File: openssl_util.cc

package info (click to toggle)
android-platform-tools 34.0.5-12
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 150,900 kB
  • sloc: cpp: 805,786; java: 293,500; ansic: 128,288; xml: 127,491; python: 41,481; sh: 14,245; javascript: 9,665; cs: 3,846; asm: 2,049; makefile: 1,917; yacc: 440; awk: 368; ruby: 183; sql: 140; perl: 88; lex: 67
file content (97 lines) | stat: -rw-r--r-- 3,129 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
// Copyright 2019 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "util/crypto/openssl_util.h"

#include <openssl/crypto.h>
#include <openssl/err.h>
#include <openssl/ssl.h>
#include <stddef.h>
#include <stdint.h>

#include <sstream>
#include <string>
#include <utility>

#include "absl/strings/string_view.h"
#include "util/osp_logging.h"

namespace openscreen {

namespace {

// Callback routine for OpenSSL to print error messages. |str| is a
// nullptr-terminated string of length |len| containing diagnostic information
// such as the library, function and reason for the error, the file and line
// where the error originated, plus potentially any context-specific
// information about the error. |context| contains a pointer to user-supplied
// data, which is currently unused.
// If this callback returns a value <= 0, OpenSSL will stop processing the
// error queue and return, otherwise it will continue calling this function
// until all errors have been removed from the queue.
int OpenSSLErrorCallback(const char* str, size_t len, void* context) {
  OSP_DVLOG << "\t" << absl::string_view(str, len);
  return 1;
}

}  // namespace

void EnsureOpenSSLInit() {
  // If SSL fails to initialize, we can't run crypto.
  OSP_CHECK(OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS, nullptr) == 1);
}

void EnsureOpenSSLCleanup() {
  EVP_cleanup();
}

void ClearOpenSSLERRStack(const Location& location) {
  if (OSP_DCHECK_IS_ON()) {
    uint32_t error_num = ERR_peek_error();
    if (error_num == 0) {
      return;
    }

    OSP_DVLOG << "OpenSSL ERR_get_error stack from " << location.ToString();
    ERR_print_errors_cb(&OpenSSLErrorCallback, nullptr);
  } else {
    ERR_clear_error();
  }
}

// General note about SSL errors. Error messages are pushed to the general
// OpenSSL error queue. Call ClearOpenSSLERRStack before calling any
// SSL methods.
Error GetSSLError(const SSL* ssl, int return_code) {
  const int error_code = SSL_get_error(ssl, return_code);
  if (error_code == SSL_ERROR_NONE) {
    return Error::None();
  }

  // Create error message w/ unwind of error stack + original SSL error string.
  std::stringstream msg;
  msg << "boringssl error (" << error_code
      << "): " << SSL_error_description(error_code);
  while (uint32_t packed_error = ERR_get_error()) {
    msg << "\nerr stack: " << ERR_reason_error_string(packed_error);
  }
  std::string message = msg.str();
  switch (error_code) {
    case SSL_ERROR_ZERO_RETURN:
      return Error(Error::Code::kSocketClosedFailure, std::move(message));

    case SSL_ERROR_WANT_READ:     // fallthrough
    case SSL_ERROR_WANT_WRITE:    // fallthrough
    case SSL_ERROR_WANT_CONNECT:  // fallthrough
    case SSL_ERROR_WANT_ACCEPT:   // fallthrough
    case SSL_ERROR_WANT_X509_LOOKUP:
      return Error(Error::Code::kAgain, std::move(message));

    case SSL_ERROR_SYSCALL:  // fallthrough
    case SSL_ERROR_SSL:
      return Error(Error::Code::kFatalSSLError, std::move(message));
  }
  OSP_NOTREACHED();
}
}  // namespace openscreen