diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2021-03-12 21:08:13 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2021-03-12 21:08:13 +0000 |
commit | 8cf1b43148f689d41e29b4ba281b603acd9dd6c6 (patch) | |
tree | 4562b8f672b12e680383e0f27cda40a392c4386d /src/net_dot.c | |
parent | Adding upstream version 2.4.2+debian. (diff) | |
download | dnsperf-8cf1b43148f689d41e29b4ba281b603acd9dd6c6.tar.xz dnsperf-8cf1b43148f689d41e29b4ba281b603acd9dd6c6.zip |
Adding upstream version 2.5.0+debian.upstream/2.5.0+debian
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/net_dot.c')
-rw-r--r-- | src/net_dot.c | 468 |
1 files changed, 468 insertions, 0 deletions
diff --git a/src/net_dot.c b/src/net_dot.c new file mode 100644 index 0000000..90ceb22 --- /dev/null +++ b/src/net_dot.c @@ -0,0 +1,468 @@ +/* + * Copyright 2019-2021 OARC, Inc. + * Copyright 2017-2018 Akamai Technologies + * Copyright 2006-2016 Nominum, Inc. + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#include "config.h" + +#include "net.h" + +#include "log.h" +#include "strerror.h" +#include "util.h" +#include "os.h" + +#include <errno.h> +#include <fcntl.h> +#include <unistd.h> +#include <openssl/err.h> +#include <sys/socket.h> +#include <netinet/in.h> +#include <ck_pr.h> + +static SSL_CTX* ssl_ctx = 0; + +#define self ((struct perf__dot_socket*)sock) + +struct perf__dot_socket { + struct perf_net_socket base; + + pthread_mutex_t lock; + SSL* ssl; + + char recvbuf[TCP_RECV_BUF_SIZE], sendbuf[TCP_SEND_BUF_SIZE]; + size_t at, sending; + bool is_ready, is_conn_ready, have_more, is_sending, do_reconnect; + + perf_sockaddr_t server, local; + size_t bufsize; + + uint16_t qid; + + uint64_t conn_ts; + perf_socket_event_t conn_event; +}; + +static void perf__dot_connect(struct perf_net_socket* sock) +{ + int ret; + + self->is_ready = true; + + int fd = socket(self->server.sa.sa.sa_family, SOCK_STREAM, 0); + if (fd == -1) { + char __s[256]; + perf_log_fatal("socket: %s", perf_strerror_r(errno, __s, sizeof(__s))); + } + ck_pr_store_int(&sock->fd, fd); + + if (self->ssl) { + SSL_free(self->ssl); + } + if (!(self->ssl = SSL_new(ssl_ctx))) { + perf_log_fatal("SSL_new(): %s", ERR_error_string(ERR_get_error(), 0)); + } + if (!(ret = SSL_set_fd(self->ssl, sock->fd))) { + perf_log_fatal("SSL_set_fd(): %s", ERR_error_string(SSL_get_error(self->ssl, ret), 0)); + } + + if (self->server.sa.sa.sa_family == AF_INET6) { + int on = 1; + + if (setsockopt(sock->fd, IPPROTO_IPV6, IPV6_V6ONLY, &on, sizeof(on)) == -1) { + perf_log_warning("setsockopt(IPV6_V6ONLY) failed"); + } + } + + if (bind(sock->fd, &self->local.sa.sa, self->local.length) == -1) { + char __s[256]; + perf_log_fatal("bind: %s", perf_strerror_r(errno, __s, sizeof(__s))); + } + + if (self->bufsize > 0) { + ret = setsockopt(sock->fd, SOL_SOCKET, SO_RCVBUF, + &self->bufsize, sizeof(self->bufsize)); + if (ret < 0) + perf_log_warning("setsockbuf(SO_RCVBUF) failed"); + + ret = setsockopt(sock->fd, SOL_SOCKET, SO_SNDBUF, + &self->bufsize, sizeof(self->bufsize)); + if (ret < 0) + perf_log_warning("setsockbuf(SO_SNDBUF) failed"); + } + + int flags = fcntl(sock->fd, F_GETFL, 0); + if (flags < 0) + perf_log_fatal("fcntl(F_GETFL)"); + ret = fcntl(sock->fd, F_SETFL, flags | O_NONBLOCK); + if (ret < 0) + perf_log_fatal("fcntl(F_SETFL)"); + + self->conn_ts = perf_get_time(); + if (connect(sock->fd, &self->server.sa.sa, self->server.length)) { + if (errno == EINPROGRESS) { + self->is_ready = false; + } else { + char __s[256]; + perf_log_fatal("connect() failed: %s", perf_strerror_r(errno, __s, sizeof(__s))); + } + } +} + +static void perf__dot_reconnect(struct perf_net_socket* sock) +{ + close(sock->fd); + self->have_more = false; + self->at = 0; + if (self->sending) { + self->sending = 0; + self->is_sending = false; + } + self->is_conn_ready = false; + perf__dot_connect(sock); +} + +static ssize_t perf__dot_recv(struct perf_net_socket* sock, void* buf, size_t len, int flags) +{ + ssize_t n; + uint16_t dnslen, dnslen2; + + if (!self->have_more) { + PERF_LOCK(&self->lock); + if (!self->is_ready) { + PERF_UNLOCK(&self->lock); + errno = EAGAIN; + return -1; + } + + n = SSL_read(self->ssl, self->recvbuf + self->at, TCP_RECV_BUF_SIZE - self->at); + if (!n) { + perf__dot_reconnect(sock); + PERF_UNLOCK(&self->lock); + errno = EAGAIN; + return -1; + } + if (n < 0) { + int err = SSL_get_error(self->ssl, n); + switch (err) { + case SSL_ERROR_WANT_READ: + errno = EAGAIN; + break; + case SSL_ERROR_SYSCALL: + switch (errno) { + case ECONNREFUSED: + case ECONNRESET: + case ENOTCONN: + perf__dot_reconnect(sock); + errno = EAGAIN; + break; + default: + break; + } + break; + default: + errno = EBADF; + break; + } + PERF_UNLOCK(&self->lock); + return -1; + } + PERF_UNLOCK(&self->lock); + + self->at += n; + if (self->at < 3) { + errno = EAGAIN; + return -1; + } + } + + memcpy(&dnslen, self->recvbuf, 2); + dnslen = ntohs(dnslen); + if (self->at < dnslen + 2) { + errno = EAGAIN; + return -1; + } + memcpy(buf, self->recvbuf + 2, len < dnslen ? len : dnslen); + memmove(self->recvbuf, self->recvbuf + 2 + dnslen, self->at - 2 - dnslen); + self->at -= 2 + dnslen; + + if (self->at > 2) { + memcpy(&dnslen2, self->recvbuf, 2); + dnslen2 = ntohs(dnslen2); + if (self->at >= dnslen2 + 2) { + self->have_more = true; + return dnslen; + } + } + + self->have_more = false; + return dnslen; +} + +static ssize_t perf__dot_sendto(struct perf_net_socket* sock, uint16_t qid, const void* buf, size_t len, int flags, const struct sockaddr* dest_addr, socklen_t addrlen) +{ + size_t send = len < TCP_SEND_BUF_SIZE - 2 ? len : (TCP_SEND_BUF_SIZE - 2); + // TODO: We only send what we can send, because we can't continue sending + uint16_t dnslen = htons(send); + ssize_t n; + + PERF_LOCK(&self->lock); + if (!self->is_ready) { + PERF_UNLOCK(&self->lock); + errno = EAGAIN; + return -1; + } + + memcpy(self->sendbuf, &dnslen, 2); + memcpy(self->sendbuf + 2, buf, send); + self->qid = qid; + + n = SSL_write(self->ssl, self->sendbuf, send + 2); + if (n < 1) { + switch (SSL_get_error(self->ssl, n)) { + case SSL_ERROR_SYSCALL: + switch (errno) { + case ECONNREFUSED: + case ECONNRESET: + case ENOTCONN: + case EPIPE: + perf__dot_reconnect(sock); + self->is_sending = true; + self->sending = 0; + PERF_UNLOCK(&self->lock); + errno = EINPROGRESS; + return -1; + default: + break; + } + PERF_UNLOCK(&self->lock); + return -1; + case SSL_ERROR_WANT_READ: + case SSL_ERROR_WANT_WRITE: + self->is_sending = true; + self->sending = 0; + PERF_UNLOCK(&self->lock); + errno = EINPROGRESS; + return -1; + default: + break; + } + perf_log_warning("SSL_write(): %s", ERR_error_string(SSL_get_error(self->ssl, n), 0)); + errno = EBADF; + return -1; + } + + if (n < send + 2) { + self->sending = n; + self->is_sending = true; + PERF_UNLOCK(&self->lock); + errno = EINPROGRESS; + return -1; + } + PERF_UNLOCK(&self->lock); + + return n - 2; +} + +static int perf__dot_close(struct perf_net_socket* sock) +{ + // TODO + return close(sock->fd); +} + +static int perf__dot_sockeq(struct perf_net_socket* sock_a, struct perf_net_socket* sock_b) +{ + return sock_a->fd == sock_b->fd; +} + +static int perf__dot_sockready(struct perf_net_socket* sock, int pipe_fd, int64_t timeout) +{ + PERF_LOCK(&self->lock); + if (self->do_reconnect) { + perf__dot_reconnect(sock); + self->do_reconnect = false; + } + + if (self->is_ready) { + if (self->is_sending) { + uint16_t dnslen; + ssize_t n; + + memcpy(&dnslen, self->sendbuf, 2); + dnslen = ntohs(dnslen); + + n = SSL_write(self->ssl, self->sendbuf + self->sending, dnslen + 2 - self->sending); + if (n < 1) { + switch (SSL_get_error(self->ssl, n)) { + case SSL_ERROR_SYSCALL: + switch (errno) { + case ECONNREFUSED: + case ECONNRESET: + case ENOTCONN: + case EPIPE: + perf__dot_reconnect(sock); + PERF_UNLOCK(&self->lock); + errno = EINPROGRESS; + return -1; + default: + break; + } + PERF_UNLOCK(&self->lock); + return -1; + case SSL_ERROR_WANT_READ: + case SSL_ERROR_WANT_WRITE: + PERF_UNLOCK(&self->lock); + errno = EINPROGRESS; + return -1; + default: + break; + } + perf_log_warning("SSL_write(): %s", ERR_error_string(SSL_get_error(self->ssl, n), 0)); + errno = EBADF; + PERF_UNLOCK(&self->lock); + return -1; + } + PERF_UNLOCK(&self->lock); + + self->sending += n; + if (self->sending < dnslen + 2) { + errno = EINPROGRESS; + return -1; + } + self->sending = 0; + self->is_sending = false; + if (sock->sent) { + sock->sent(sock, self->qid); + } + return 1; + } + PERF_UNLOCK(&self->lock); + return 1; + } + + if (!self->is_conn_ready) { + switch (perf_os_waituntilanywritable(&sock, 1, pipe_fd, timeout)) { + case PERF_R_TIMEDOUT: + PERF_UNLOCK(&self->lock); + return -1; + case PERF_R_SUCCESS: { + int error = 0; + socklen_t len = (socklen_t)sizeof(error); + + getsockopt(sock->fd, SOL_SOCKET, SO_ERROR, (void*)&error, &len); + if (error != 0) { + if (error == EINPROGRESS +#if EWOULDBLOCK != EAGAIN + || error == EWOULDBLOCK +#endif + || error == EAGAIN) { + PERF_UNLOCK(&self->lock); + return 0; + } + PERF_UNLOCK(&self->lock); + return -1; + } + break; + } + default: + PERF_UNLOCK(&self->lock); + return -1; + } + self->is_conn_ready = true; + } + + int ret = SSL_connect(self->ssl); + if (!ret) { + perf_log_warning("SSL_connect(): %s", ERR_error_string(SSL_get_error(self->ssl, ret), 0)); + PERF_UNLOCK(&self->lock); + return -1; + } + if (ret < 0) { + int err = SSL_get_error(self->ssl, ret); + if (err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) { + PERF_UNLOCK(&self->lock); + return 0; + } + self->do_reconnect = true; + PERF_UNLOCK(&self->lock); + perf_log_warning("SSL_connect(): %s", ERR_error_string(err, 0)); + return -1; + } + self->is_ready = true; + PERF_UNLOCK(&self->lock); + if (sock->event) { + sock->event(sock, self->conn_event, perf_get_time() - self->conn_ts); + self->conn_event = perf_socket_event_reconnect; + } + if (self->is_sending) { + errno = EINPROGRESS; + return -1; + } + return 1; +} + +static bool perf__dot_have_more(struct perf_net_socket* sock) +{ + return self->have_more; +} + +struct perf_net_socket* perf_net_dot_opensocket(const perf_sockaddr_t* server, const perf_sockaddr_t* local, size_t bufsize) +{ + struct perf__dot_socket* tmp = calloc(1, sizeof(struct perf__dot_socket)); // clang scan-build + struct perf_net_socket* sock = (struct perf_net_socket*)tmp; + + if (!sock) { + perf_log_fatal("perf_net_dot_opensocket() out of memory"); + return 0; // needed for clang scan build + } + + sock->recv = perf__dot_recv; + sock->sendto = perf__dot_sendto; + sock->close = perf__dot_close; + sock->sockeq = perf__dot_sockeq; + sock->sockready = perf__dot_sockready; + sock->have_more = perf__dot_have_more; + + self->server = *server; + self->local = *local; + self->bufsize = bufsize; + if (self->bufsize > 0) { + self->bufsize *= 1024; + } + self->conn_event = perf_socket_event_connect; + PERF_MUTEX_INIT(&self->lock); + + if (!ssl_ctx) { +#ifdef HAVE_TLS_METHOD + if (!(ssl_ctx = SSL_CTX_new(TLS_method()))) { + perf_log_fatal("SSL_CTX_new(): %s", ERR_error_string(ERR_get_error(), 0)); + } + if (!SSL_CTX_set_min_proto_version(ssl_ctx, TLS1_2_VERSION)) { + perf_log_fatal("SSL_CTX_set_min_proto_version(TLS1_2_VERSION): %s", ERR_error_string(ERR_get_error(), 0)); + } +#else + if (!(ssl_ctx = SSL_CTX_new(SSLv23_client_method()))) { + perf_log_fatal("SSL_CTX_new(): %s", ERR_error_string(ERR_get_error(), 0)); + } +#endif + SSL_CTX_set_mode(ssl_ctx, SSL_MODE_ENABLE_PARTIAL_WRITE); + } + + perf__dot_connect(sock); + + return sock; +} |