Added TLS support for API and many other TLS related changes.
This commit is contained in:
103
src/base/net/tls/ServerTls.cpp
Normal file
103
src/base/net/tls/ServerTls.cpp
Normal file
@@ -0,0 +1,103 @@
|
||||
/* XMRig
|
||||
* Copyright 2018-2020 SChernykh <https://github.com/SChernykh>
|
||||
* Copyright 2016-2020 XMRig <https://github.com/xmrig>, <support@xmrig.com>
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation, either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
*/
|
||||
|
||||
|
||||
#include "base/net/tls/ServerTls.h"
|
||||
|
||||
|
||||
#include <cassert>
|
||||
#include <cstring>
|
||||
#include <openssl/ssl.h>
|
||||
|
||||
|
||||
xmrig::ServerTls::ServerTls(SSL_CTX *ctx) :
|
||||
m_ctx(ctx)
|
||||
{
|
||||
}
|
||||
|
||||
|
||||
xmrig::ServerTls::~ServerTls()
|
||||
{
|
||||
if (m_ssl) {
|
||||
SSL_free(m_ssl);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
bool xmrig::ServerTls::isTLS(const char *data, size_t size)
|
||||
{
|
||||
static const uint8_t test[3] = { 0x16, 0x03, 0x01 };
|
||||
|
||||
return size >= sizeof(test) && memcmp(data, test, sizeof(test)) == 0;
|
||||
}
|
||||
|
||||
|
||||
bool xmrig::ServerTls::send(const char *data, size_t size)
|
||||
{
|
||||
SSL_write(m_ssl, data, size);
|
||||
|
||||
return write(m_write);
|
||||
}
|
||||
|
||||
|
||||
void xmrig::ServerTls::read(const char *data, size_t size)
|
||||
{
|
||||
if (!m_ssl) {
|
||||
m_ssl = SSL_new(m_ctx);
|
||||
|
||||
m_write = BIO_new(BIO_s_mem());
|
||||
m_read = BIO_new(BIO_s_mem());
|
||||
|
||||
SSL_set_accept_state(m_ssl);
|
||||
SSL_set_bio(m_ssl, m_read, m_write);
|
||||
}
|
||||
|
||||
|
||||
BIO_write(m_read, data, size);
|
||||
|
||||
if (!SSL_is_init_finished(m_ssl)) {
|
||||
const int rc = SSL_do_handshake(m_ssl);
|
||||
|
||||
if (rc < 0 && SSL_get_error(m_ssl, rc) == SSL_ERROR_WANT_READ) {
|
||||
write(m_write);
|
||||
} else if (rc == 1) {
|
||||
write(m_write);
|
||||
|
||||
m_ready = true;
|
||||
read();
|
||||
}
|
||||
else {
|
||||
shutdown();
|
||||
}
|
||||
|
||||
return;
|
||||
}
|
||||
|
||||
read();
|
||||
}
|
||||
|
||||
|
||||
void xmrig::ServerTls::read()
|
||||
{
|
||||
static char buf[16384]{};
|
||||
|
||||
int bytes_read = 0;
|
||||
while ((bytes_read = SSL_read(m_ssl, buf, sizeof(buf))) > 0) {
|
||||
parse(buf, bytes_read);
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user