/* * Copyright: JessMA Open Source (ldcsaa@gmail.com) * * Version : 3.6.1 * Author : Bruce Liang * Website : http://www.jessma.org * Project : https://github.com/ldcsaa * Blog : http://www.cnblogs.com/ldcsaa * Wiki : http://www.oschina.net/p/hp-socket * QQ Group : 75375912 * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #pragma once #include "openssl/ssl.h" #include "HPTypeDef.h" #include "../../Common/Src/bufferpool.h" /************************************************************************ 名称:SSL 握手状态 描述:标识当前连接的 SSL 握手状态 ************************************************************************/ enum EnSSLHandShakeStatus { SSL_HSS_INIT = 0, // 初始状态 SSL_HSS_PROC = 1, // 正在握手 SSL_HSS_SUCC = 2, // 握手成功 }; /* SSL CRYPTO DYNLOCK 结构 */ typedef struct CRYPTO_dynlock_value { CSimpleRWLock cs; } DynamicLock; /************************************************************************ 名称:SSL Context 描述:初始化和清理 SSL 全局运行环境 ************************************************************************/ class CSSLContext { public: /* 获取 CSSLContext 单例对象 */ static CSSLContext& getInstance() {return sm_Instance;} public: /* * 名称:初始化 SSL 全局环境参数 * 描述:SSL 全局环境参数必须在 SSL 通信组件启动前完成初始化,否则启动失败 * * 参数: enSessionMode -- SSL 工作模式(参考 EnSSLSessionMode) * iVerifyMode -- SSL 验证模式(参考 EnSSLVerifyMode) * lpszPemCertFile -- 证书文件(客户端可选) * lpszPemKeyFile -- 私钥文件(客户端可选) * lpszKeyPasswod -- 私钥密码(没有密码则为空) * lpszCAPemCertFileOrPath -- CA 证书文件或目录(单向验证或客户端可选) * * 返回值: TRUE -- 成功 * FALSE -- 失败,可通过 ::GetLastError() 获取失败原因 */ BOOL Initialize(EnSSLSessionMode enSessionMode, int iVerifyMode = SSL_VM_NONE, LPCTSTR lpszPemCertFile = nullptr, LPCTSTR lpszPemKeyFile = nullptr, LPCTSTR lpszKeyPasswod = nullptr, LPCTSTR lpszCAPemCertFileOrPath = nullptr); /* * 名称:清理 SSL 全局运行环境 * 描述:清理 SSL 全局运行环境,回收 SSL 相关内存 * 1、CSSLContext 的析构函数会自动调用本方法 * 2、当要重新设置 SSL 全局环境参数时,需要先调用本方法清理原先的环境参数 * * 参数: 无 * * 返回值:无 */ void Cleanup(); /* * 名称:清理线程局部环境 SSL 资源 * 描述:任何一个操作 SSL 的线程,在通信结束时都需要清理线程局部环境 SSL 资源 * 1、主线程和 HP-Socket 工作线程在通信结束时会自动清理线程局部环境 SSL 资源。因此,一般情况下不必手工调用本方法 * 2、特殊情况下,当自定义线程参与 HP-Socket 通信操作并检查到 SSL 内存泄漏时,需在每次通信结束时自定义线程调用本方法 * * 参数: dwThreadID -- 线程 ID(0:当前线程) * * 返回值:无 */ void RemoveThreadLocalState(DWORD dwThreadID = 0) {CleanupThreadState(dwThreadID);} /* 检查 SSL 全局运行环境是否初始化完成 */ BOOL IsValid () const {return m_bValid;} /* 获取 SSL 全局运行环境 SSL_CTX 对象 */ SSL_CTX* GetContext () const {return m_sslCtx;} /* 获取 SSL 全局运行环境的配置模式,配置模式参考:EnSSLSessionMode */ EnSSLSessionMode GetSessionMode () const {return m_enSessionMode;} private: CSSLContext() : m_bValid (FALSE) , m_iLockNum (0) , m_pcsLocks (nullptr) , m_sslCtx (nullptr) , m_enSessionMode (SSL_SM_SERVER) { } ~CSSLContext() { Cleanup(); } private: void CreateContext(); BOOL LoadCertAndKey(int iVerifyMode, LPCTSTR lpszPemCertFile, LPCTSTR lpszPemKeyFile, LPCTSTR lpszKeyPasswod, LPCTSTR lpszCAPemCertFileOrPath); private: static void CleanupGlobalState(); static void CleanupThreadState(DWORD dwThreadID = 0); static void ssl_lock_callback(int mode, int n, const char *file, int line); static CRYPTO_dynlock_value* ssl_lock_dyn_create_callback(const char *file, int line); static void ssl_lock_dyn_callback(int mode, CRYPTO_dynlock_value* l, const char *file, int line); static void ssl_lock_dyn_destroy_callback(CRYPTO_dynlock_value* l, const char *file, int line); private: BOOL m_bValid; EnSSLSessionMode m_enSessionMode; int m_iLockNum; CSimpleRWLock* m_pcsLocks; SSL_CTX* m_sslCtx; private: static CSSLContext sm_Instance; }; extern CSSLContext& g_SSL; class CSSLSession { public: BOOL WriteRecvChannel(const BYTE* pData, int iLength); BOOL ReadRecvChannel(); BOOL WriteSendChannel(const BYTE* pData, int iLength); BOOL WriteSendChannel(const WSABUF pBuffers[], int iCount); BOOL ReadSendChannel(); const WSABUF& GetRecvBuffer() const {return m_bufRecv;} const WSABUF& GetSendBuffer() const {return m_bufSend;} CSSLSession* Renew(); BOOL Reset(); BOOL IsValid() const {return GetStatus() != SSL_HSS_INIT;} BOOL IsHandShaking() const {return GetStatus() == SSL_HSS_PROC;} BOOL IsReady() const {return GetStatus() == SSL_HSS_SUCC;} EnSSLHandShakeStatus GetStatus() const {return m_enStatus;} DWORD GetFreeTime() const {return m_dwFreeTime;} CCriSec& GetSendLock() {return m_csSend;} private: BOOL IsFatalError(int iBytes); public: CSSLSession(CItemPool& itPool) : m_enStatus(SSL_HSS_INIT) , m_itPool (itPool) , m_ssl (nullptr) , m_bioSend (nullptr) , m_bioRecv (nullptr) , m_pitSend (nullptr) , m_pitRecv (nullptr) { } ~CSSLSession() { Reset(); } private: CItemPool& m_itPool; CCriSec m_csSend; DWORD m_dwFreeTime; EnSSLHandShakeStatus m_enStatus; SSL* m_ssl; BIO* m_bioSend; BIO* m_bioRecv; TItem* m_pitSend; TItem* m_pitRecv; WSABUF m_bufSend; WSABUF m_bufRecv; }; class CSSLSessionPool { typedef CRingPool TSSLSessionList; typedef CCASQueue TSSLSessionQueue; public: CSSLSession* PickFreeSession (); void PutFreeSession (CSSLSession* pSession); void Prepare (); void Clear (); private: void ReleaseGCSession (BOOL bForce = FALSE); public: void SetItemCapacity (DWORD dwItemCapacity) {m_itPool.SetItemCapacity(dwItemCapacity);} void SetItemPoolSize (DWORD dwItemPoolSize) {m_itPool.SetPoolSize(dwItemPoolSize);} void SetItemPoolHold (DWORD dwItemPoolHold) {m_itPool.SetPoolHold(dwItemPoolHold);} void SetSessionLockTime (DWORD dwSessionLockTime) {m_dwSessionLockTime = dwSessionLockTime;} void SetSessionPoolSize (DWORD dwSessionPoolSize) {m_dwSessionPoolSize = dwSessionPoolSize;} void SetSessionPoolHold (DWORD dwSessionPoolHold) {m_dwSessionPoolHold = dwSessionPoolHold;} DWORD GetItemCapacity () {return m_itPool.GetItemCapacity();} DWORD GetItemPoolSize () {return m_itPool.GetPoolSize();} DWORD GetItemPoolHold () {return m_itPool.GetPoolHold();} DWORD GetSessionLockTime() {return m_dwSessionLockTime;} DWORD GetSessionPoolSize() {return m_dwSessionPoolSize;} DWORD GetSessionPoolHold() {return m_dwSessionPoolHold;} public: CSSLSessionPool(DWORD dwPoolSize = DEFAULT_SESSION_POOL_SIZE, DWORD dwPoolHold = DEFAULT_SESSION_POOL_HOLD, DWORD dwLockTime = DEFAULT_SESSION_LOCK_TIME) : m_dwSessionPoolSize(dwPoolSize) , m_dwSessionPoolHold(dwPoolHold) , m_dwSessionLockTime(dwLockTime) { } ~CSSLSessionPool() {Clear();} DECLARE_NO_COPY_CLASS(CSSLSessionPool) public: static const DWORD DEFAULT_ITEM_CAPACITY; static const DWORD DEFAULT_ITEM_POOL_SIZE; static const DWORD DEFAULT_ITEM_POOL_HOLD; static const DWORD DEFAULT_SESSION_LOCK_TIME; static const DWORD DEFAULT_SESSION_POOL_SIZE; static const DWORD DEFAULT_SESSION_POOL_HOLD; private: CItemPool m_itPool; DWORD m_dwSessionLockTime; DWORD m_dwSessionPoolSize; DWORD m_dwSessionPoolHold; TSSLSessionList m_lsFreeSession; TSSLSessionQueue m_lsGCSession; }; template EnHandleResult ProcessHandShake(T* pThis, S* pSocketObj, CSSLSession* pSession) { EnHandleResult result = HR_OK; CCriSecLock locallock(pSession->GetSendLock()); while(TRUE) { VERIFY(pSession->ReadSendChannel()); const WSABUF& buffer = pSession->GetSendBuffer(); if(buffer.len == 0) break; if(!pThis->DoSendPackets(pSocketObj, &buffer, 1)) { result = HR_ERROR; break; } } return result; } template EnHandleResult ProcessReceive(T* pThis, S* pSocketObj, CSSLSession* pSession, const BYTE* pData, int iLength) { if(!pSession->WriteRecvChannel(pData, iLength)) return HR_ERROR; EnHandleResult result = HR_OK; EnSSLHandShakeStatus enStatus = pSession->GetStatus(); while(TRUE) { if(!pSession->ReadRecvChannel()) return HR_ERROR; if(enStatus == SSL_HSS_PROC && pSession->IsReady()) { result = ProcessHandShake(pThis, pSocketObj, pSession); if(result == HR_ERROR) break; enStatus = SSL_HSS_SUCC; result = pThis->DoFireHandShake(pSocketObj); if(result == HR_ERROR) break; } const WSABUF& buffer = pSession->GetRecvBuffer(); if(buffer.len == 0) break; result = pThis->DoFireReceive(pSocketObj, (const BYTE*)buffer.buf, buffer.len); if(result == HR_ERROR) break; } if(result != HR_ERROR && pSession->IsHandShaking()) result = ::ProcessHandShake(pThis, pSocketObj, pSession); return result; } template BOOL ProcessSend(T* pThis, S* pSocketObj, CSSLSession* pSession, const WSABUF * pBuffers, int iCount) { if(pSession == nullptr || !pSession->IsReady()) { ::SetLastError(ERROR_INVALID_STATE); return FALSE; } CCriSecLock locallock(pSession->GetSendLock()); if(!pSession->IsReady()) { ::SetLastError(ERROR_INVALID_STATE); return FALSE; } VERIFY(pSession->WriteSendChannel(pBuffers, iCount)); while(TRUE) { VERIFY(pSession->ReadSendChannel()); const WSABUF& buffer = pSession->GetSendBuffer(); if(buffer.len == 0) break; if(!pThis->DoSendPackets(pSocketObj, &buffer, 1)) return FALSE; } return TRUE; }