/* */ #ifndef WIN_TLS_SESSION_H #define WIN_TLS_SESSION_H #include #include "common.h" #include "TLSSession.h" #include "WinTLSContext.h" namespace aria2 { namespace wintls { struct Buffer { private: size_t off_, free_, cap_; std::vector buf_; public: inline Buffer() : off_(0), free_(0), cap_(0) {} inline size_t size() const { return off_; } inline size_t free() const { return free_; } inline void resize(size_t len) { if (cap_ >= len) { return; } buf_.resize(len); cap_ = buf_.size(); free_ = cap_ - off_; } inline char* data() { return buf_.data(); } inline char* end() { return buf_.data() + off_; } inline void eat(size_t len) { off_ -= len; if (off_) { memmove(buf_.data(), buf_.data() + len, off_); } free_ = cap_ - off_; } inline void clear() { eat(off_); } inline void advance(size_t len) { off_ += len; free_ = cap_ - off_; } inline void write(const void* data, size_t len) { if (!len) { return; } resize(off_ + len); memcpy(end(), data, len); advance(len); } }; } // namespace wintls class WinTLSSession : public TLSSession { enum state_t { st_constructed, st_initialized, st_handshake_write, st_handshake_write_last, st_handshake_read, st_handshake_done, st_connected, st_closing, st_closed, st_error }; public: WinTLSSession(WinTLSContext* ctx); // MUST deallocate all resources virtual ~WinTLSSession(); // Initializes SSL/TLS session. The |sockfd| is the underlying // tranport socket. This function returns TLS_ERR_OK if it // succeeds, or TLS_ERR_ERROR. virtual int init(sock_t sockfd) CXX11_OVERRIDE; // Sets |hostname| for TLS SNI extension. This is only meaningful for // client side session. This function returns TLS_ERR_OK if it // succeeds, or TLS_ERR_ERROR. virtual int setSNIHostname(const std::string& hostname) CXX11_OVERRIDE; // Closes the SSL/TLS session. Don't close underlying transport // socket. This function returns TLS_ERR_OK if it succeeds, or // TLS_ERR_ERROR. virtual int closeConnection() CXX11_OVERRIDE; // Returns TLS_WANT_READ if SSL/TLS session needs more data from // remote endpoint to proceed, or TLS_WANT_WRITE if SSL/TLS session // needs to write more data to proceed. If SSL/TLS session needs // neither read nor write data at the moment, return value is // undefined. virtual int checkDirection() CXX11_OVERRIDE; // Sends |data| with length |len|. This function returns the number // of bytes sent if it succeeds, or TLS_ERR_WOULDBLOCK if the // underlying tranport blocks, or TLS_ERR_ERROR. virtual ssize_t writeData(const void* data, size_t len) CXX11_OVERRIDE; // Receives data into |data| with length |len|. This function returns // the number of bytes received if it succeeds, or TLS_ERR_WOULDBLOCK // if the underlying tranport blocks, or TLS_ERR_ERROR. virtual ssize_t readData(void* data, size_t len) CXX11_OVERRIDE; // Performs client side handshake. The |hostname| is the hostname of // the remote endpoint and is used to verify its certificate. This // function returns TLS_ERR_OK if it succeeds, or TLS_ERR_WOULDBLOCK // if the underlying transport blocks, or TLS_ERR_ERROR. // When returning TLS_ERR_ERROR, provide certificate validation error // in |handshakeErr|. virtual int tlsConnect(const std::string& hostname, TLSVersion& version, std::string& handshakeErr) CXX11_OVERRIDE; // Performs server side handshake. This function returns TLS_ERR_OK // if it succeeds, or TLS_ERR_WOULDBLOCK if the underlying transport // blocks, or TLS_ERR_ERROR. virtual int tlsAccept(TLSVersion& version) CXX11_OVERRIDE; // Returns last error string virtual std::string getLastErrorString() CXX11_OVERRIDE; private: std::string hostname_; sock_t sockfd_; TLSSessionSide side_; CredHandle* cred_; CtxtHandle handle_; // Buffer for already encrypted writes wintls::Buffer writeBuf_; // While the writeBuf_ holds encrypted messages, writeBuffered_ has the // corresponding size of unencrpted data used to procude the messages. size_t writeBuffered_; // Buffer for still encrypted reads wintls::Buffer readBuf_; // Buffer for already decrypted reads wintls::Buffer decBuf_; state_t state_; SECURITY_STATUS status_; std::unique_ptr streamSizes_; }; } // namespace aria2 #endif // TLS_SESSION_H