->rb_advrpos_cb = rb_txt_simple_advrpos_cb;
return rts;
}
static int
rb_txt_full_eof_cb(struct response_buffer *rb)
{
struct response_txt_full *rtf = rb_to_txt_full(rb);
if (rtf == NULL)
return 1;
if (rb->rb_rpos >= rtf->rtf_len)
return 1;
else
return 0;
}
static void
rb_txt_full_ondestroy_cb(struct response_buffer *rb)
{
struct response_txt_full *rtf = rb_to_txt_full(rb);
if (rtf != NULL) {
OPENSSL_free(rtf->rtf_pattern);
OPENSSL_free(rtf);
}
}
static unsigned int
rb_txt_full_read_cb(struct response_buffer *rb, char *buf, unsigned int buf_sz)
{
struct response_txt_full *rtf = rb_to_txt_full(rb);
unsigned int i = rb->rb_rpos;
unsigned int j;
unsigned int rv = 0;
if (rtf == NULL || rb_eof(rb))
return 0;
while ((i < rtf->rtf_hdr_len) && (rv < buf_sz)) {
*buf++ = rtf->rtf_headers[i++];
rv++;
}
j = i - rtf->rtf_hdr_len;
while ((i < rtf->rtf_len) && (rv < buf_sz)) {
*buf++ = rtf->rtf_pattern[j % rtf->rtf_pattern_len];
j++;
i++;
rv++;
}
return rv;
}
static void
rb_txt_full_advrpos_cb(struct response_buffer *rb, unsigned int sz)
{
struct response_txt_full *rtf = rb_to_txt_full(rb);
if (rtf != NULL) {
rb->rb_rpos += sz;
if (rb->rb_rpos >= rtf->rtf_len)
rb->rb_rpos = rtf->rtf_len;
}
}
static struct response_txt_full *
new_txt_full_respoonse(const char *fill_pattern, unsigned int fsize)
{
struct response_txt_full *rtf;
struct response_buffer *rb;
char date_str[80];
int hlen;
time_t t;
rtf = OPENSSL_malloc(sizeof (struct response_txt_full));
if (rtf == NULL)
return NULL;
if ((rtf->rtf_pattern = OPENSSL_strdup(fill_pattern)) == NULL) {
OPENSSL_free(rtf);
return NULL;
}
rtf->rtf_pattern_len = (unsigned int)strlen(fill_pattern);
t = time(&t);
ctime_r(&t, date_str);
/* TODO check headers if they confirm to HTTP/1.0 */
hlen = snprintf(rtf->rtf_headers, sizeof (rtf->rtf_headers),
"HTTP/1.0 200 OK\r\n"
"Content-Type: text/plain\r\n"
"Content-Length: %u\r\n"
"Date: %s\r\n"
"\r\n", fsize, date_str);
if (hlen >= (int)sizeof (rtf->rtf_headers)) {
OPENSSL_free(rtf->rtf_pattern);
OPENSSL_free(rtf);
return NULL;
}
rtf->rtf_hdr_len = (unsigned int)hlen;
rtf->rtf_len = rtf->rtf_hdr_len + fsize;
rb = (struct response_buffer *)rtf;
rb_init(rb);
rb->rb_type = RB_TYPE_TEXT_FULL;
rb->rb_eof_cb = rb_txt_full_eof_cb;
rb->rb_read_cb = rb_txt_full_read_cb;
rb->rb_ondestroy_cb = rb_txt_full_ondestroy_cb;
rb->rb_advrpos_cb = rb_txt_full_advrpos_cb;
return rtf;
}
static ossl_unused const char *
pe_type_to_name(const struct poll_event *pe)
{
static const char *names[] = {
"none",
"listener",
"connection",
"stream (bidi)",
"stream (in)",
"stream (out)",
"invalid"
};
if (pe->pe_type >= PE_INVALID)
return (names[PE_INVALID]);
return names[pe->pe_type];
}
static struct poll_event_connection *
pe_to_connection(struct poll_event *pe)
{
if ((pe == NULL) || (pe->pe_type != PE_CONNECTION))
return NULL;
return ((struct poll_event_connection *)pe);
}
static void
init_pe(struct poll_event *pe, SSL *ssl)
{
pe->pe_poll_item.desc = SSL_as_poll_descriptor(ssl);
pe->pe_cb_in = pe_return_error;
pe->pe_cb_out = pe_return_error;
pe->pe_cb_error = pe_return_error;
pe->pe_cb_ondestroy = pe_return_void;
pe->pe_self = pe;
pe->pe_type = PE_NONE;
pe->pe_want_mask = ~0;
}
static struct poll_event *
new_pe(SSL *ssl)
{
struct poll_event *pe;
if (ssl == NULL)
return NULL;
pe = OPENSSL_zalloc(sizeof (struct poll_event));
if (pe != NULL)
init_pe(pe, ssl);
return pe;
}
static struct poll_event_listener *
new_listener_pe(SSL *ssl_listener)
{
struct poll_event *listener_pe = new_pe(ssl_listener);
if (listener_pe != NULL) {
listener_pe->pe_type = PE_LISTENER;
listener_pe->pe_want_events = SSL_POLL_EVENT_IC | SSL_POLL_EVENT_EL;
}
return (struct poll_event_listener *)listener_pe;
}
static struct poll_event *
new_qconn_pe(SSL *ssl_qconn)
{
struct poll_event *qconn_pe;
struct poll_event_connection *pec;
qconn_pe = OPENSSL_zalloc(sizeof (struct poll_event_connection));
if (qconn_pe != NULL) {
init_pe(qconn_pe, ssl_qconn);
qconn_pe->pe_type = PE_CONNECTION;
qconn_pe->pe_want_events = SSL_POLL_EVENT_ISB | SSL_POLL_EVENT_ISU;
qconn_pe->pe_want_events |= SSL_POLL_EVENT_EC | SSL_POLL_EVENT_ECD;
/*
* SSL_POLL_EVENT_OSB (or SSL_POLL_EVENT_OSU) must be monitored once
* there is a request for outbound stream created by app.
*/
pec = (struct poll_event_connection *)qconn_pe;
ossl_list_peccx_init(&pec->pec_unistream_cx);
ossl_list_peccx_init(&pec->pec_stream_cx);
}
return qconn_pe;
}
static struct poll_event_stream *
new_stream_pe(SSL *ssl_qs)
{
struct poll_event_stream *pes;
pes = OPENSSL_zalloc(sizeof (struct poll_event_stream));
if (pes != NULL) {
init_pe((struct poll_event *)pes, ssl_qs);
pes->pes_wpos = pes->pes_reqbuf;
pes->pes_wpos_sz = sizeof (pes->pes_reqbuf) - 1;
}
return (pes);
}
static SSL *
get_ssl_from_pe(struct poll_event *pe)
{
SSL *ssl = NULL;
if (pe != NULL)
ssl = pe->pe_poll_item.desc.value.ssl;
return ssl;
}
static void
pe_pause_read(struct poll_event *pe)
{
pe->pe_want_events &= ~SSL_POLL_EVENT_R;
pe->pe_my_pm->pm_need_rebuild = 1;
}
static void
pe_resume_read(struct poll_event *pe)
{
pe->pe_want_events |= (SSL_POLL_EVENT_R & pe->pe_want_mask);
pe->pe_my_pm->pm_need_rebuild = 1;
}
static void
pe_pause_write(struct poll_event *pe)
{
pe->pe_want_events &= ~SSL_POLL_EVENT_W;
pe->pe_my_pm->pm_need_rebuild = 1;
}
static void
pe_resume_write(struct poll_event *pe)
{
pe->pe_want_events |= (SSL_POLL_EVENT_W & pe->pe_want_mask);
pe->pe_my_pm->pm_need_rebuild = 1;
}
/*
* like pause, but is permanent,
*/
static void
pe_disable_read(struct poll_event *pe)
{
pe_pause_read(pe);
pe->pe_want_mask &= ~SSL_POLL_EVENT_R;
}
static void
pe_disable_write(struct poll_event *pe)
{
pe_pause_write(pe);
pe->pe_want_mask &= ~SSL_POLL_EVENT_W;
}
/*
* handle_ssl_error() diagnoses error from SSL/QUIC stack and
* decides if it is temporal error (in that case it returns zero)
* or error is permanent. In case of permanent error the
* poll event pe should be removed from poll manager and destroyed.
*/
static ossl_unused const char *
err_str_n(unsigned long e, char *buf, size_t buf_sz)
{
ERR_error_string_n(e, buf, buf_sz);
return buf;
}
static int
handle_ssl_error(struct poll_event *pe, int rc, const char *caller)
{
SSL *ssl = get_ssl_from_pe(pe);
int ssl_error, rv;
#ifdef DEBUG
char err_str[120];
#endif
/* may be we should use SSL_shutdown_ex() to signal peer what's going on */
ssl_error = SSL_get_error(ssl, rc);
if (rc <= 0) {
switch (ssl_error) {
case SSL_ERROR_SYSCALL:
case SSL_ERROR_SSL:
DPRINTF(stderr, "%s permanent error on %p (%s) [ %s ]\n",
caller, pe, pe_type_to_name(pe),
err_str_n(ssl_error, err_str, sizeof (err_str)));
rv = -1;
break;
case SSL_ERROR_ZERO_RETURN:
default:
DPRINTF(stderr, "%s temporal error on %p (%s) [ %s ]\n",
caller, pe, pe_type_to_name(pe),
err_str_n(ssl_error, err_str, sizeof (err_str)));
rv = 0; /* maybe return -1 here too */
}
} else if (rc == 0) {
DPRINTF(stderr, "%s temporal error on %p (%s) [ %s ]\n",
caller, pe, pe_type_to_name(pe),
err_str_n(ssl_error, err_str, sizeof (err_str)));
rv = 0;
} else if (rc == 1) {
DPRINTF(stderr, "%s no error on %p (%s) [ ??? ]\n", caller, pe,
pe_type_to_name(pe));
rv = -1; /* complete, stop polling for event */
} else {
DPRINTF(stderr, "%s ?unexpected? error on %p (%s) [ %s ]\n",
caller, pe, pe_type_to_name(pe),
err_str_n(ssl_error, err_str, sizeof (err_str)));
rv = -1; /* stop polling */
}
return rv;
}
static ossl_unused const char *
stream_state_str(int stream_state)
{
const char *rv;
switch (stream_state) {
case SSL_STREAM_STATE_NONE:
rv = "SSL_STREAM_STATE_NONE";
break;
case SSL_STREAM_STATE_OK:
rv = "SSL_STREAM_STATE_OK";
break;
case SSL_STREAM_STATE_WRONG_DIR:
rv = "SSL_STREAM_STATE_WRONG_DIR";
break;
case SSL_STREAM_STATE_FINISHED:
rv = "SSL_STREAM_STATE_FINISHED";
break;
case SSL_STREAM_STATE_RESET_LOCAL:
rv = "SSL_STREAM_STATE_RESET_LOCAL";
break;
case SSL_STREAM_STATE_RESET_REMOTE:
rv = "SSL_STREAM_STATE_RESET_REMOTE";
break;
case SSL_STREAM_STATE_CONN_CLOSED:
rv = "SSL_STREAM_STATE_CONN_CLOSED";
break;
default:
rv = "???";
}
return rv;
}
static int
handle_read_stream_state(struct poll_event *pe)
{
int stream_state = SSL_get_stream_read_state(get_ssl_from_pe(pe));
int rv;
switch (stream_state) {
case SSL_STREAM_STATE_FINISHED:
DPRINTF(stderr, "%s remote peer concluded the stream\n", __func__);
pe_disable_read(pe);
/* FALLTHRU */
case SSL_STREAM_STATE_OK:
rv = 0;
break;
default:
DPRINTF(stderr,
"%s error %s on stream, the %p (%s) should be destroyed\n",
__func__, stream_state_str(stream_state), pe,
pe_type_to_name(pe));
rv = -1;
}
return rv;
}
static int
handle_write_stream_state(struct poll_event *pe)
{
int state = SSL_get_stream_write_state(get_ssl_from_pe(pe));
int rv;
switch (state) {
case SSL_STREAM_STATE_FINISHED:
DPRINTF(stderr, "%s remote peer concluded the stream\n", __func__);
/* FALLTHRU */
case SSL_STREAM_STATE_OK:
rv = 0;
break;
default:
DPRINTF(stderr,
"%s error %s on stream, the %p (%s) should be destroyed\n",
__func__, stream_state_str(state), pe, pe_type_to_name(pe));
rv = -1;
}
return rv;
}
static void
add_pe_to_pm(struct poll_manager *pm, struct poll_event *pe)
{
if (pe->pe_my_pm == NULL) {
ossl_list_pe_insert_head(&pm->pm_head, pe);
pm->pm_need_rebuild = 1;
pe->pe_my_pm = pm;
}
}
static void
remove_pe_from_pm(struct poll_manager *pm, struct poll_event *pe)
{
if (pe->pe_my_pm == pm) {
ossl_list_pe_remove(&pm->pm_head, pe);
pm->pm_need_rebuild = 1;
pe->pe_my_pm = NULL;
}
}
static struct poll_manager *
create_poll_manager(void)
{
struct poll_manager *pm = NULL;
pm = OPENSSL_zalloc(sizeof (struct poll_manager));
if (pm == NULL)
return NULL;
ossl_list_pe_init(&pm->pm_head);
pm->pm_poll_set = OPENSSL_malloc_array(POLL_GROW,
sizeof (struct poll_event));
if (pm->pm_poll_set != NULL) {
pm->pm_poll_set_sz = POLL_GROW;
pm->pm_event_count = 0;
} else {
OPENSSL_free(pm);
return NULL;
}
return pm;
}
static int
rebuild_poll_set(struct poll_manager *pm)
{
struct poll_event *new_poll_set;
struct poll_event *pe;
size_t pe_num;
size_t i;
if (pm->pm_need_rebuild == 0)
return 0;
pe_num = ossl_list_pe_num(&pm->pm_head);
if (pe_num > pm->pm_poll_set_sz) {
/*
* grow poll set by POLL_GROW
*/
new_poll_set = OPENSSL_realloc_array(pm->pm_poll_set,
pm->pm_poll_set_sz + POLL_GROW,
sizeof (struct poll_event));
if (new_poll_set == NULL)
return -1;
pm->pm_poll_set = new_poll_set;
pm->pm_poll_set_sz += POLL_GROW;
} else if ((pe_num + POLL_DOWNSIZ) < pm->pm_poll_set_sz) {
/*
* shrink poll set by POLL_DOWNSIZ
*/
new_poll_set = OPENSSL_realloc_array(pm->pm_poll_set,
pm->pm_poll_set_sz - POLL_DOWNSIZ,
sizeof (struct poll_event));
if (new_poll_set == NULL)
return -1;
pm->pm_poll_set = new_poll_set;
pm->pm_poll_set_sz -= POLL_GROW;
}
i = 0;
DPRINTF(stderr, "%s there %zu events to poll\n", __func__,
ossl_list_pe_num(&pm->pm_head));
OSSL_LIST_FOREACH(pe, pe, &pm->pm_head) {
pe->pe_poll_item.events = pe->pe_want_events;
pm->pm_poll_set[i++] = *pe;
DPRINTF(stderr, "\t%p (%s) " POLL_FMT " (disabled: " POLL_FMT ")\n",
pe, pe_type_to_name(pe),
POLL_PRINTA(pe->pe_poll_item.events),
POLL_PRINTA(~pe->pe_want_mask));
}
pm->pm_event_count = (unsigned int)i;
pm->pm_need_rebuild = 0;
return 0;
}
static void
destroy_poll_manager(struct poll_manager *pm)
{
struct poll_event *pe, *pe_safe;
if (pm == NULL)
return;
OSSL_LIST_FOREACH_DELSAFE(pe, pe_safe, pe, &pm->pm_head)
destroy_pe(pe);
OPENSSL_free(pm->pm_poll_set);
OPENSSL_free(pm);
}
static void
destroy_pe(struct poll_event *pe)
{
SSL *ssl;
if (pe == NULL)
return;
DPRINTF(stderr, "%s %p (%s)\n", __func__, pe, pe_type_to_name(pe));
ssl = get_ssl_from_pe(pe);
if (pe->pe_my_pm)
remove_pe_from_pm(pe->pe_my_pm, pe);
pe->pe_cb_ondestroy(pe);
OPENSSL_free(pe);
SSL_free(ssl);
}
static int
pe_return_error(struct poll_event *pe)
{
return -1;
}
static void
pe_return_void(struct poll_event *ctx)
{
return;
}
static int
pe_handle_listener_error(struct poll_event *pe)
{
pe->pe_my_pm->pm_continue = 0;
if (pe->pe_poll_item.revents & SSL_POLL_EVENT_EL)
return -1;
DPRINTF(stderr, "%s unexpected error on %p (%s) " POLL_FMT "\n", __func__,
pe, pe_type_to_name(pe), POLL_PRINTA(pe->pe_poll_item.revents));
return -1;
}
static struct poll_event_stream *
pe_to_stream(struct poll_event *pe)
{
switch (pe->pe_type) {
case PE_STREAM:
case PE_STREAM_UNI_IN:
case PE_STREAM_UNI_OUT:
return ((struct poll_event_stream *)pe);
default:
return NULL;
}
}
/*
* non-blocking variant for new_stream(). Creating outbound stream
* is two step process when using non-blocking I/O.
* application starts polling for SSL_POLL_EVENT_OS* to check
* if outbound streams are available.
*
* as soon as SSL_POLL_EVENT_OS comes back from SSL_poll() application
* should call SSL-new_stream() to create a stream object and
* add its poll descriptor to SSL_poll() events. The stream object
* should be monitored for SSL_POLL_EVENT_{W,R}
*
* new_stream() function below is supposed to be called by application
* which uses SSL_poll() to manage I/O. We expect there might be more
* than 1 stream request.
*/
static int
request_new_stream(struct poll_event_connection *pec, uint64_t qsflag,
void *peccx_arg)
{
struct poll_event_context *peccx;
struct poll_event *qconn_pe = (struct poll_event *)pec;
if (peccx_arg == NULL)
return -1;
peccx = OPENSSL_malloc(sizeof (struct poll_event_context));
if (peccx == NULL)
return -1;
peccx->peccx = peccx_arg;
if (qsflag & SSL_STREAM_FLAG_UNI) {
pec->pec_want_unistream++;
qconn_pe->pe_want_events |= SSL_POLL_EVENT_OSU;
ossl_list_peccx_insert_tail(&pec->pec_unistream_cx, peccx);
} else {
pec->pec_want_stream++;
qconn_pe->pe_want_events |= SSL_POLL_EVENT_OSB;
ossl_list_peccx_insert_tail(&pec->pec_stream_cx, peccx);
}
/*
* We are changing poll events, so SSL_poll() array needs be rebuilt.
*/
qconn_pe->pe_my_pm->pm_need_rebuild = 1;
return 0;
}
static void *
get_response_from_pec(struct poll_event_connection *pec, int stype)
{
struct poll_event_context *peccx;
void *rv;
switch (stype) {
case PE_STREAM_UNI_OUT:
peccx = ossl_list_peccx_head(&pec->pec_unistream_cx);
if (peccx != NULL) {
pec->pec_want_unistream--;
ossl_list_peccx_remove(&pec->pec_unistream_cx, peccx);
rv = peccx->peccx;
OPENSSL_free(peccx);
} else {
rv = NULL;
}
break;
case PE_STREAM:
peccx = ossl_list_peccx_head(&pec->pec_stream_cx);
if (peccx != NULL) {
pec->pec_want_stream--;
ossl_list_peccx_remove(&pec->pec_stream_cx, peccx);
rv = peccx->peccx;
OPENSSL_free(peccx);
} else {
rv = NULL;
}
break;
default:
rv = NULL;
}
return rv;
}
static int
app_handle_stream_error(struct poll_event *pe)
{
int rv = 0;
if (pe->pe_poll_item.revents & SSL_POLL_EVENT_ER) {
if ((pe->pe_poll_item.events & SSL_POLL_EVENT_R) == 0) {
DPRINTF(stderr, "%s unexpected failure on reader %p (%s) "
POLL_FMT "\n", __func__, pe, pe_type_to_name(pe),
POLL_PRINTA(pe->pe_poll_item.revents));
}
(void) handle_read_stream_state(pe);
rv = -1; /* tell pm to stop polling and destroy stream/event */
} else if (pe->pe_poll_item.revents & SSL_POLL_EVENT_EW) {
if ((pe->pe_poll_item.events & SSL_POLL_EVENT_W) == 0) {
DPRINTF(stderr, "%s unexpected failure on writer %p (%s) "
POLL_FMT "\n", __func__, pe, pe_type_to_name(pe),
POLL_PRINTA(pe->pe_poll_item.revents));
}
(void) handle_write_stream_state(pe);
rv = -1; /* tell pm to stop polling and destroy stream/event */
} else {
DPRINTF(stderr, "%s unexpected failure on writer/reader %p (%s) "
POLL_FMT "\n", __func__, pe, pe_type_to_name(pe),
POLL_PRINTA(pe->pe_poll_item.revents));
rv = -1; /* tell pm to stop polling and destroy stream/event */
}
return rv;
}
/*
* app_write_cb() callback notifies application the QUIC stack
* is ready to send data. The write callback attempts to process
* all buffers in write queue.
* if write queue becomes empty, stream is concluded.
*/
static int
app_write_cb(struct poll_event *pe)
{
struct response_buffer *rb = (struct response_buffer *)pe->pe_appdata;
char buf[4096];
size_t written;
unsigned int wlen;
int rv;
if (rb == NULL) {
DPRINTF(stderr, "%s no response buffer\n", __func__);
return -1;
}
wlen = rb_read(rb, buf, sizeof (buf));
if (wlen == 0) {
DPRINTF(stderr, "%s no more data to write to %p (%s)\n", __func__,
pe, pe_type_to_name(pe));
rv = SSL_stream_conclude(get_ssl_from_pe(pe), 0);
pe_disable_write(pe);
/*
* we deliberately override return value of SSL_stream_conclude() here
* to keep CI build happy. -1 means we are going to kill poll event
* anyway.
*
* another option would be to return 0 and let poll manager wait
* for confirmation of FIN packet sent on behalf of
* SSL_stream_conclude(). At the moment it does not seem necessary.
* More details can be found here:
* https://github.com/openssl/project/issues/1160
*/
rv = -1;
} else {
rv = SSL_write_ex(get_ssl_from_pe(pe), buf, wlen, &written);
if (rv == 1) {
rb_advrpos(rb, (unsigned int)written);
rv = 0;
} else {
rv = handle_ssl_error(pe, rv, __func__);
}
}
return rv;
}
static int
app_setup_response(struct poll_event_stream *pes)
{
struct poll_event *pe = (struct poll_event *)pes;
int rv;
switch (pe->pe_type) {
case PE_STREAM_UNI_IN:
rv = request_new_stream(pes->pes_conn, SSL_STREAM_FLAG_UNI,
pe->pe_appdata);
break;
case PE_STREAM:
pe->pe_cb_out = app_write_cb;
rv = 0;
pe_resume_write(pe);
break;
default:
rv = -1;
}
return rv;
}
static unsigned int
get_fsize(const char *file_name)
{
const char *digit = file_name;
unsigned int fsize;
/* any number we find in filename is desired size */
fsize = 0;
while (*digit && !isdigit((int)*digit))
digit++;
while (*digit && isdigit((int)*digit)) {
fsize = fsize * 10;
fsize = fsize + (*digit - 0x30);
digit++;
}
if (fsize == 0)
fsize = 12345; /* ? may be random ? */
return fsize;
}
static int
parse_request(struct poll_event_stream *pes)
{
const char *pos = pes->pes_reqbuf;
char file_name_buf[4096];
char *dst = file_name_buf;
char *end = &file_name_buf[4096];
char *file_name;
struct poll_event *pe = (struct poll_event *)pes;
int rv;
/* got request already */
if (pe->pe_appdata != NULL)
return -1;
while (*pos && isspace((int)*pos))
pos++;
if (strncasecmp(pos, "GET", 3) != 0)
return -1; /* this will reset the stream */
pos += 3;
while (*pos && isspace((int)*pos))
pos++;
if (*pos != '/')
return -1; /* this will reset the stream */
/* strip leading slashes */
while (*pos == '/')
pos++;
while ((isalnum((int)*pos) || ispunct((int)*pos)) && (dst < end))
*dst++ = *pos++;
if (dst == end)
dst--;
*dst = '\0';
/*
* if request is something like 'GET / HTTP/1.0...' we assume /index.html
* otherwise take the last component
*/
if (file_name_buf[0] == '\0') {
file_name = "index.html";
} else {
file_name = basename(file_name_buf);
/*
* I'm not sure what happens when file_name_buf looks for example
* like that: /foo/bar/nothing/
* (the basename component is missing/is empty).
*/
if (file_name == NULL || *file_name == '\0')
file_name = "foo";
}
assert(pe->pe_appdata == NULL);
pe->pe_appdata = new_txt_full_respoonse(file_name, get_fsize(file_name));
if (pe->pe_appdata == NULL)
rv = -1;
else
rv = app_setup_response(pes);
return rv;
}
static int
wrap_around(struct poll_event_stream *pes)
{
int rv = 0;
/* we can wrap the buffer iff we got request */
if (pes->pes_wpos_sz == 0) {
if (((struct poll_event *)pes)->pe_appdata != NULL) {
pes->pes_wpos = pes->pes_reqbuf;
pes->pes_wpos_sz = sizeof (pes->pes_reqbuf) - 1;
} else {
rv = -1;
}
}
return rv;
}
/*
* app_read_cb() callback notifies application there are data
* waiting to be read from stream. The callback allocates
* new linked buffer and reads data from stream to newly allocated
* buffer. It then uses request_write() to put the buffer to write
* queue so data can be echoed back to client.
*/
static int
app_read_cb(struct poll_event *pe)
{
struct poll_event_stream *pes = pe_to_stream(pe);
size_t read_len;
int rv;
if (pes == NULL)
return -1;
/*
* if we could not parse the request in the first chunk (8k), then just
* fail the stream with reset. If we got request then finish reading
* data from client.
*/
if (wrap_around(pes) == -1)
return -1;
rv = SSL_read_ex(get_ssl_from_pe(pe), pes->pes_wpos, pes->pes_wpos_sz,
&read_len);
if (rv == 0) {
pe_disable_read(pe);
/*
* May be it's over cautious, we should just examine stream state and
* decide if we can continue with poll (rv == 0) or we should stop
* polling (rv == -1).
*/
rv = handle_ssl_error(pe, rv, __func__);
if (rv == 0)
rv = handle_read_stream_state(pe);
return rv;
}
pes->pes_wpos += read_len;
pes->pes_wpos_sz -= (unsigned int)read_len;
rv = parse_request(pes);
return rv;
}
static void
app_ondestroy_cb(struct poll_event *pe)
{
rb_destroy((struct response_buffer *)pe->pe_appdata);
}
/*
* create new outbound stream
*/
static int
app_new_stream_cb(struct poll_event *qconn_pe)
{
SSL *qconn;
SSL *qs;
struct poll_event_connection *pec;
struct poll_event *qs_pe;
struct poll_event_stream *pes;
int rv = 0;
assert(qconn_pe->pe_poll_item.revents & SSL_POLL_EVENT_OS);
pec = pe_to_connection(qconn_pe);
assert(pec != NULL);
qconn = get_ssl_from_pe(qconn_pe);
if (qconn_pe->pe_poll_item.revents & SSL_POLL_EVENT_OSU)
qs = SSL_new_stream(qconn, SSL_STREAM_FLAG_UNI);
else
qs = SSL_new_stream(qconn, 0);
if (qs == NULL)
return -1;
pes = new_stream_pe(qs);
qs_pe = (struct poll_event *)pes;
if (qconn_pe != NULL) {
qs_pe->pe_cb_error = app_handle_stream_error;
qs_pe->pe_cb_out = app_write_cb; /* unidirectional stream is outbound */
qs_pe->pe_cb_ondestroy = app_ondestroy_cb;
qs_pe->pe_want_events = SSL_POLL_EVENT_EW;
if (qconn_pe->pe_poll_item.revents & SSL_POLL_EVENT_OSU) {
qs_pe->pe_type = PE_STREAM_UNI_OUT;
} else if (qconn_pe->pe_poll_item.revents & SSL_POLL_EVENT_OSB) {
/* we will enable read side for bi-directional stream */
qs_pe->pe_type = PE_STREAM;
qs_pe->pe_cb_out = app_read_cb;
qs_pe->pe_want_events = SSL_POLL_EVENT_ER;
}
qs_pe->pe_appdata = get_response_from_pec(pec, qs_pe->pe_type);
if (qs_pe->pe_appdata == NULL) {
rv = -1;
destroy_pe(qs_pe);
} else {
add_pe_to_pm(qconn_pe->pe_my_pm, qs_pe);
pe_resume_write(qs_pe);
/* enable read side on bidirectional outbound streams */
if (qconn_pe->pe_poll_item.revents & SSL_POLL_EVENT_OSB)
pe_resume_read(qs_pe);
}
} else {
SSL_free(qs);
rv = -1;
}
return rv;
}
static int
app_handle_qconn_error(struct poll_event *pe)
{
int rv = -2;
if (pe->pe_poll_item.revents & SSL_POLL_EVENT_EC) {
DPRINTF(stderr,
"%s connection shutdown started on %p (%s), keep polling\n",
__func__, pe, pe_type_to_name(pe));
/*
* shutdown has started, Not sure what we should be doing here.
* So the plan is to call SSL_shutdown() here and stop monitoring
* _EVENT_EC here. We will keep _EVENT_ECD monitored.
* Shall we call shutdown too?
*/
SSL_shutdown(get_ssl_from_pe(pe));
/*
* adjust _want_events, don't forget to ask poll manager to rebuild
* poll set so _want_events can take effect in next loop iteration
*/
pe->pe_want_events &= ~SSL_POLL_EVENT_EC;
pe->pe_my_pm->pm_need_rebuild = 1;
rv = 0;
}
if (pe->pe_poll_item.revents & SSL_POLL_EVENT_ECD) {
DPRINTF(stderr,
"%s connection shutdown done on %p (%s), stop polling\n",
__func__, pe, pe_type_to_name(pe));
rv = -1; /* shutdown is complete stop polling let pe to be destroyed */
}
if (rv == -2) {
DPRINTF(stderr, "%s unexpected event on %p (%s)" POLL_FMT "\n",
__func__, pe, pe_type_to_name(pe),
POLL_PRINTA(pe->pe_poll_item.revents));
rv = -1;
}
return rv;
}
/*
* accept stream from remote peer
*/
static int
app_accept_stream_cb(struct poll_event *qconn_pe)
{
SSL *qconn;
SSL *qs;
struct poll_event *qs_pe;
int rv = 0;
#ifdef DEBUG
struct poll_event_connection *pec;
assert(qconn_pe->pe_poll_item.revents & SSL_POLL_EVENT_IS);
pec = pe_to_connection(qconn_pe);
assert(pec != NULL);
#endif
qconn = get_ssl_from_pe(qconn_pe);
if (qconn_pe->pe_poll_item.revents & SSL_POLL_EVENT_ISU)
qs = SSL_accept_stream(qconn, SSL_STREAM_FLAG_UNI);
else
qs = SSL_accept_stream(qconn, SSL_STREAM_FLAG_UNI);
if (qs == NULL)
return -1;
qs_pe = (struct poll_event *)new_stream_pe(qs);
if (qs_pe != NULL) {
qs_pe->pe_cb_error = app_handle_stream_error;
qs_pe->pe_cb_in = app_read_cb;
qs_pe->pe_cb_ondestroy = app_ondestroy_cb;
qs_pe->pe_want_events = SSL_POLL_EVENT_ER;
add_pe_to_pm(qconn_pe->pe_my_pm, qs_pe);
if (qconn_pe->pe_poll_item.revents & SSL_POLL_EVENT_ISU) {
qs_pe->pe_type = PE_STREAM_UNI_IN;
} else if (qconn_pe->pe_poll_item.revents & SSL_POLL_EVENT_ISB) {
qs_pe->pe_type = PE_STREAM;
/*
* disable write side on duplex (bi-directional) stream,
* because we need to read response from client first.
*/
pe_pause_write(qs_pe);
}
qs_pe->pe_appdata = NULL;
pe_resume_read(qs_pe);
} else {
SSL_free(qs);
rv = -1;
}
return rv;
}
static void
app_destroy_qconn(struct poll_event *pe)
{
struct poll_event_connection *pec;
struct poll_event_context *peccx, *peccx_save;
pec = pe_to_connection(pe);
if (pec == NULL)
return;
OSSL_LIST_FOREACH_DELSAFE(peccx, peccx_save, peccx, &pec->pec_unistream_cx) {
peccx->peccx_cb_ondestroy(peccx->peccx);
OPENSSL_free(peccx);
}
OSSL_LIST_FOREACH_DELSAFE(peccx, peccx_save, peccx, &pec->pec_stream_cx) {
peccx->peccx_cb_ondestroy(peccx->peccx);
OPENSSL_free(peccx);
}
}
static int
app_accept_qconn(struct poll_event *listener_pe)
{
SSL *listener;
SSL *qconn;
struct poll_event *qc_pe;
listener = get_ssl_from_pe(listener_pe);
qconn = SSL_accept_connection(listener, 0);
if (qconn == NULL)
return -1;
qc_pe = new_qconn_pe(qconn);
if (qc_pe != NULL) {
qc_pe->pe_cb_in = app_accept_stream_cb;
qc_pe->pe_cb_out = app_new_stream_cb;
qc_pe->pe_cb_error = app_handle_qconn_error;
qc_pe->pe_cb_ondestroy = app_destroy_qconn;
add_pe_to_pm(listener_pe->pe_my_pm, qc_pe);
} else {
SSL_free(qconn);
return -1;
}
return 0;
}
/*
* Main loop for server to accept QUIC connections.
* Echo every request back to the client.
*/
static int
run_quic_server(SSL_CTX *ctx, struct poll_manager *pm, int fd)
{
int ok = -1;
int e = 0;
unsigned int i;
SSL *listener;
struct poll_event *pe;
struct poll_event_listener *listener_pe = NULL;
size_t poll_items;
/* Create a new QUIC listener */
if ((listener = SSL_new_listener(ctx, 0)) == NULL)
goto err;
if (!SSL_set_fd(listener, fd))
goto err;
/*
* Set the listener mode to non-blocking, which is inherited by
* child objects.
*/
if (!SSL_set_blocking_mode(listener, 0))
goto err;
/*
* Begin listening. Note that is not usually needed as SSL_accept_connection
* will implicitly start listening. It is only needed if a server wishes to
* ensure it has started to accept incoming connections but does not wish to
* actually call SSL_accept_connection yet.
*/
if (!SSL_listen(listener))
goto err;
listener_pe = new_listener_pe(listener);
if (listener_pe == NULL)
goto err;
listener = NULL; /* listener_pe took ownership */
pe = (struct poll_event *)listener_pe;
pe->pe_cb_in = app_accept_qconn;
pe->pe_cb_error = pe_handle_listener_error;
add_pe_to_pm(pm, pe);
listener_pe = NULL; /* listener is owned by pm now */
/*
* Begin an infinite loop of listening for connections. We will only
* exit this loop if we encounter an error.
*/
pm->pm_continue = 1;
while (pm->pm_continue) {
rebuild_poll_set(pm);
ok = SSL_poll((SSL_POLL_ITEM *)pm->pm_poll_set, pm->pm_event_count,
sizeof (struct poll_event), NULL, 0, &poll_items);
if (ok == 0 && poll_items == 0)
break;
for (i = 0; i < pm->pm_event_count; i++) {
pe = &pm->pm_poll_set[i];
if (pe->pe_poll_item.revents == 0)
continue;
DPRINTF(stderr, "%s %s (%p) " POLL_FMT "\n", __func__,
pe_type_to_name(pe), pe,
POLL_PRINTA(pe->pe_poll_item.revents));
pe->pe_self->pe_poll_item.revents = pe->pe_poll_item.revents;
if (pe->pe_poll_item.revents & SSL_POLL_ERROR)
e = pe->pe_cb_error(pe->pe_self);
else if (pe->pe_poll_item.revents & SSL_POLL_IN)
e = pe->pe_cb_in(pe->pe_self);
else if (pe->pe_poll_item.revents & SSL_POLL_OUT)
e = pe->pe_cb_out(pe->pe_self);
if (e == -1) {
pe = pm->pm_poll_set[i].pe_self;
destroy_pe(pe);
}
}
}
ok = EXIT_SUCCESS;
err:
SSL_free(listener);
destroy_pe((struct poll_event *)listener_pe);
destroy_poll_manager(pm);
return ok;
}
/*
* ALPN strings for TLS handshake. Only 'http/1.0' and 'hq-interop'
* are accepted.
*/
static const unsigned char alpn_ossltest[] = {
8, 'h', 't', 't', 'p', '/', '1', '.', '0',
10, 'h', 'q', '-', 'i', 'n', 't', 'e', 'r', 'o', 'p',
};
/*
* This callback validates and negotiates the desired ALPN on the server side.
*/
static int
select_alpn(SSL *ssl, const unsigned char **out, unsigned char *out_len,
const unsigned char *in, unsigned int in_len, void *arg)
{
if (SSL_select_next_proto((unsigned char **)out, out_len, alpn_ossltest,
sizeof(alpn_ossltest), in,
in_len) == OPENSSL_NPN_NEGOTIATED)
return SSL_TLSEXT_ERR_OK;
return SSL_TLSEXT_ERR_ALERT_FATAL;
}
/* Create SSL_CTX. */
static SSL_CTX *
create_ctx(const char *cert_path, const char *key_path)
{
SSL_CTX *ctx;
/*
* An SSL_CTX holds shared configuration information for multiple
* subsequent per-client connections. We specifically load a QUIC
* server method here.
*/
ctx = SSL_CTX_new(OSSL_QUIC_server_method());
if (ctx == NULL)
goto err;
/*
* Load the server's certificate *chain* file (PEM format), which includes
* not only the leaf (end-entity) server certificate, but also any
* intermediate issuer-CA certificates. The leaf certificate must be the
* first certificate in the file.
*
* In advanced use-cases this can be called multiple times, once per public
* key algorithm for which the server has a corresponding certificate.
* However, the corresponding private key (see below) must be loaded first,
* *before* moving on to the next chain file.
*
* The requisite files "chain.pem" and "pkey.pem" can be generated by running
* "make chain" in this directory. If the server will be executed from some
* other directory, move or copy the files there.
*/
if (SSL_CTX_use_certificate_chain_file(ctx, cert_path) <= 0) {
DPRINTF(stderr, "couldn't load certificate file: %s\n", cert_path);
goto err;
}
/*
* Load the corresponding private key, this also checks that the private
* key matches the just loaded end-entity certificate. It does not check
* whether the certificate chain is valid, the certificates could be
* expired, or may otherwise fail to form a chain that a client can validate.
*/
if (SSL_CTX_use_PrivateKey_file(ctx, key_path, SSL_FILETYPE_PEM) <= 0) {
DPRINTF(stderr, "couldn't load key file: %s\n", key_path);
goto err;
}
/*
* Clients rarely employ certificate-based authentication, and so we don't
* require "mutual" TLS authentication (indeed there's no way to know
* whether or how the client authenticated the server, so the term "mutual"
* is potentially misleading).
*
* Since we're not soliciting or processing client certificates, we don't
* need to configure a trusted-certificate store, so no call to
* SSL_CTX_set_default_verify_paths() is needed. The server's own
* certificate chain is assumed valid.
*/
SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, NULL);
/* Setup ALPN negotiation callback to decide which ALPN is accepted. */
SSL_CTX_set_alpn_select_cb(ctx, select_alpn, NULL);
return ctx;
err:
SSL_CTX_free(ctx);
return NULL;
}
/* Create UDP socket on the given port. */
static int
create_socket(uint16_t port)
{
int fd;
struct sockaddr_in sa = {0};
/* Retrieve the file descriptor for a new UDP socket */
if ((fd = (int)socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0) {
DPRINTF(stderr, "cannot create socket");
return -1;
}
sa.sin_family = AF_INET;
sa.sin_port = htons(port);
/* Bind to the new UDP socket on localhost */
if (bind(fd, (const struct sockaddr *)&sa, sizeof(sa)) < 0) {
DPRINTF(stderr, "cannot bind to %u\n", port);
BIO_closesocket(fd);
return -1;
}
/* Set port to nonblocking mode */
if (BIO_socket_nbio(fd, 1) <= 0) {
DPRINTF(stderr, "Unable to set port to nonblocking mode");
BIO_closesocket(fd);
return -1;
}
return fd;
}
/* Minimal QUIC HTTP/1.0 server. */
int
main(int argc, char *argv[])
{
int res = EXIT_FAILURE;
SSL_CTX *ctx = NULL;
int fd;
unsigned long port;
struct poll_manager *pm;
#ifdef _WIN32
progname = argv[0];
#endif
if (argc != 4)
errx(res, "usage: %s <port> <server.crt> <server.key>", argv[0]);
/* Create SSL_CTX that supports QUIC. */
if ((ctx = create_ctx(argv[2], argv[3])) == NULL) {
ERR_print_errors_fp(stderr);
errx(res, "Failed to create context");
}
/* Parse port number from command line arguments. */
port = strtoul(argv[1], NULL, 0);
if (port == 0 || port > UINT16_MAX) {
SSL_CTX_free(ctx);
errx(res, "Failed to parse port number");
}
/* Create and bind a UDP socket. */
if ((fd = create_socket((uint16_t)port)) < 0) {
SSL_CTX_free(ctx);
ERR_print_errors_fp(stderr);
errx(res, "Failed to create socket");
}
pm = create_poll_manager();
if (pm == NULL) {
SSL_CTX_free(ctx);
ERR_print_errors_fp(stderr);
errx(res, "Failed to create socket");
}
/* QUIC server connection acceptance loop. */
if (run_quic_server(ctx, pm, fd) < 0) {
SSL_CTX_free(ctx);
BIO_closesocket(fd);
ERR_print_errors_fp(stderr);
errx(res, "Error in QUIC server loop");
}
destroy_poll_manager(pm);
/* Free resources. */
SSL_CTX_free(ctx);
BIO_closesocket(fd);
res = EXIT_SUCCESS;
return res;
}