mirror of
https://github.com/cesanta/mongoose.git
synced 2025-01-19 08:03:14 +08:00
Fixed mg_upload() and some SSL related issues
This commit is contained in:
parent
2b87f909ce
commit
b589e0cdf4
205
mongoose.c
205
mongoose.c
@ -139,6 +139,7 @@ typedef long off_t;
|
||||
#define flockfile(x) EnterCriticalSection(&global_log_file_lock)
|
||||
#define funlockfile(x) LeaveCriticalSection(&global_log_file_lock)
|
||||
#define sleep(x) Sleep((x) * 1000)
|
||||
#define va_copy(x, y) x = y
|
||||
|
||||
#if !defined(fileno)
|
||||
#define fileno(x) _fileno(x)
|
||||
@ -296,45 +297,15 @@ typedef int socklen_t;
|
||||
|
||||
static const char *http_500_error = "Internal Server Error";
|
||||
|
||||
// Snatched from OpenSSL includes. I put the prototypes here to be independent
|
||||
// from the OpenSSL source installation. Having this, mongoose + SSL can be
|
||||
// built on any system with binary SSL libraries installed.
|
||||
#if defined(NO_SSL_DL)
|
||||
#include <openssl/ssl.h>
|
||||
#else
|
||||
// SSL loaded dynamically from DLL.
|
||||
// I put the prototypes here to be independent from OpenSSL source installation.
|
||||
typedef struct ssl_st SSL;
|
||||
typedef struct ssl_method_st SSL_METHOD;
|
||||
typedef struct ssl_ctx_st SSL_CTX;
|
||||
|
||||
#define SSL_ERROR_WANT_READ 2
|
||||
#define SSL_ERROR_WANT_WRITE 3
|
||||
#define SSL_FILETYPE_PEM 1
|
||||
#define CRYPTO_LOCK 1
|
||||
|
||||
#if defined(NO_SSL_DL)
|
||||
extern void SSL_free(SSL *);
|
||||
extern int SSL_accept(SSL *);
|
||||
extern int SSL_connect(SSL *);
|
||||
extern int SSL_read(SSL *, void *, int);
|
||||
extern int SSL_write(SSL *, const void *, int);
|
||||
extern int SSL_get_error(const SSL *, int);
|
||||
extern int SSL_set_fd(SSL *, int);
|
||||
extern int SSL_pending(SSL *);
|
||||
extern SSL *SSL_new(SSL_CTX *);
|
||||
extern SSL_CTX *SSL_CTX_new(SSL_METHOD *);
|
||||
extern SSL_METHOD *SSLv23_server_method(void);
|
||||
extern SSL_METHOD *SSLv23_client_method(void);
|
||||
extern int SSL_library_init(void);
|
||||
extern void SSL_load_error_strings(void);
|
||||
extern int SSL_CTX_use_PrivateKey_file(SSL_CTX *, const char *, int);
|
||||
extern int SSL_CTX_use_certificate_file(SSL_CTX *, const char *, int);
|
||||
extern int SSL_CTX_use_certificate_chain_file(SSL_CTX *, const char *);
|
||||
extern void SSL_CTX_set_default_passwd_cb(SSL_CTX *, mg_callback_t);
|
||||
extern void SSL_CTX_free(SSL_CTX *);
|
||||
extern unsigned long ERR_get_error(void);
|
||||
extern char *ERR_error_string(unsigned long, char *);
|
||||
extern int CRYPTO_num_locks(void);
|
||||
extern void CRYPTO_set_locking_callback(void (*)(int, int, const char *, int));
|
||||
extern void CRYPTO_set_id_callback(unsigned long (*)(void));
|
||||
#else
|
||||
// Dynamically loaded SSL functionality
|
||||
struct ssl_func {
|
||||
const char *name; // SSL function name
|
||||
void (*ptr)(void); // Function pointer
|
||||
@ -363,6 +334,7 @@ struct ssl_func {
|
||||
(* (int (*)(SSL_CTX *, const char *)) ssl_sw[16].ptr)
|
||||
#define SSLv23_client_method (* (SSL_METHOD * (*)(void)) ssl_sw[17].ptr)
|
||||
#define SSL_pending (* (int (*)(SSL *)) ssl_sw[18].ptr)
|
||||
#define SSL_CTX_set_verify (* (void (*)(SSL_CTX *, int, int)) ssl_sw[19].ptr)
|
||||
|
||||
#define CRYPTO_num_locks (* (int (*)(void)) crypto_sw[0].ptr)
|
||||
#define CRYPTO_set_locking_callback \
|
||||
@ -396,6 +368,7 @@ static struct ssl_func ssl_sw[] = {
|
||||
{"SSL_CTX_use_certificate_chain_file", NULL},
|
||||
{"SSLv23_client_method", NULL},
|
||||
{"SSL_pending", NULL},
|
||||
{"SSL_CTX_set_verify", NULL},
|
||||
{NULL, NULL}
|
||||
};
|
||||
|
||||
@ -494,7 +467,6 @@ static const char *config_options[] = {
|
||||
struct mg_context {
|
||||
volatile int stop_flag; // Should we stop event loop
|
||||
SSL_CTX *ssl_ctx; // SSL context
|
||||
SSL_CTX *client_ssl_ctx; // Client SSL context
|
||||
char *config[NUM_OPTIONS]; // Mongoose configuration parameters
|
||||
mg_callback_t user_callback; // User-defined callback function
|
||||
void *user_data; // User-defined data
|
||||
@ -517,6 +489,7 @@ struct mg_connection {
|
||||
struct mg_request_info request_info;
|
||||
struct mg_context *ctx;
|
||||
SSL *ssl; // SSL descriptor
|
||||
SSL_CTX *client_ssl_ctx; // SSL context for client connections
|
||||
struct socket client; // Connected client
|
||||
time_t birth_time; // Time when request was received
|
||||
int64_t num_bytes_sent; // Total bytes sent to client
|
||||
@ -1414,7 +1387,7 @@ static pid_t spawn_process(struct mg_connection *conn, const char *prog,
|
||||
pid_t pid;
|
||||
const char *interp;
|
||||
|
||||
envblk = NULL; // Unused
|
||||
(void) envblk;
|
||||
|
||||
if ((pid = fork()) == -1) {
|
||||
// Parent
|
||||
@ -1492,7 +1465,7 @@ static int64_t push(FILE *fp, SOCKET sock, SSL *ssl, const char *buf,
|
||||
n = send(sock, buf + sent, (size_t) k, MSG_NOSIGNAL);
|
||||
}
|
||||
|
||||
if (n < 0)
|
||||
if (n <= 0)
|
||||
break;
|
||||
|
||||
sent += n;
|
||||
@ -1627,34 +1600,42 @@ int mg_write(struct mg_connection *conn, const void *buf, size_t len) {
|
||||
return (int) total;
|
||||
}
|
||||
|
||||
// Print message to buffer. If buffer is large enough to hold the message,
|
||||
// return buffer. If buffer is to small, allocate large enough buffer on heap,
|
||||
// and return allocated buffer.
|
||||
static int alloc_vprintf(char **buf, size_t size, const char *fmt, va_list ap) {
|
||||
va_list ap_copy;
|
||||
int len;
|
||||
|
||||
// Windows is not standard-compliant, and vsnprintf() returns -1 if
|
||||
// buffer is too small. Also, older versions of msvcrt.dll do not have
|
||||
// _vscprintf(). However, if size is 0, vsnprintf() behaves correctly.
|
||||
// Therefore, we make two passes: on first pass, get required message length.
|
||||
// On second pass, actually print the message.
|
||||
va_copy(ap_copy, ap);
|
||||
len = vsnprintf(NULL, 0, fmt, ap_copy);
|
||||
|
||||
if (len > (int) size &&
|
||||
(size = len + 1) > 0 &&
|
||||
(*buf = (char *) malloc(size)) == NULL) {
|
||||
len = -1; // Allocation failed, mark failure
|
||||
} else {
|
||||
va_copy(ap_copy, ap);
|
||||
vsnprintf(*buf, size, fmt, ap_copy);
|
||||
}
|
||||
|
||||
return len;
|
||||
}
|
||||
|
||||
int mg_vprintf(struct mg_connection *conn, const char *fmt, va_list ap) {
|
||||
char mem[MG_BUF_LEN], *buf = mem;
|
||||
int len;
|
||||
|
||||
// Print in a local buffer first, hoping that it is large enough to
|
||||
// hold the whole message
|
||||
len = vsnprintf(mem, sizeof(mem), fmt, ap);
|
||||
|
||||
if (len == 0) {
|
||||
// Do nothing. mg_printf(conn, "%s", "") was called.
|
||||
} else if (len < 0) {
|
||||
// vsnprintf() error, give up
|
||||
len = -1;
|
||||
cry(conn, "%s(%s, ...): vsnprintf() error", __func__, fmt);
|
||||
} else if (len > (int) sizeof(mem) &&
|
||||
(buf = (char *) malloc(len + 1)) != NULL) {
|
||||
// Local buffer is not large enough, allocate big buffer on heap
|
||||
vsnprintf(buf, len + 1, fmt, ap);
|
||||
if ((len = alloc_vprintf(&buf, sizeof(mem), fmt, ap)) > 0) {
|
||||
len = mg_write(conn, buf, (size_t) len);
|
||||
}
|
||||
if (buf != mem && buf != NULL) {
|
||||
free(buf);
|
||||
} else if (len > (int) sizeof(mem)) {
|
||||
// Failed to allocate large enough buffer, give up
|
||||
cry(conn, "%s(%s, ...): Can't allocate %d bytes, not printing anything",
|
||||
__func__, fmt, len);
|
||||
len = -1;
|
||||
} else {
|
||||
// Copy to the local buffer succeeded
|
||||
len = mg_write(conn, buf, (size_t) len);
|
||||
}
|
||||
|
||||
return len;
|
||||
@ -3826,7 +3807,7 @@ static void send_websocket_handshake(struct mg_connection *conn) {
|
||||
}
|
||||
|
||||
static void read_websocket(struct mg_connection *conn) {
|
||||
unsigned char *mask, *buf = (unsigned char *) conn->buf + conn->request_len;
|
||||
unsigned char *buf = (unsigned char *) conn->buf + conn->request_len;
|
||||
int n, len, mask_len, body_len, discard_len;
|
||||
|
||||
for (;;) {
|
||||
@ -3835,15 +3816,12 @@ static void read_websocket(struct mg_connection *conn) {
|
||||
mask_len = buf[1] & 128 ? 4 : 0;
|
||||
if (len < 126) {
|
||||
conn->content_len = 2 + mask_len + len;
|
||||
mask = buf + 2;
|
||||
} else if (len == 126 && body_len >= 4) {
|
||||
conn->content_len = 4 + mask_len + ((((int) buf[2]) << 8) + buf[3]);
|
||||
mask = buf + 4;
|
||||
} else if (body_len >= 10) {
|
||||
conn->content_len = 10 + mask_len +
|
||||
(((uint64_t) htonl(* (uint32_t *) &buf[2])) << 32) |
|
||||
(((uint64_t) htonl(* (uint32_t *) &buf[2])) << 32) +
|
||||
htonl(* (uint32_t *) &buf[6]);
|
||||
mask = buf + 10;
|
||||
}
|
||||
}
|
||||
|
||||
@ -4100,7 +4078,7 @@ static void handle_lsp_request(struct mg_connection *conn, const char *path,
|
||||
|
||||
int mg_upload(struct mg_connection *conn, const char *destination_dir) {
|
||||
const char *content_type_header, *boundary_start;
|
||||
char buf[8192], path[PATH_MAX], fname[1024], boundary[100], *s;
|
||||
char buf[MG_BUF_LEN], path[PATH_MAX], fname[1024], boundary[100], *s;
|
||||
FILE *fp;
|
||||
int bl, n, i, j, headers_len, boundary_len, len = 0, num_uploaded_files = 0;
|
||||
|
||||
@ -4196,7 +4174,7 @@ int mg_upload(struct mg_connection *conn, const char *destination_dir) {
|
||||
}
|
||||
if (len > bl) {
|
||||
fwrite(buf, 1, len - bl, fp);
|
||||
memmove(buf, &buf[len - bl], len - bl);
|
||||
memmove(buf, &buf[len - bl], bl);
|
||||
len = bl;
|
||||
}
|
||||
} while ((n = mg_read(conn, buf + len, sizeof(buf) - len)) > 0);
|
||||
@ -4213,7 +4191,7 @@ static int is_put_or_delete_request(const struct mg_connection *conn) {
|
||||
|
||||
static int get_first_ssl_listener_index(const struct mg_context *ctx) {
|
||||
int i, index = -1;
|
||||
for (i = 0; i < ctx->num_listening_sockets; i++) {
|
||||
for (i = 0; index == -1 && i < ctx->num_listening_sockets; i++) {
|
||||
index = ctx->listening_sockets[i].is_ssl ? i : -1;
|
||||
}
|
||||
return index;
|
||||
@ -4531,10 +4509,10 @@ static const char *ssl_error(void) {
|
||||
|
||||
static void ssl_locking_callback(int mode, int mutex_num, const char *file,
|
||||
int line) {
|
||||
line = 0; // Unused
|
||||
file = NULL; // Unused
|
||||
(void) line;
|
||||
(void) file;
|
||||
|
||||
if (mode & CRYPTO_LOCK) {
|
||||
if (mode & 1) { // 1 is CRYPTO_LOCK
|
||||
(void) pthread_mutex_lock(&ssl_mutexes[mutex_num]);
|
||||
} else {
|
||||
(void) pthread_mutex_unlock(&ssl_mutexes[mutex_num]);
|
||||
@ -4580,7 +4558,6 @@ static int load_dll(struct mg_context *ctx, const char *dll_name,
|
||||
|
||||
// Dynamically load SSL library. Set up ctx->ssl_ctx pointer.
|
||||
static int set_ssl_option(struct mg_context *ctx) {
|
||||
struct mg_connection *conn;
|
||||
int i, size;
|
||||
const char *pem;
|
||||
|
||||
@ -4596,14 +4573,10 @@ static int set_ssl_option(struct mg_context *ctx) {
|
||||
}
|
||||
#endif // NO_SSL_DL
|
||||
|
||||
// Initialize SSL crap
|
||||
// Initialize SSL library
|
||||
SSL_library_init();
|
||||
SSL_load_error_strings();
|
||||
|
||||
if ((ctx->client_ssl_ctx = SSL_CTX_new(SSLv23_client_method())) == NULL) {
|
||||
cry(fc(ctx), "SSL_CTX_new (client) error: %s", ssl_error());
|
||||
}
|
||||
|
||||
if ((ctx->ssl_ctx = SSL_CTX_new(SSLv23_server_method())) == NULL) {
|
||||
cry(fc(ctx), "SSL_CTX_new (server) error: %s", ssl_error());
|
||||
return 0;
|
||||
@ -4611,11 +4584,10 @@ static int set_ssl_option(struct mg_context *ctx) {
|
||||
|
||||
// If user callback returned non-NULL, that means that user callback has
|
||||
// set up certificate itself. In this case, skip sertificate setting.
|
||||
conn = fc(ctx);
|
||||
conn->request_info.ev_data = ctx->ssl_ctx;
|
||||
if (call_user(conn, MG_INIT_SSL) == NULL &&
|
||||
(SSL_CTX_use_certificate_file(ctx->ssl_ctx, pem, SSL_FILETYPE_PEM) == 0 ||
|
||||
SSL_CTX_use_PrivateKey_file(ctx->ssl_ctx, pem, SSL_FILETYPE_PEM) == 0)) {
|
||||
fc(ctx)->request_info.ev_data = ctx->ssl_ctx;
|
||||
if (call_user(fc(ctx), MG_INIT_SSL) == NULL &&
|
||||
(SSL_CTX_use_certificate_file(ctx->ssl_ctx, pem, 1) == 0 ||
|
||||
SSL_CTX_use_PrivateKey_file(ctx->ssl_ctx, pem, 1) == 0)) {
|
||||
cry(fc(ctx), "%s: cannot open %s: %s", __func__, pem, ssl_error());
|
||||
return 0;
|
||||
}
|
||||
@ -4682,17 +4654,17 @@ static void close_socket_gracefully(struct mg_connection *conn) {
|
||||
int n;
|
||||
#endif
|
||||
struct linger linger;
|
||||
int sock = conn->client.sock;
|
||||
|
||||
// Set linger option to avoid socket hanging out after close. This prevent
|
||||
// ephemeral port exhaust problem under high QPS.
|
||||
linger.l_onoff = 1;
|
||||
linger.l_linger = 1;
|
||||
setsockopt(sock, SOL_SOCKET, SO_LINGER, (char *) &linger, sizeof(linger));
|
||||
setsockopt(conn->client.sock, SOL_SOCKET, SO_LINGER,
|
||||
(char *) &linger, sizeof(linger));
|
||||
|
||||
// Send FIN to the client
|
||||
(void) shutdown(sock, SHUT_WR);
|
||||
set_non_blocking_mode(sock);
|
||||
shutdown(conn->client.sock, SHUT_WR);
|
||||
set_non_blocking_mode(conn->client.sock);
|
||||
|
||||
#if defined(_WIN32)
|
||||
// Read and discard pending incoming data. If we do not do that and close the
|
||||
@ -4706,23 +4678,24 @@ static void close_socket_gracefully(struct mg_connection *conn) {
|
||||
#endif
|
||||
|
||||
// Now we know that our FIN is ACK-ed, safe to close
|
||||
(void) closesocket(sock);
|
||||
closesocket(conn->client.sock);
|
||||
}
|
||||
|
||||
static void close_connection(struct mg_connection *conn) {
|
||||
conn->must_close = 1;
|
||||
|
||||
if (conn->ssl) {
|
||||
SSL_free(conn->ssl);
|
||||
conn->ssl = NULL;
|
||||
}
|
||||
|
||||
if (conn->client.sock != INVALID_SOCKET) {
|
||||
close_socket_gracefully(conn);
|
||||
}
|
||||
// Must be done AFTER socket is closed
|
||||
if (conn->ssl != NULL) {
|
||||
SSL_free(conn->ssl);
|
||||
}
|
||||
}
|
||||
|
||||
void mg_close_connection(struct mg_connection *conn) {
|
||||
if (conn->client_ssl_ctx != NULL) {
|
||||
SSL_CTX_free((SSL_CTX *) conn->client_ssl_ctx);
|
||||
}
|
||||
close_connection(conn);
|
||||
free(conn);
|
||||
}
|
||||
@ -4733,17 +4706,12 @@ struct mg_connection *mg_connect(const char *host, int port, int use_ssl,
|
||||
struct mg_connection *conn = NULL;
|
||||
struct sockaddr_in sin;
|
||||
struct hostent *he;
|
||||
SSL_CTX *ssl = NULL;
|
||||
int sock;
|
||||
|
||||
if (host == NULL) {
|
||||
snprintf(ebuf, ebuf_len, "%s", "NULL host");
|
||||
} else if (use_ssl && SSLv23_client_method == NULL) {
|
||||
snprintf(ebuf, ebuf_len, "%s", "SSL is not initialized");
|
||||
#ifndef NO_SSL
|
||||
} else if (use_ssl && (ssl = SSL_CTX_new(SSLv23_client_method())) == NULL) {
|
||||
snprintf(ebuf, ebuf_len, "SSL_CTX_new: %s", ssl_error());
|
||||
#endif // NO_SSL
|
||||
} else if ((he = gethostbyname(host)) == NULL) {
|
||||
snprintf(ebuf, ebuf_len, "gethostbyname(%s): %s", host, strerror(ERRNO));
|
||||
} else if ((sock = socket(PF_INET, SOCK_STREAM, 0)) == INVALID_SOCKET) {
|
||||
@ -4760,6 +4728,14 @@ struct mg_connection *mg_connect(const char *host, int port, int use_ssl,
|
||||
calloc(1, sizeof(*conn) + MAX_REQUEST_SIZE)) == NULL) {
|
||||
snprintf(ebuf, ebuf_len, "calloc(): %s", strerror(ERRNO));
|
||||
closesocket(sock);
|
||||
#ifndef NO_SSL
|
||||
} else if (use_ssl && (conn->client_ssl_ctx =
|
||||
SSL_CTX_new(SSLv23_client_method())) == NULL) {
|
||||
snprintf(ebuf, ebuf_len, "SSL_CTX_new error");
|
||||
closesocket(sock);
|
||||
free(conn);
|
||||
conn = NULL;
|
||||
#endif // NO_SSL
|
||||
} else {
|
||||
conn->buf_size = MAX_REQUEST_SIZE;
|
||||
conn->buf = (char *) (conn + 1);
|
||||
@ -4768,13 +4744,13 @@ struct mg_connection *mg_connect(const char *host, int port, int use_ssl,
|
||||
conn->client.rsa.sin = sin;
|
||||
conn->client.is_ssl = use_ssl;
|
||||
if (use_ssl) {
|
||||
sslize(conn, ssl, SSL_connect);
|
||||
// SSL_CTX_set_verify call is needed to switch off server certificate
|
||||
// checking, which is off by default in OpenSSL and on in yaSSL.
|
||||
SSL_CTX_set_verify(conn->client_ssl_ctx, 0, 0);
|
||||
sslize(conn, conn->client_ssl_ctx, SSL_connect);
|
||||
}
|
||||
}
|
||||
}
|
||||
if (ssl != NULL) {
|
||||
SSL_CTX_free(ssl);
|
||||
}
|
||||
|
||||
return conn;
|
||||
}
|
||||
@ -4827,28 +4803,8 @@ struct mg_connection *mg_download(const char *host, int port, int use_ssl,
|
||||
if ((conn = mg_connect(host, port, use_ssl, ebuf, ebuf_len)) == NULL) {
|
||||
} else if (mg_vprintf(conn, fmt, ap) <= 0) {
|
||||
snprintf(ebuf, ebuf_len, "%s", "Error sending request");
|
||||
} else if (!getreq(conn, ebuf, ebuf_len)) {
|
||||
} else {
|
||||
#if 0
|
||||
// Write chunk of data that may be in the user's buffer
|
||||
data_length -= req_length;
|
||||
if (data_length > 0 &&
|
||||
fwrite(buf + req_length, 1, data_length, fp) != (size_t) data_length) {
|
||||
cry(fc(ctx), "%s: fwrite(%s): %s", __func__, path, strerror(ERRNO));
|
||||
fclose(fp);
|
||||
fp = NULL;
|
||||
}
|
||||
// Read the rest of the response and write it to the file. Do not use
|
||||
// mg_read() cause we didn't set conn->content_len properly.
|
||||
while (fp && (data_length = pull(0, conn, buf2, sizeof(buf2))) > 0) {
|
||||
if (fwrite(buf2, 1, data_length, fp) != (size_t) data_length) {
|
||||
cry(fc(ctx), "%s: fwrite(%s): %s", __func__, path, strerror(ERRNO));
|
||||
fclose(fp);
|
||||
fp = NULL;
|
||||
break;
|
||||
}
|
||||
}
|
||||
#endif
|
||||
getreq(conn, ebuf, ebuf_len);
|
||||
}
|
||||
if (ebuf[0] != '\0' && conn != NULL) {
|
||||
mg_close_connection(conn);
|
||||
@ -5116,9 +5072,6 @@ static void free_context(struct mg_context *ctx) {
|
||||
if (ctx->ssl_ctx != NULL) {
|
||||
SSL_CTX_free(ctx->ssl_ctx);
|
||||
}
|
||||
if (ctx->client_ssl_ctx != NULL) {
|
||||
SSL_CTX_free(ctx->client_ssl_ctx);
|
||||
}
|
||||
#ifndef NO_SSL
|
||||
if (ssl_mutexes != NULL) {
|
||||
free(ssl_mutexes);
|
||||
|
Loading…
Reference in New Issue
Block a user