3#if __has_include(<openssl/bio.h>)
6#include <openssl/bio.h>
7#include <openssl/err.h>
8#include <openssl/pem.h>
9#include <openssl/ssl.h>
16#include "sockutils.hpp"
17#include "promises.hpp"
41 std::function<void(
const char*)>
LogFunc = {};
57 static TSslContext
Client(
const std::function<
void(
const char*)>& logFunc = {});
66 static TSslContext
Server(
const char* certfile,
const char* keyfile,
const std::function<
void(
const char*)>& logFunc = {});
77 static TSslContext
ServerFromMem(
const void* certfile,
const void* keyfile,
const std::function<
void(
const char*)>& logFunc = {});
107template<
typename TSocket>
119 : Socket(std::move(socket))
121 , Ssl(SSL_new(Ctx->Ctx))
122 , Rbio(BIO_new(BIO_s_mem()))
123 , Wbio(BIO_new(BIO_s_mem()))
125 SSL_set_bio(Ssl, Rbio, Wbio);
126 SSL_set_mode(Ssl, SSL_MODE_ENABLE_PARTIAL_WRITE);
127 SSL_set_mode(Ssl, SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER);
132 *
this = std::move(other);
135 TSslSocket& operator=(TSslSocket&& other) {
136 if (
this != &other) {
137 Socket = std::move(other.Socket);
142 Handshake = other.Handshake;
144 other.Rbio = other.Wbio =
nullptr;
145 other.Handshake =
nullptr;
151 TSslSocket& operator=(
const TSslSocket&) =
delete;
158 if (Ssl) { SSL_free(Ssl); }
159 if (Handshake) { Handshake.destroy(); }
171 SSL_set_tlsext_host_name(Ssl, host.c_str());
183 auto underlying = std::move(
co_await Socket.
Accept());
184 auto socket =
TSslSocket(std::move(underlying), *Ctx);
185 co_await socket.AcceptHandshake();
186 co_return std::move(socket);
197 SSL_set_accept_state(Ssl);
198 co_return co_await DoHandshake();
213 co_await Socket.
Connect(address, deadline);
214 SSL_set_connect_state(Ssl);
215 co_return co_await DoHandshake();
226 co_await WaitHandshake();
228 int n = SSL_read(Ssl, data, size);
236 n = SSL_read(Ssl, data, size);
237 status = SSL_get_error(Ssl, n);
238 }
while (n < 0 && (status == SSL_ERROR_WANT_READ || status == SSL_ERROR_WANT_WRITE));
251 co_await WaitHandshake();
254 const char* p = (
const char*)data;
256 auto n = SSL_write(Ssl, p, size);
257 auto status = SSL_get_error(Ssl, n);
258 if (!(status == SSL_ERROR_WANT_READ || status == SSL_ERROR_WANT_WRITE || status == SSL_ERROR_NONE)) {
259 throw std::runtime_error(
"SSL error: " + std::to_string(status));
262 throw std::runtime_error(
"SSL error: " + std::to_string(status));
275 return Socket.Poller();
282 while ((n = BIO_read(Wbio, buf,
sizeof(buf))) > 0) {
285 if (n < 0 && !BIO_should_retry(Wbio)) {
286 throw std::runtime_error(
"Cannot read Wbio");
289 if (SSL_get_error(Ssl, n) == SSL_ERROR_WANT_READ) {
290 auto size =
co_await Socket.
ReadSome(buf,
sizeof(buf));
292 throw std::runtime_error(
"Connection closed");
296 auto n = BIO_write(Rbio, p, size);
298 throw std::runtime_error(
"Cannot write Rbio");
308 TFuture<void> DoHandshake() {
311 while ((r = SSL_do_handshake(Ssl)) != 1) {
313 int status = SSL_get_error(Ssl, r);
314 if (status == SSL_ERROR_WANT_READ || status == SSL_ERROR_WANT_WRITE) {
317 throw std::runtime_error(
"SSL error: " + std::to_string(r));
326 Ctx->LogFunc(
"SSL Handshake established\n");
329 for (
auto w : Waiters) {
337 void StartHandshake() {
339 Handshake = RunHandshake();
342 TVoidSuspendedTask RunHandshake() {
344 co_await DoHandshake();
348 auto WaitHandshake() {
349 if (!SSL_is_init_finished(Ssl) && !Handshake) {
354 return !handshake || handshake.done();
357 void await_suspend(std::coroutine_handle<> h) {
358 waiters->push_back(h);
361 void await_resume() { }
363 std::coroutine_handle<> handshake;
364 std::vector<std::coroutine_handle<>>* waiters;
367 return TAwaitable { Handshake, &Waiters };
371 if (!Ctx->LogFunc)
return;
375 const char * state = SSL_state_string_long(Ssl);
376 if (state != LastState) {
378 snprintf(buf,
sizeof(buf),
"SSL-STATE: %s", state);
386 TSslContext* Ctx =
nullptr;
392 const char* LastState =
nullptr;
394 std::coroutine_handle<> Handshake;
395 std::vector<std::coroutine_handle<>> Waiters;
A class representing an IPv4 or IPv6 address (with port).
Definition address.hpp:38
Backend-independent base for I/O pollers.
Definition poller.hpp:38
auto ReadSome(void *buf, size_t size)
Asynchronously reads data from the socket into the provided buffer.
Definition socket.hpp:139
High-level asynchronous socket for network communication.
Definition socket.hpp:367
auto Connect(const TAddress &addr, TTime deadline=TTime::max())
Asynchronously connects to the specified address.
Definition socket.hpp:405
auto Accept()
Asynchronously accepts an incoming connection.
Definition socket.hpp:456
TLS layer over any connected socket, exposing the same ReadSome/WriteSome interface.
Definition ssl.hpp:108
void SslSetTlsExtHostName(const std::string &host)
Sets the TLS SNI host name sent in the ClientHello.
Definition ssl.hpp:170
auto Poller()
Returns the poller associated with the underlying socket.
Definition ssl.hpp:274
TFuture< ssize_t > WriteSome(const void *data, size_t size)
Encrypts and sends all size bytes from data.
Definition ssl.hpp:250
TFuture< void > Connect(const TAddress &address, TTime deadline=TTime::max())
TCP-connects to address and performs the client-side TLS handshake.
Definition ssl.hpp:211
~TSslSocket()
Frees the SSL instance, associated BIOs, and any in-progress handshake coroutine.
Definition ssl.hpp:156
TFuture< ssize_t > ReadSome(void *data, size_t size)
Reads up to size decrypted bytes into data.
Definition ssl.hpp:225
TSslSocket(TSocket &&socket, TSslContext &ctx)
Constructs a TSslSocket, taking ownership of the underlying socket.
Definition ssl.hpp:118
TFuture< void > AcceptHandshake()
Performs the server-side TLS handshake on an already-accepted TCP socket.
Definition ssl.hpp:195
TFuture< TSslSocket< TSocket > > Accept()
Accepts a TCP connection and performs the server-side TLS handshake.
Definition ssl.hpp:182
Implementation of a promise/future system for coroutines.
A utility for writing data to a socket-like object.
Definition sockutils.hpp:239
TFuture< void > Write(const void *data, size_t size)
Writes exactly size bytes from data to the socket.
Definition sockutils.hpp:262
Owned coroutine handle that carries a result of type T.
Definition corochain.hpp:185
Owns an OpenSSL SSL_CTX and optional log callback.
Definition ssl.hpp:39
static TSslContext ServerFromMem(const void *certfile, const void *keyfile, const std::function< void(const char *)> &logFunc={})
Creates a TLS server context from PEM data already in memory.
Definition ssl.cpp:53
static TSslContext Client(const std::function< void(const char *)> &logFunc={})
Creates a TLS client context (no certificate required).
Definition ssl.cpp:24
static TSslContext Server(const char *certfile, const char *keyfile, const std::function< void(const char *)> &logFunc={})
Creates a TLS server context from PEM files on disk.
Definition ssl.cpp:32
std::function< void(const char *)> LogFunc
Optional logging callback.
Definition ssl.hpp:41
SSL_CTX * Ctx
The underlying OpenSSL context.
Definition ssl.hpp:40