… | |
… | |
14 | |
14 | |
15 | AnyEvent::Handle - non-blocking I/O on file handles via AnyEvent |
15 | AnyEvent::Handle - non-blocking I/O on file handles via AnyEvent |
16 | |
16 | |
17 | =cut |
17 | =cut |
18 | |
18 | |
19 | our $VERSION = 4.331; |
19 | our $VERSION = 4.45; |
20 | |
20 | |
21 | =head1 SYNOPSIS |
21 | =head1 SYNOPSIS |
22 | |
22 | |
23 | use AnyEvent; |
23 | use AnyEvent; |
24 | use AnyEvent::Handle; |
24 | use AnyEvent::Handle; |
… | |
… | |
63 | |
63 | |
64 | =head1 METHODS |
64 | =head1 METHODS |
65 | |
65 | |
66 | =over 4 |
66 | =over 4 |
67 | |
67 | |
68 | =item B<new (%args)> |
68 | =item $handle = B<new> AnyEvent::TLS fh => $filehandle, key => value... |
69 | |
69 | |
70 | The constructor supports these arguments (all as key => value pairs). |
70 | The constructor supports these arguments (all as C<< key => value >> pairs). |
71 | |
71 | |
72 | =over 4 |
72 | =over 4 |
73 | |
73 | |
74 | =item fh => $filehandle [MANDATORY] |
74 | =item fh => $filehandle [MANDATORY] |
75 | |
75 | |
… | |
… | |
95 | waiting for data. |
95 | waiting for data. |
96 | |
96 | |
97 | If an EOF condition has been detected but no C<on_eof> callback has been |
97 | If an EOF condition has been detected but no C<on_eof> callback has been |
98 | set, then a fatal error will be raised with C<$!> set to <0>. |
98 | set, then a fatal error will be raised with C<$!> set to <0>. |
99 | |
99 | |
100 | =item on_error => $cb->($handle, $fatal) |
100 | =item on_error => $cb->($handle, $fatal, $message) |
101 | |
101 | |
102 | This is the error callback, which is called when, well, some error |
102 | This is the error callback, which is called when, well, some error |
103 | occured, such as not being able to resolve the hostname, failure to |
103 | occured, such as not being able to resolve the hostname, failure to |
104 | connect or a read error. |
104 | connect or a read error. |
105 | |
105 | |
… | |
… | |
107 | fatal errors the handle object will be shut down and will not be usable |
107 | fatal errors the handle object will be shut down and will not be usable |
108 | (but you are free to look at the current C<< ->rbuf >>). Examples of fatal |
108 | (but you are free to look at the current C<< ->rbuf >>). Examples of fatal |
109 | errors are an EOF condition with active (but unsatisifable) read watchers |
109 | errors are an EOF condition with active (but unsatisifable) read watchers |
110 | (C<EPIPE>) or I/O errors. |
110 | (C<EPIPE>) or I/O errors. |
111 | |
111 | |
|
|
112 | AnyEvent::Handle tries to find an appropriate error code for you to check |
|
|
113 | against, but in some cases (TLS errors), this does not work well. It is |
|
|
114 | recommended to always output the C<$message> argument in human-readable |
|
|
115 | error messages (it's usually the same as C<"$!">). |
|
|
116 | |
112 | Non-fatal errors can be retried by simply returning, but it is recommended |
117 | Non-fatal errors can be retried by simply returning, but it is recommended |
113 | to simply ignore this parameter and instead abondon the handle object |
118 | to simply ignore this parameter and instead abondon the handle object |
114 | when this callback is invoked. Examples of non-fatal errors are timeouts |
119 | when this callback is invoked. Examples of non-fatal errors are timeouts |
115 | C<ETIMEDOUT>) or badly-formatted data (C<EBADMSG>). |
120 | C<ETIMEDOUT>) or badly-formatted data (C<EBADMSG>). |
116 | |
121 | |
117 | On callback entrance, the value of C<$!> contains the operating system |
122 | On callback entrance, the value of C<$!> contains the operating system |
118 | error (or C<ENOSPC>, C<EPIPE>, C<ETIMEDOUT> or C<EBADMSG>). |
123 | error code (or C<ENOSPC>, C<EPIPE>, C<ETIMEDOUT>, C<EBADMSG> or |
|
|
124 | C<EPROTO>). |
119 | |
125 | |
120 | While not mandatory, it is I<highly> recommended to set this callback, as |
126 | While not mandatory, it is I<highly> recommended to set this callback, as |
121 | you will not be notified of errors otherwise. The default simply calls |
127 | you will not be notified of errors otherwise. The default simply calls |
122 | C<croak>. |
128 | C<croak>. |
123 | |
129 | |
… | |
… | |
127 | and no read request is in the queue (unlike read queue callbacks, this |
133 | and no read request is in the queue (unlike read queue callbacks, this |
128 | callback will only be called when at least one octet of data is in the |
134 | callback will only be called when at least one octet of data is in the |
129 | read buffer). |
135 | read buffer). |
130 | |
136 | |
131 | To access (and remove data from) the read buffer, use the C<< ->rbuf >> |
137 | To access (and remove data from) the read buffer, use the C<< ->rbuf >> |
132 | method or access the C<$handle->{rbuf}> member directly. |
138 | method or access the C<$handle->{rbuf}> member directly. Note that you |
|
|
139 | must not enlarge or modify the read buffer, you can only remove data at |
|
|
140 | the beginning from it. |
133 | |
141 | |
134 | When an EOF condition is detected then AnyEvent::Handle will first try to |
142 | When an EOF condition is detected then AnyEvent::Handle will first try to |
135 | feed all the remaining data to the queued callbacks and C<on_read> before |
143 | feed all the remaining data to the queued callbacks and C<on_read> before |
136 | calling the C<on_eof> callback. If no progress can be made, then a fatal |
144 | calling the C<on_eof> callback. If no progress can be made, then a fatal |
137 | error will be raised (with C<$!> set to C<EPIPE>). |
145 | error will be raised (with C<$!> set to C<EPIPE>). |
… | |
… | |
235 | |
243 | |
236 | This will not work for partial TLS data that could not be encoded |
244 | This will not work for partial TLS data that could not be encoded |
237 | yet. This data will be lost. Calling the C<stoptls> method in time might |
245 | yet. This data will be lost. Calling the C<stoptls> method in time might |
238 | help. |
246 | help. |
239 | |
247 | |
|
|
248 | =item peername => $string |
|
|
249 | |
|
|
250 | A string used to identify the remote site - usually the DNS hostname used |
|
|
251 | to create the connection. |
|
|
252 | |
|
|
253 | Apart from being useful in error messages, this string is also used in TLS |
|
|
254 | common name verification (see C<verify_cn> in L<AnyEvent::TLS>). |
|
|
255 | |
240 | =item tls => "accept" | "connect" | Net::SSLeay::SSL object |
256 | =item tls => "accept" | "connect" | Net::SSLeay::SSL object |
241 | |
257 | |
242 | When this parameter is given, it enables TLS (SSL) mode, that means |
258 | When this parameter is given, it enables TLS (SSL) mode, that means |
243 | AnyEvent will start a TLS handshake as soon as the conenction has been |
259 | AnyEvent will start a TLS handshake as soon as the conenction has been |
244 | established and will transparently encrypt/decrypt data afterwards. |
260 | established and will transparently encrypt/decrypt data afterwards. |
|
|
261 | |
|
|
262 | All TLS protocol errors will be signalled as C<EPROTO>, with an |
|
|
263 | appropriate error message. |
245 | |
264 | |
246 | TLS mode requires Net::SSLeay to be installed (it will be loaded |
265 | TLS mode requires Net::SSLeay to be installed (it will be loaded |
247 | automatically when you try to create a TLS handle): this module doesn't |
266 | automatically when you try to create a TLS handle): this module doesn't |
248 | have a dependency on that module, so if your module requires it, you have |
267 | have a dependency on that module, so if your module requires it, you have |
249 | to add the dependency yourself. |
268 | to add the dependency yourself. |
… | |
… | |
253 | mode. |
272 | mode. |
254 | |
273 | |
255 | You can also provide your own TLS connection object, but you have |
274 | You can also provide your own TLS connection object, but you have |
256 | to make sure that you call either C<Net::SSLeay::set_connect_state> |
275 | to make sure that you call either C<Net::SSLeay::set_connect_state> |
257 | or C<Net::SSLeay::set_accept_state> on it before you pass it to |
276 | or C<Net::SSLeay::set_accept_state> on it before you pass it to |
258 | AnyEvent::Handle. |
277 | AnyEvent::Handle. Also, this module will take ownership of this connection |
|
|
278 | object. |
|
|
279 | |
|
|
280 | At some future point, AnyEvent::Handle might switch to another TLS |
|
|
281 | implementation, then the option to use your own session object will go |
|
|
282 | away. |
259 | |
283 | |
260 | B<IMPORTANT:> since Net::SSLeay "objects" are really only integers, |
284 | B<IMPORTANT:> since Net::SSLeay "objects" are really only integers, |
261 | passing in the wrong integer will lead to certain crash. This most often |
285 | passing in the wrong integer will lead to certain crash. This most often |
262 | happens when one uses a stylish C<< tls => 1 >> and is surprised about the |
286 | happens when one uses a stylish C<< tls => 1 >> and is surprised about the |
263 | segmentation fault. |
287 | segmentation fault. |
264 | |
288 | |
265 | See the C<< ->starttls >> method for when need to start TLS negotiation later. |
289 | See the C<< ->starttls >> method for when need to start TLS negotiation later. |
266 | |
290 | |
267 | =item tls_ctx => $ssl_ctx |
291 | =item tls_ctx => $anyevent_tls |
268 | |
292 | |
269 | Use the given C<Net::SSLeay::CTX> object to create the new TLS connection |
293 | Use the given C<AnyEvent::TLS> object to create the new TLS connection |
270 | (unless a connection object was specified directly). If this parameter is |
294 | (unless a connection object was specified directly). If this parameter is |
271 | missing, then AnyEvent::Handle will use C<AnyEvent::Handle::TLS_CTX>. |
295 | missing, then AnyEvent::Handle will use C<AnyEvent::Handle::TLS_CTX>. |
|
|
296 | |
|
|
297 | Instead of an object, you can also specify a hash reference with C<< key |
|
|
298 | => value >> pairs. Those will be passed to L<AnyEvent::TLS> to create a |
|
|
299 | new TLS context object. |
272 | |
300 | |
273 | =item json => JSON or JSON::XS object |
301 | =item json => JSON or JSON::XS object |
274 | |
302 | |
275 | This is the json coder object used by the C<json> read and write types. |
303 | This is the json coder object used by the C<json> read and write types. |
276 | |
304 | |
… | |
… | |
285 | |
313 | |
286 | =cut |
314 | =cut |
287 | |
315 | |
288 | sub new { |
316 | sub new { |
289 | my $class = shift; |
317 | my $class = shift; |
290 | |
|
|
291 | my $self = bless { @_ }, $class; |
318 | my $self = bless { @_ }, $class; |
292 | |
319 | |
293 | $self->{fh} or Carp::croak "mandatory argument fh is missing"; |
320 | $self->{fh} or Carp::croak "mandatory argument fh is missing"; |
294 | |
321 | |
295 | AnyEvent::Util::fh_nonblocking $self->{fh}, 1; |
322 | AnyEvent::Util::fh_nonblocking $self->{fh}, 1; |
|
|
323 | |
|
|
324 | $self->{_activity} = AnyEvent->now; |
|
|
325 | $self->_timeout; |
|
|
326 | |
|
|
327 | $self->no_delay (delete $self->{no_delay}) if exists $self->{no_delay}; |
296 | |
328 | |
297 | $self->starttls (delete $self->{tls}, delete $self->{tls_ctx}) |
329 | $self->starttls (delete $self->{tls}, delete $self->{tls_ctx}) |
298 | if $self->{tls}; |
330 | if $self->{tls}; |
299 | |
331 | |
300 | $self->{_activity} = AnyEvent->now; |
|
|
301 | $self->_timeout; |
|
|
302 | |
|
|
303 | $self->on_drain (delete $self->{on_drain}) if exists $self->{on_drain}; |
332 | $self->on_drain (delete $self->{on_drain}) if exists $self->{on_drain}; |
304 | $self->no_delay (delete $self->{no_delay}) if exists $self->{no_delay}; |
|
|
305 | |
333 | |
306 | $self->start_read |
334 | $self->start_read |
307 | if $self->{on_read}; |
335 | if $self->{on_read}; |
308 | |
336 | |
309 | $self |
337 | $self->{fh} && $self |
310 | } |
338 | } |
311 | |
339 | |
312 | sub _shutdown { |
340 | sub _shutdown { |
313 | my ($self) = @_; |
341 | my ($self) = @_; |
314 | |
342 | |
315 | delete $self->{_tw}; |
343 | delete @$self{qw(_tw _rw _ww fh wbuf on_read _queue)}; |
316 | delete $self->{_rw}; |
344 | $self->{_eof} = 1; # tell starttls et. al to stop trying |
317 | delete $self->{_ww}; |
|
|
318 | delete $self->{fh}; |
|
|
319 | |
345 | |
320 | &_freetls; |
346 | &_freetls; |
321 | |
|
|
322 | delete $self->{on_read}; |
|
|
323 | delete $self->{_queue}; |
|
|
324 | } |
347 | } |
325 | |
348 | |
326 | sub _error { |
349 | sub _error { |
327 | my ($self, $errno, $fatal) = @_; |
350 | my ($self, $errno, $fatal, $message) = @_; |
328 | |
351 | |
329 | $self->_shutdown |
352 | $self->_shutdown |
330 | if $fatal; |
353 | if $fatal; |
331 | |
354 | |
332 | $! = $errno; |
355 | $! = $errno; |
|
|
356 | $message ||= "$!"; |
333 | |
357 | |
334 | if ($self->{on_error}) { |
358 | if ($self->{on_error}) { |
335 | $self->{on_error}($self, $fatal); |
359 | $self->{on_error}($self, $fatal, $message); |
336 | } elsif ($self->{fh}) { |
360 | } elsif ($self->{fh}) { |
337 | Carp::croak "AnyEvent::Handle uncaught error: $!"; |
361 | Carp::croak "AnyEvent::Handle uncaught error: $message"; |
338 | } |
362 | } |
339 | } |
363 | } |
340 | |
364 | |
341 | =item $fh = $handle->fh |
365 | =item $fh = $handle->fh |
342 | |
366 | |
… | |
… | |
654 | |
678 | |
655 | pack "w/a*", Storable::nfreeze ($ref) |
679 | pack "w/a*", Storable::nfreeze ($ref) |
656 | }; |
680 | }; |
657 | |
681 | |
658 | =back |
682 | =back |
|
|
683 | |
|
|
684 | =item $handle->push_shutdown |
|
|
685 | |
|
|
686 | Sometimes you know you want to close the socket after writing your data |
|
|
687 | before it was actually written. One way to do that is to replace your |
|
|
688 | C<on_drain> handler by a callback that shuts down the socket. This method |
|
|
689 | is a shorthand for just that, and replaces the C<on_drain> callback with: |
|
|
690 | |
|
|
691 | sub { shutdown $_[0]{fh}, 1 } # for push_shutdown |
|
|
692 | |
|
|
693 | This simply shuts down the write side and signals an EOF condition to the |
|
|
694 | the peer. |
|
|
695 | |
|
|
696 | You can rely on the normal read queue and C<on_eof> handling |
|
|
697 | afterwards. This is the cleanest way to close a connection. |
|
|
698 | |
|
|
699 | =cut |
|
|
700 | |
|
|
701 | sub push_shutdown { |
|
|
702 | $_[0]->{on_drain} = sub { shutdown $_[0]{fh}, 1 }; |
|
|
703 | } |
659 | |
704 | |
660 | =item AnyEvent::Handle::register_write_type type => $coderef->($handle, @args) |
705 | =item AnyEvent::Handle::register_write_type type => $coderef->($handle, @args) |
661 | |
706 | |
662 | This function (not method) lets you add your own types to C<push_write>. |
707 | This function (not method) lets you add your own types to C<push_write>. |
663 | Whenever the given C<type> is used, C<push_write> will invoke the code |
708 | Whenever the given C<type> is used, C<push_write> will invoke the code |
… | |
… | |
767 | ) { |
812 | ) { |
768 | $self->_error (&Errno::ENOSPC, 1), return; |
813 | $self->_error (&Errno::ENOSPC, 1), return; |
769 | } |
814 | } |
770 | |
815 | |
771 | while () { |
816 | while () { |
|
|
817 | # we need to use a separate tls read buffer, as we must not receive data while |
|
|
818 | # we are draining the buffer, and this can only happen with TLS. |
|
|
819 | $self->{rbuf} .= delete $self->{_tls_rbuf} if exists $self->{_tls_rbuf}; |
|
|
820 | |
772 | my $len = length $self->{rbuf}; |
821 | my $len = length $self->{rbuf}; |
773 | |
822 | |
774 | if (my $cb = shift @{ $self->{_queue} }) { |
823 | if (my $cb = shift @{ $self->{_queue} }) { |
775 | unless ($cb->($self)) { |
824 | unless ($cb->($self)) { |
776 | if ($self->{_eof}) { |
825 | if ($self->{_eof}) { |
… | |
… | |
837 | |
886 | |
838 | =item $handle->rbuf |
887 | =item $handle->rbuf |
839 | |
888 | |
840 | Returns the read buffer (as a modifiable lvalue). |
889 | Returns the read buffer (as a modifiable lvalue). |
841 | |
890 | |
842 | You can access the read buffer directly as the C<< ->{rbuf} >> member, if |
891 | You can access the read buffer directly as the C<< ->{rbuf} >> |
843 | you want. |
892 | member, if you want. However, the only operation allowed on the |
|
|
893 | read buffer (apart from looking at it) is removing data from its |
|
|
894 | beginning. Otherwise modifying or appending to it is not allowed and will |
|
|
895 | lead to hard-to-track-down bugs. |
844 | |
896 | |
845 | NOTE: The read buffer should only be used or modified if the C<on_read>, |
897 | NOTE: The read buffer should only be used or modified if the C<on_read>, |
846 | C<push_read> or C<unshift_read> methods are used. The other read methods |
898 | C<push_read> or C<unshift_read> methods are used. The other read methods |
847 | automatically manage the read buffer. |
899 | automatically manage the read buffer. |
848 | |
900 | |
… | |
… | |
1172 | my $rbuf = \$self->{rbuf}; |
1224 | my $rbuf = \$self->{rbuf}; |
1173 | |
1225 | |
1174 | my $json = $self->{json} ||= JSON->new->utf8; |
1226 | my $json = $self->{json} ||= JSON->new->utf8; |
1175 | |
1227 | |
1176 | sub { |
1228 | sub { |
1177 | eval { |
|
|
1178 | my $ref = $json->incr_parse ($self->{rbuf}); |
1229 | my $ref = eval { $json->incr_parse ($self->{rbuf}) }; |
1179 | |
1230 | |
1180 | if ($ref) { |
1231 | if ($ref) { |
1181 | $self->{rbuf} = $json->incr_text; |
|
|
1182 | $json->incr_text = ""; |
|
|
1183 | $cb->($self, $ref); |
|
|
1184 | |
|
|
1185 | 1 |
|
|
1186 | } else { |
|
|
1187 | $self->{rbuf} = ""; |
|
|
1188 | () |
|
|
1189 | } |
|
|
1190 | |
|
|
1191 | 1 |
|
|
1192 | } or do { |
|
|
1193 | $json->incr_skip; |
|
|
1194 | |
|
|
1195 | $self->{rbuf} = $json->incr_text; |
1232 | $self->{rbuf} = $json->incr_text; |
1196 | $json->incr_text = ""; |
1233 | $json->incr_text = ""; |
|
|
1234 | $cb->($self, $ref); |
|
|
1235 | |
|
|
1236 | 1 |
|
|
1237 | } elsif ($@) { |
|
|
1238 | # error case |
|
|
1239 | $json->incr_skip; |
|
|
1240 | |
|
|
1241 | $self->{rbuf} = $json->incr_text; |
|
|
1242 | $json->incr_text = ""; |
1197 | |
1243 | |
1198 | $self->_error (&Errno::EBADMSG); |
1244 | $self->_error (&Errno::EBADMSG); |
|
|
1245 | |
|
|
1246 | () |
|
|
1247 | } else { |
|
|
1248 | $self->{rbuf} = ""; |
|
|
1249 | |
|
|
1250 | () |
1199 | }; |
1251 | } |
1200 | |
|
|
1201 | } |
1252 | } |
1202 | }; |
1253 | }; |
1203 | |
1254 | |
1204 | =item storable => $cb->($handle, $ref) |
1255 | =item storable => $cb->($handle, $ref) |
1205 | |
1256 | |
… | |
… | |
1324 | } |
1375 | } |
1325 | }); |
1376 | }); |
1326 | } |
1377 | } |
1327 | } |
1378 | } |
1328 | |
1379 | |
|
|
1380 | our $ERROR_SYSCALL; |
|
|
1381 | our $ERROR_WANT_READ; |
|
|
1382 | our $ERROR_ZERO_RETURN; |
|
|
1383 | |
|
|
1384 | sub _tls_error { |
|
|
1385 | my ($self, $err) = @_; |
|
|
1386 | warn "$err,$!\n";#d# |
|
|
1387 | |
|
|
1388 | return $self->_error ($!, 1) |
|
|
1389 | if $err == Net::SSLeay::ERROR_SYSCALL (); |
|
|
1390 | |
|
|
1391 | $self->_error (&Errno::EPROTO, 1, |
|
|
1392 | Net::SSLeay::ERR_error_string (Net::SSLeay::ERR_get_error ())); |
|
|
1393 | } |
|
|
1394 | |
1329 | # poll the write BIO and send the data if applicable |
1395 | # poll the write BIO and send the data if applicable |
|
|
1396 | # also decode read data if possible |
|
|
1397 | # this is basiclaly our TLS state machine |
|
|
1398 | # more efficient implementations are possible with openssl, |
|
|
1399 | # but not with the buggy and incomplete Net::SSLeay. |
1330 | sub _dotls { |
1400 | sub _dotls { |
1331 | my ($self) = @_; |
1401 | my ($self) = @_; |
1332 | |
1402 | |
1333 | my $tmp; |
1403 | my $tmp; |
1334 | |
1404 | |
1335 | if (length $self->{_tls_wbuf}) { |
1405 | if (length $self->{_tls_wbuf}) { |
1336 | while (($tmp = Net::SSLeay::write ($self->{tls}, $self->{_tls_wbuf})) > 0) { |
1406 | while (($tmp = Net::SSLeay::write ($self->{tls}, $self->{_tls_wbuf})) > 0) { |
1337 | substr $self->{_tls_wbuf}, 0, $tmp, ""; |
1407 | substr $self->{_tls_wbuf}, 0, $tmp, ""; |
1338 | } |
1408 | } |
|
|
1409 | |
|
|
1410 | $tmp = Net::SSLeay::get_error ($self->{tls}, $tmp); |
|
|
1411 | return $self->_tls_error ($tmp) |
|
|
1412 | if $tmp != $ERROR_WANT_READ |
|
|
1413 | && ($tmp != $ERROR_SYSCALL || $!) |
|
|
1414 | && $tmp != $ERROR_ZERO_RETURN; |
1339 | } |
1415 | } |
1340 | |
1416 | |
1341 | while (defined ($tmp = Net::SSLeay::read ($self->{tls}))) { |
1417 | while (defined ($tmp = Net::SSLeay::read ($self->{tls}))) { |
1342 | unless (length $tmp) { |
1418 | unless (length $tmp) { |
1343 | # let's treat SSL-eof as we treat normal EOF |
1419 | # let's treat SSL-eof as we treat normal EOF |
1344 | delete $self->{_rw}; |
1420 | delete $self->{_rw}; |
1345 | $self->{_eof} = 1; |
1421 | $self->{_eof} = 1; |
1346 | &_freetls; |
1422 | &_freetls; |
1347 | } |
1423 | } |
1348 | |
1424 | |
1349 | $self->{rbuf} .= $tmp; |
1425 | $self->{_tls_rbuf} .= $tmp; |
1350 | $self->_drain_rbuf unless $self->{_in_drain}; |
1426 | $self->_drain_rbuf unless $self->{_in_drain}; |
1351 | $self->{tls} or return; # tls session might have gone away in callback |
1427 | $self->{tls} or return; # tls session might have gone away in callback |
1352 | } |
1428 | } |
1353 | |
1429 | |
1354 | $tmp = Net::SSLeay::get_error ($self->{tls}, -1); |
1430 | $tmp = Net::SSLeay::get_error ($self->{tls}, -1); |
1355 | |
|
|
1356 | if ($tmp != Net::SSLeay::ERROR_WANT_READ ()) { |
|
|
1357 | if ($tmp == Net::SSLeay::ERROR_SYSCALL ()) { |
|
|
1358 | return $self->_error ($!, 1); |
1431 | return $self->_tls_error ($tmp) |
1359 | } elsif ($tmp == Net::SSLeay::ERROR_SSL ()) { |
1432 | if $tmp != $ERROR_WANT_READ |
1360 | return $self->_error (&Errno::EIO, 1); |
1433 | && ($tmp != $ERROR_SYSCALL || $!) |
1361 | } |
1434 | && $tmp != $ERROR_ZERO_RETURN; |
1362 | |
|
|
1363 | # all other errors are fine for our purposes |
|
|
1364 | } |
|
|
1365 | |
1435 | |
1366 | while (length ($tmp = Net::SSLeay::BIO_read ($self->{_wbio}))) { |
1436 | while (length ($tmp = Net::SSLeay::BIO_read ($self->{_wbio}))) { |
1367 | $self->{wbuf} .= $tmp; |
1437 | $self->{wbuf} .= $tmp; |
1368 | $self->_drain_wbuf; |
1438 | $self->_drain_wbuf; |
1369 | } |
1439 | } |
… | |
… | |
1376 | C<starttls>. |
1446 | C<starttls>. |
1377 | |
1447 | |
1378 | The first argument is the same as the C<tls> constructor argument (either |
1448 | The first argument is the same as the C<tls> constructor argument (either |
1379 | C<"connect">, C<"accept"> or an existing Net::SSLeay object). |
1449 | C<"connect">, C<"accept"> or an existing Net::SSLeay object). |
1380 | |
1450 | |
1381 | The second argument is the optional C<Net::SSLeay::CTX> object that is |
1451 | The second argument is the optional C<AnyEvent::TLS> object that is used |
1382 | used when AnyEvent::Handle has to create its own TLS connection object. |
1452 | when AnyEvent::Handle has to create its own TLS connection object, or |
|
|
1453 | a hash reference with C<< key => value >> pairs that will be used to |
|
|
1454 | construct a new context. |
1383 | |
1455 | |
1384 | The TLS connection object will end up in C<< $handle->{tls} >> after this |
1456 | The TLS connection object will end up in C<< $handle->{tls} >>, the TLS |
1385 | call and can be used or changed to your liking. Note that the handshake |
1457 | context in C<< $handle->{tls_ctx} >> after this call and can be used or |
1386 | might have already started when this function returns. |
1458 | changed to your liking. Note that the handshake might have already started |
|
|
1459 | when this function returns. |
1387 | |
1460 | |
1388 | If it an error to start a TLS handshake more than once per |
1461 | If it an error to start a TLS handshake more than once per |
1389 | AnyEvent::Handle object (this is due to bugs in OpenSSL). |
1462 | AnyEvent::Handle object (this is due to bugs in OpenSSL). |
1390 | |
1463 | |
1391 | =cut |
1464 | =cut |
… | |
… | |
1395 | |
1468 | |
1396 | require Net::SSLeay; |
1469 | require Net::SSLeay; |
1397 | |
1470 | |
1398 | Carp::croak "it is an error to call starttls more than once on an AnyEvent::Handle object" |
1471 | Carp::croak "it is an error to call starttls more than once on an AnyEvent::Handle object" |
1399 | if $self->{tls}; |
1472 | if $self->{tls}; |
|
|
1473 | |
|
|
1474 | $ERROR_SYSCALL = Net::SSLeay::ERROR_SYSCALL (); |
|
|
1475 | $ERROR_WANT_READ = Net::SSLeay::ERROR_WANT_READ (); |
|
|
1476 | $ERROR_ZERO_RETURN = Net::SSLeay::ERROR_ZERO_RETURN (); |
|
|
1477 | |
|
|
1478 | $ctx ||= $self->{tls_ctx}; |
|
|
1479 | |
|
|
1480 | if ("HASH" eq ref $ctx) { |
|
|
1481 | require AnyEvent::TLS; |
|
|
1482 | |
|
|
1483 | local $Carp::CarpLevel = 1; # skip ourselves when creating a new context |
|
|
1484 | $ctx = new AnyEvent::TLS %$ctx; |
|
|
1485 | } |
1400 | |
1486 | |
1401 | if ($ssl eq "accept") { |
1487 | $self->{tls_ctx} = $ctx || TLS_CTX (); |
1402 | $ssl = Net::SSLeay::new ($ctx || TLS_CTX ()); |
1488 | $self->{tls} = $ssl = $self->{tls_ctx}->_get_session ($ssl, $self, $self->{peername}); |
1403 | Net::SSLeay::set_accept_state ($ssl); |
|
|
1404 | } elsif ($ssl eq "connect") { |
|
|
1405 | $ssl = Net::SSLeay::new ($ctx || TLS_CTX ()); |
|
|
1406 | Net::SSLeay::set_connect_state ($ssl); |
|
|
1407 | } |
|
|
1408 | |
|
|
1409 | $self->{tls} = $ssl; |
|
|
1410 | |
1489 | |
1411 | # basically, this is deep magic (because SSL_read should have the same issues) |
1490 | # basically, this is deep magic (because SSL_read should have the same issues) |
1412 | # but the openssl maintainers basically said: "trust us, it just works". |
1491 | # but the openssl maintainers basically said: "trust us, it just works". |
1413 | # (unfortunately, we have to hardcode constants because the abysmally misdesigned |
1492 | # (unfortunately, we have to hardcode constants because the abysmally misdesigned |
1414 | # and mismaintained ssleay-module doesn't even offer them). |
1493 | # and mismaintained ssleay-module doesn't even offer them). |
… | |
… | |
1418 | # |
1497 | # |
1419 | # note that we do not try to keep the length constant between writes as we are required to do. |
1498 | # note that we do not try to keep the length constant between writes as we are required to do. |
1420 | # we assume that most (but not all) of this insanity only applies to non-blocking cases, |
1499 | # we assume that most (but not all) of this insanity only applies to non-blocking cases, |
1421 | # and we drive openssl fully in blocking mode here. Or maybe we don't - openssl seems to |
1500 | # and we drive openssl fully in blocking mode here. Or maybe we don't - openssl seems to |
1422 | # have identity issues in that area. |
1501 | # have identity issues in that area. |
1423 | Net::SSLeay::CTX_set_mode ($self->{tls}, |
1502 | # Net::SSLeay::CTX_set_mode ($ssl, |
1424 | (eval { local $SIG{__DIE__}; Net::SSLeay::MODE_ENABLE_PARTIAL_WRITE () } || 1) |
1503 | # (eval { local $SIG{__DIE__}; Net::SSLeay::MODE_ENABLE_PARTIAL_WRITE () } || 1) |
1425 | | (eval { local $SIG{__DIE__}; Net::SSLeay::MODE_ACCEPT_MOVING_WRITE_BUFFER () } || 2)); |
1504 | # | (eval { local $SIG{__DIE__}; Net::SSLeay::MODE_ACCEPT_MOVING_WRITE_BUFFER () } || 2)); |
|
|
1505 | Net::SSLeay::CTX_set_mode ($ssl, 1|2); |
1426 | |
1506 | |
1427 | $self->{_rbio} = Net::SSLeay::BIO_new (Net::SSLeay::BIO_s_mem ()); |
1507 | $self->{_rbio} = Net::SSLeay::BIO_new (Net::SSLeay::BIO_s_mem ()); |
1428 | $self->{_wbio} = Net::SSLeay::BIO_new (Net::SSLeay::BIO_s_mem ()); |
1508 | $self->{_wbio} = Net::SSLeay::BIO_new (Net::SSLeay::BIO_s_mem ()); |
1429 | |
1509 | |
1430 | Net::SSLeay::set_bio ($ssl, $self->{_rbio}, $self->{_wbio}); |
1510 | Net::SSLeay::set_bio ($ssl, $self->{_rbio}, $self->{_wbio}); |
… | |
… | |
1459 | sub _freetls { |
1539 | sub _freetls { |
1460 | my ($self) = @_; |
1540 | my ($self) = @_; |
1461 | |
1541 | |
1462 | return unless $self->{tls}; |
1542 | return unless $self->{tls}; |
1463 | |
1543 | |
1464 | Net::SSLeay::free (delete $self->{tls}); |
1544 | $self->{tls_ctx}->_put_session (delete $self->{tls}); |
1465 | |
1545 | |
1466 | delete @$self{qw(_rbio _wbio _tls_wbuf)}; |
1546 | delete @$self{qw(_rbio _wbio _tls_wbuf)}; |
1467 | } |
1547 | } |
1468 | |
1548 | |
1469 | sub DESTROY { |
1549 | sub DESTROY { |
1470 | my $self = shift; |
1550 | my ($self) = @_; |
1471 | |
1551 | |
1472 | &_freetls; |
1552 | &_freetls; |
1473 | |
1553 | |
1474 | my $linger = exists $self->{linger} ? $self->{linger} : 3600; |
1554 | my $linger = exists $self->{linger} ? $self->{linger} : 3600; |
1475 | |
1555 | |
… | |
… | |
1519 | %$self = (); |
1599 | %$self = (); |
1520 | } |
1600 | } |
1521 | |
1601 | |
1522 | =item AnyEvent::Handle::TLS_CTX |
1602 | =item AnyEvent::Handle::TLS_CTX |
1523 | |
1603 | |
1524 | This function creates and returns the Net::SSLeay::CTX object used by |
1604 | This function creates and returns the AnyEvent::TLS object used by default |
1525 | default for TLS mode. |
1605 | for TLS mode. |
1526 | |
1606 | |
1527 | The context is created like this: |
1607 | The context is created by calling L<AnyEvent::TLS> without any arguments. |
1528 | |
|
|
1529 | Net::SSLeay::load_error_strings; |
|
|
1530 | Net::SSLeay::SSLeay_add_ssl_algorithms; |
|
|
1531 | Net::SSLeay::randomize; |
|
|
1532 | |
|
|
1533 | my $CTX = Net::SSLeay::CTX_new; |
|
|
1534 | |
|
|
1535 | Net::SSLeay::CTX_set_options $CTX, Net::SSLeay::OP_ALL |
|
|
1536 | |
1608 | |
1537 | =cut |
1609 | =cut |
1538 | |
1610 | |
1539 | our $TLS_CTX; |
1611 | our $TLS_CTX; |
1540 | |
1612 | |
1541 | sub TLS_CTX() { |
1613 | sub TLS_CTX() { |
1542 | $TLS_CTX || do { |
1614 | $TLS_CTX ||= do { |
1543 | require Net::SSLeay; |
1615 | require AnyEvent::TLS; |
1544 | |
1616 | |
1545 | Net::SSLeay::load_error_strings (); |
1617 | new AnyEvent::TLS |
1546 | Net::SSLeay::SSLeay_add_ssl_algorithms (); |
|
|
1547 | Net::SSLeay::randomize (); |
|
|
1548 | |
|
|
1549 | $TLS_CTX = Net::SSLeay::CTX_new (); |
|
|
1550 | |
|
|
1551 | Net::SSLeay::CTX_set_options ($TLS_CTX, Net::SSLeay::OP_ALL ()); |
|
|
1552 | |
|
|
1553 | $TLS_CTX |
|
|
1554 | } |
1618 | } |
1555 | } |
1619 | } |
1556 | |
1620 | |
1557 | =back |
1621 | =back |
1558 | |
1622 | |