aboutsummaryrefslogtreecommitdiffstats
path: root/lib/ssl_openssl.c
diff options
context:
space:
mode:
authorWilmer van der Gaast <wilmer@gaast.net>2006-10-19 09:51:35 +0200
committerWilmer van der Gaast <wilmer@gaast.net>2006-10-19 09:51:35 +0200
commitf920d9eb003541245e0fc32a381447cbba8fbea5 (patch)
treeefb538af41a8c4f59da72d41114c6ec9b6c0f9d4 /lib/ssl_openssl.c
parent1991be623c6c53d2f61f0b15405d41d144c21c8f (diff)
Added starttls code to ssl_openssl.c so GnuTLS isn't the only supported
SSL module in this branch anymore.
Diffstat (limited to 'lib/ssl_openssl.c')
-rw-r--r--lib/ssl_openssl.c117
1 files changed, 77 insertions, 40 deletions
diff --git a/lib/ssl_openssl.c b/lib/ssl_openssl.c
index b6f6c520..b1ba1db9 100644
--- a/lib/ssl_openssl.c
+++ b/lib/ssl_openssl.c
@@ -52,23 +52,66 @@ struct scd
};
static gboolean ssl_connected( gpointer data, gint source, b_input_condition cond );
+static gboolean ssl_starttls_real( gpointer data, gint source, b_input_condition cond );
+static gboolean ssl_handshake( gpointer data, gint source, b_input_condition cond );
void *ssl_connect( char *host, int port, ssl_input_function func, gpointer data )
{
struct scd *conn = g_new0( struct scd, 1 );
- SSL_METHOD *meth;
conn->fd = proxy_connect( host, port, ssl_connected, conn );
conn->func = func;
conn->data = data;
+ conn->inpa = -1;
if( conn->fd < 0 )
{
g_free( conn );
- return( NULL );
+ return NULL;
}
+ return conn;
+}
+
+void *ssl_starttls( int fd, ssl_input_function func, gpointer data )
+{
+ struct scd *conn = g_new0( struct scd, 1 );
+
+ conn->fd = fd;
+ conn->func = func;
+ conn->data = data;
+ conn->inpa = -1;
+
+ /* This function should be called via a (short) timeout instead of
+ directly from here, because these SSL calls are *supposed* to be
+ *completely* asynchronous and not ready yet when this function
+ (or *_connect, for examle) returns. Also, errors are reported via
+ the callback function, not via this function's return value.
+
+ In short, doing things like this makes the rest of the code a lot
+ simpler. */
+
+ b_timeout_add( 1, ssl_starttls_real, conn );
+
+ return conn;
+}
+
+static gboolean ssl_starttls_real( gpointer data, gint source, b_input_condition cond )
+{
+ struct scd *conn = data;
+
+ return ssl_connected( conn, conn->fd, GAIM_INPUT_WRITE );
+}
+
+static gboolean ssl_connected( gpointer data, gint source, b_input_condition cond )
+{
+ struct scd *conn = data;
+ SSL_METHOD *meth;
+
+ if( source == -1 )
+ goto ssl_connected_failure;
+
if( !initialized )
{
initialized = TRUE;
@@ -78,35 +121,35 @@ void *ssl_connect( char *host, int port, ssl_input_function func, gpointer data
meth = TLSv1_client_method();
conn->ssl_ctx = SSL_CTX_new( meth );
if( conn->ssl_ctx == NULL )
- {
- conn->fd = -1;
- return( NULL );
- }
+ goto ssl_connected_failure;
conn->ssl = SSL_new( conn->ssl_ctx );
if( conn->ssl == NULL )
- {
- conn->fd = -1;
- return( NULL );
- }
-
- return( conn );
-}
-
-static gboolean ssl_handshake( gpointer data, gint source, b_input_condition cond );
-
-static gboolean ssl_connected( gpointer data, gint source, b_input_condition cond )
-{
- struct scd *conn = data;
-
- if( source == -1 )
- return ssl_handshake( data, -1, cond );
+ goto ssl_connected_failure;
/* We can do at least the handshake with non-blocking I/O */
sock_make_nonblocking( conn->fd );
SSL_set_fd( conn->ssl, conn->fd );
return ssl_handshake( data, source, cond );
+
+ssl_connected_failure:
+ conn->func( conn->data, NULL, cond );
+
+ if( conn->ssl )
+ {
+ SSL_shutdown( conn->ssl );
+ SSL_free( conn->ssl );
+ }
+ if( conn->ssl_ctx )
+ {
+ SSL_CTX_free( conn->ssl_ctx );
+ }
+ if( source >= 0 ) closesocket( source );
+ g_free( conn );
+
+ return FALSE;
+
}
static gboolean ssl_handshake( gpointer data, gint source, b_input_condition cond )
@@ -118,7 +161,18 @@ static gboolean ssl_handshake( gpointer data, gint source, b_input_condition con
{
conn->lasterr = SSL_get_error( conn->ssl, st );
if( conn->lasterr != SSL_ERROR_WANT_READ && conn->lasterr != SSL_ERROR_WANT_WRITE )
- goto ssl_connected_failure;
+ {
+ conn->func( conn->data, NULL, cond );
+
+ SSL_shutdown( conn->ssl );
+ SSL_free( conn->ssl );
+ SSL_CTX_free( conn->ssl_ctx );
+
+ if( source >= 0 ) closesocket( source );
+ g_free( conn );
+
+ return FALSE;
+ }
conn->inpa = b_input_add( conn->fd, ssl_getdirection( conn ), ssl_handshake, data );
return FALSE;
@@ -128,23 +182,6 @@ static gboolean ssl_handshake( gpointer data, gint source, b_input_condition con
sock_make_blocking( conn->fd ); /* For now... */
conn->func( conn->data, conn, cond );
return FALSE;
-
-ssl_connected_failure:
- conn->func( conn->data, NULL, cond );
-
- if( conn->ssl )
- {
- SSL_shutdown( conn->ssl );
- SSL_free( conn->ssl );
- }
- if( conn->ssl_ctx )
- {
- SSL_CTX_free( conn->ssl_ctx );
- }
- if( source >= 0 ) closesocket( source );
- g_free( conn );
-
- return FALSE;
}
int ssl_read( void *conn, char *buf, int len )