1 /* Copyright 2011-2013 NORDUnet A/S. All rights reserved.
2 See LICENSE for licensing information. */
4 #if defined HAVE_CONFIG_H
12 #include <event2/event.h>
13 #include <event2/bufferevent.h>
14 #if defined (RS_ENABLE_TLS)
15 #include <event2/bufferevent_ssl.h>
16 #include <openssl/err.h>
18 #include <radsec/radsec.h>
19 #include <radsec/radsec-impl.h>
22 #if defined (RS_ENABLE_TLS)
33 extern int _event_debug_mode_on;
37 _evlog_cb (int severity, const char *msg)
42 case _EVENT_LOG_DEBUG:
43 #if !defined (DEBUG_LEVENT)
61 fprintf (stderr, "libevent: [%s] %s\n", sevstr, msg); /* FIXME: stderr? */
65 event_conn_timeout_cb (int fd, short event, void *data)
67 struct rs_connection *conn = NULL;
70 conn = (struct rs_connection *) data;
72 if (event & EV_TIMEOUT)
74 rs_debug (("%s: connection timeout on %p (fd %d) connecting to %p\n",
75 __func__, conn, conn->fd, conn->active_peer));
76 conn->is_connecting = 0;
77 rs_err_conn_push_fl (conn, RSE_TIMEOUT_CONN, __FILE__, __LINE__, NULL);
78 event_loopbreak (conn);
83 event_retransmit_timeout_cb (int fd, short event, void *data)
85 struct rs_connection *conn = NULL;
88 conn = (struct rs_connection *) data;
90 if (event & EV_TIMEOUT)
92 rs_debug (("%s: retransmission timeout on %p (fd %d) sending to %p\n",
93 __func__, conn, conn->fd, conn->active_peer));
94 rs_err_conn_push_fl (conn, RSE_TIMEOUT_IO, __FILE__, __LINE__, NULL);
96 /* Disable/delete read and write events. Timing out on reading
97 might f.ex. trigger resending of a message. It'd be
98 surprising to end up reading without having enabled/created a
99 read event in that case. */
100 if (conn->bev) /* TCP. */
101 bufferevent_disable (conn->bev, EV_WRITE|EV_READ);
105 event_del (conn->wev);
107 event_del (conn->rev);
110 event_loopbreak (conn);
115 event_init_socket (struct rs_connection *conn, struct rs_peer *p)
120 if (p->addr_cache == NULL)
122 struct rs_error *err =
123 rs_resolve (&p->addr_cache, p->realm->type, p->hostname, p->service);
125 return err_conn_push_err (conn, err);
128 conn->fd = socket (p->addr_cache->ai_family, p->addr_cache->ai_socktype,
129 p->addr_cache->ai_protocol);
131 return rs_err_conn_push_fl (conn, RSE_SOCKERR, __FILE__, __LINE__,
133 errno, strerror (errno));
134 if (evutil_make_socket_nonblocking (conn->fd) < 0)
136 evutil_closesocket (conn->fd);
138 return rs_err_conn_push_fl (conn, RSE_SOCKERR, __FILE__, __LINE__,
139 "evutil_make_socket_nonblocking: %d (%s)",
140 errno, strerror (errno));
146 event_init_bufferevent (struct rs_connection *conn, struct rs_peer *peer)
151 if (conn->realm->type == RS_CONN_TYPE_TCP)
153 conn->bev = bufferevent_socket_new (conn->evb, conn->fd, 0);
155 return rs_err_conn_push_fl (conn, RSE_EVENT, __FILE__, __LINE__,
156 "bufferevent_socket_new");
158 #if defined (RS_ENABLE_TLS)
159 else if (conn->realm->type == RS_CONN_TYPE_TLS)
161 if (rs_tls_init (conn))
163 /* Would be convenient to pass BEV_OPT_CLOSE_ON_FREE but things
164 seem to break when be_openssl_ctrl() (in libevent) calls
165 SSL_set_bio() after BIO_new_socket() with flag=1. */
167 bufferevent_openssl_socket_new (conn->evb, conn->fd, conn->tls_ssl,
168 BUFFEREVENT_SSL_CONNECTING, 0);
170 return rs_err_conn_push_fl (conn, RSE_EVENT, __FILE__, __LINE__,
171 "bufferevent_openssl_socket_new");
173 #endif /* RS_ENABLE_TLS */
176 return rs_err_conn_push_fl (conn, RSE_INTERNAL, __FILE__, __LINE__,
177 "%s: unknown connection type: %d", __func__,
185 event_do_connect (struct rs_connection *conn)
191 assert (conn->active_peer);
192 p = conn->active_peer;
196 char host[80], serv[80];
198 getnameinfo (p->addr_cache->ai_addr,
199 p->addr_cache->ai_addrlen,
200 host, sizeof(host), serv, sizeof(serv),
201 0 /* NI_NUMERICHOST|NI_NUMERICSERV*/);
202 rs_debug (("%s: connecting to %s:%s\n", __func__, host, serv));
206 if (p->conn->bev) /* TCP */
208 conn_activate_timeout (conn); /* Connect timeout. */
209 err = bufferevent_socket_connect (p->conn->bev, p->addr_cache->ai_addr,
210 p->addr_cache->ai_addrlen);
212 rs_err_conn_push_fl (p->conn, RSE_EVENT, __FILE__, __LINE__,
213 "bufferevent_socket_connect: %s",
214 evutil_gai_strerror (err));
216 p->conn->is_connecting = 1;
220 err = connect (p->conn->fd,
221 p->addr_cache->ai_addr,
222 p->addr_cache->ai_addrlen);
225 sockerr = evutil_socket_geterror (p->conn->fd);
226 rs_debug (("%s: %d: connect: %d (%s)\n", __func__, p->conn->fd,
227 sockerr, evutil_socket_error_to_string (sockerr)));
228 rs_err_conn_push_fl (p->conn, RSE_SOCKERR, __FILE__, __LINE__,
229 "%d: connect: %d (%s)", p->conn->fd, sockerr,
230 evutil_socket_error_to_string (sockerr));
236 event_loopbreak (struct rs_connection *conn)
238 int err = event_base_loopbreak (conn->evb);
240 rs_err_conn_push (conn, RSE_EVENT, "event_base_loopbreak");
246 event_on_disconnect (struct rs_connection *conn)
248 conn->is_connecting = 0;
249 conn->is_connected = 0;
250 rs_debug (("%s: %p disconnected\n", __func__, conn->active_peer));
251 if (conn->callbacks.disconnected_cb)
252 conn->callbacks.disconnected_cb (conn->user_data);
255 /** Internal connect event returning 0 on success or -1 on error. */
257 event_on_connect (struct rs_connection *conn, struct rs_packet *pkt)
259 assert (!conn->is_connecting);
261 #if defined (RS_ENABLE_TLS)
262 if (conn_type_tls(conn) && !conn_cred_psk(conn))
263 if (tls_verify_cert (conn) != RSE_OK)
265 rs_debug (("%s: server cert verification failed\n", __func__));
268 #endif /* RS_ENABLE_TLS */
270 conn->is_connected = 1;
271 rs_debug (("%s: %p connected\n", __func__, conn->active_peer));
273 if (conn->callbacks.connected_cb)
274 conn->callbacks.connected_cb (conn->user_data);
277 packet_do_send (pkt);
283 event_init_eventbase (struct rs_connection *conn)
290 if (!_event_debug_mode_on)
291 event_enable_debug_mode ();
293 event_set_log_callback (_evlog_cb);
294 conn->evb = event_base_new ();
296 return rs_err_conn_push_fl (conn, RSE_EVENT, __FILE__, __LINE__,