21
21
22
22
#include " tls_wrap.h"
23
23
#include " async_wrap-inl.h"
24
+ #include " debug_utils.h"
24
25
#include " node_buffer.h" // Buffer
25
26
#include " node_crypto.h" // SecureContext
26
27
#include " node_crypto_bio.h" // NodeBIO
@@ -74,15 +75,18 @@ TLSWrap::TLSWrap(Environment* env,
74
75
stream->PushStreamListener (this );
75
76
76
77
InitSSL ();
78
+ Debug (this , " Created new TLSWrap" );
77
79
}
78
80
79
81
80
82
TLSWrap::~TLSWrap () {
83
+ Debug (this , " ~TLSWrap()" );
81
84
sc_ = nullptr ;
82
85
}
83
86
84
87
85
88
bool TLSWrap::InvokeQueued (int status, const char * error_str) {
89
+ Debug (this , " InvokeQueued(%d, %s)" , status, error_str);
86
90
if (!write_callback_scheduled_)
87
91
return false ;
88
92
@@ -97,6 +101,7 @@ bool TLSWrap::InvokeQueued(int status, const char* error_str) {
97
101
98
102
99
103
void TLSWrap::NewSessionDoneCb () {
104
+ Debug (this , " NewSessionDoneCb()" );
100
105
Cycle ();
101
106
}
102
107
@@ -174,6 +179,7 @@ void TLSWrap::Receive(const FunctionCallbackInfo<Value>& args) {
174
179
CHECK (Buffer::HasInstance (args[0 ]));
175
180
char * data = Buffer::Data (args[0 ]);
176
181
size_t len = Buffer::Length (args[0 ]);
182
+ Debug (wrap, " Receiving %zu bytes injected from JS" , len);
177
183
178
184
// Copy given buffer entirely or partiall if handle becomes closed
179
185
while (len > 0 && wrap->IsAlive () && !wrap->IsClosing ()) {
@@ -221,6 +227,9 @@ void TLSWrap::SSLInfoCallback(const SSL* ssl_, int where, int ret) {
221
227
Local<Object> object = c->object ();
222
228
223
229
if (where & SSL_CB_HANDSHAKE_START) {
230
+ Debug (c, " SSLInfoCallback(SSL_CB_HANDSHAKE_START);" );
231
+ // Start is tracked to limit number and frequency of renegotiation attempts,
232
+ // since excessive renegotiation may be an attack.
224
233
Local<Value> callback;
225
234
226
235
if (object->Get (env->context (), env->onhandshakestart_string ())
@@ -234,6 +243,7 @@ void TLSWrap::SSLInfoCallback(const SSL* ssl_, int where, int ret) {
234
243
// sending HelloRequest in OpenSSL-1.1.1.
235
244
// We need to check whether this is in a renegotiation state or not.
236
245
if (where & SSL_CB_HANDSHAKE_DONE && !SSL_renegotiate_pending (ssl)) {
246
+ Debug (c, " SSLInfoCallback(SSL_CB_HANDSHAKE_DONE);" );
237
247
Local<Value> callback;
238
248
239
249
c->established_ = true ;
@@ -247,27 +257,40 @@ void TLSWrap::SSLInfoCallback(const SSL* ssl_, int where, int ret) {
247
257
248
258
249
259
void TLSWrap::EncOut () {
260
+ Debug (this , " Trying to write encrypted output" );
261
+
250
262
// Ignore cycling data if ClientHello wasn't yet parsed
251
- if (!hello_parser_.IsEnded ())
263
+ if (!hello_parser_.IsEnded ()) {
264
+ Debug (this , " Returning from EncOut(), hello_parser_ active" );
252
265
return ;
266
+ }
253
267
254
268
// Write in progress
255
- if (write_size_ != 0 )
269
+ if (write_size_ != 0 ) {
270
+ Debug (this , " Returning from EncOut(), write currently in progress" );
256
271
return ;
272
+ }
257
273
258
274
// Wait for `newSession` callback to be invoked
259
- if (is_awaiting_new_session ())
275
+ if (is_awaiting_new_session ()) {
276
+ Debug (this , " Returning from EncOut(), awaiting new session" );
260
277
return ;
278
+ }
261
279
262
280
// Split-off queue
263
- if (established_ && current_write_ != nullptr )
281
+ if (established_ && current_write_ != nullptr ) {
282
+ Debug (this , " EncOut() setting write_callback_scheduled_" );
264
283
write_callback_scheduled_ = true ;
284
+ }
265
285
266
- if (ssl_ == nullptr )
286
+ if (ssl_ == nullptr ) {
287
+ Debug (this , " Returning from EncOut(), ssl_ == nullptr" );
267
288
return ;
289
+ }
268
290
269
291
// No encrypted output ready to write to the underlying stream.
270
292
if (BIO_pending (enc_out_) == 0 ) {
293
+ Debug (this , " No pending encrypted output" );
271
294
if (pending_cleartext_input_.empty ())
272
295
InvokeQueued (0 );
273
296
return ;
@@ -286,6 +309,7 @@ void TLSWrap::EncOut() {
286
309
for (size_t i = 0 ; i < count; i++)
287
310
buf[i] = uv_buf_init (data[i], size[i]);
288
311
312
+ Debug (this , " Writing %zu buffers to the underlying stream" , count);
289
313
StreamWriteResult res = underlying_stream ()->Write (bufs, count);
290
314
if (res.err != 0 ) {
291
315
InvokeQueued (res.err );
@@ -295,6 +319,7 @@ void TLSWrap::EncOut() {
295
319
NODE_COUNT_NET_BYTES_SENT (write_size_);
296
320
297
321
if (!res.async ) {
322
+ Debug (this , " Write finished synchronously" );
298
323
HandleScope handle_scope (env ()->isolate ());
299
324
300
325
// Simulate asynchronous finishing, TLS cannot handle this at the moment.
@@ -306,21 +331,26 @@ void TLSWrap::EncOut() {
306
331
307
332
308
333
void TLSWrap::OnStreamAfterWrite (WriteWrap* req_wrap, int status) {
334
+ Debug (this , " OnStreamAfterWrite(status = %d)" , status);
309
335
if (current_empty_write_ != nullptr ) {
336
+ Debug (this , " Had empty write" );
310
337
WriteWrap* finishing = current_empty_write_;
311
338
current_empty_write_ = nullptr ;
312
339
finishing->Done (status);
313
340
return ;
314
341
}
315
342
316
- if (ssl_ == nullptr )
343
+ if (ssl_ == nullptr ) {
344
+ Debug (this , " ssl_ == nullptr, marking as cancelled" );
317
345
status = UV_ECANCELED;
346
+ }
318
347
319
348
// Handle error
320
349
if (status) {
321
- // Ignore errors after shutdown
322
- if (shutdown_)
350
+ if (shutdown_) {
351
+ Debug ( this , " Ignoring error after shutdown " );
323
352
return ;
353
+ }
324
354
325
355
// Notify about error
326
356
InvokeQueued (status);
@@ -383,23 +413,31 @@ Local<Value> TLSWrap::GetSSLError(int status, int* err, std::string* msg) {
383
413
384
414
385
415
void TLSWrap::ClearOut () {
416
+ Debug (this , " Trying to read cleartext output" );
386
417
// Ignore cycling data if ClientHello wasn't yet parsed
387
- if (!hello_parser_.IsEnded ())
418
+ if (!hello_parser_.IsEnded ()) {
419
+ Debug (this , " Returning from ClearOut(), hello_parser_ active" );
388
420
return ;
421
+ }
389
422
390
423
// No reads after EOF
391
- if (eof_)
424
+ if (eof_) {
425
+ Debug (this , " Returning from ClearOut(), EOF reached" );
392
426
return ;
427
+ }
393
428
394
- if (ssl_ == nullptr )
429
+ if (ssl_ == nullptr ) {
430
+ Debug (this , " Returning from ClearOut(), ssl_ == nullptr" );
395
431
return ;
432
+ }
396
433
397
434
crypto::MarkPopErrorOnReturn mark_pop_error_on_return;
398
435
399
436
char out[kClearOutChunkSize ];
400
437
int read ;
401
438
for (;;) {
402
439
read = SSL_read (ssl_.get (), out, sizeof (out));
440
+ Debug (this , " Read %d bytes of cleartext output" , read );
403
441
404
442
if (read <= 0 )
405
443
break ;
@@ -417,8 +455,10 @@ void TLSWrap::ClearOut() {
417
455
// Caveat emptor: OnRead() calls into JS land which can result in
418
456
// the SSL context object being destroyed. We have to carefully
419
457
// check that ssl_ != nullptr afterwards.
420
- if (ssl_ == nullptr )
458
+ if (ssl_ == nullptr ) {
459
+ Debug (this , " Returning from read loop, ssl_ == nullptr" );
421
460
return ;
461
+ }
422
462
423
463
read -= avail;
424
464
current += avail;
@@ -444,6 +484,7 @@ void TLSWrap::ClearOut() {
444
484
return ;
445
485
446
486
if (!arg.IsEmpty ()) {
487
+ Debug (this , " Got SSL error (%d), calling onerror" , err);
447
488
// When TLS Alert are stored in wbio,
448
489
// it should be flushed to socket before destroyed.
449
490
if (BIO_pending (enc_out_) != 0 )
@@ -456,12 +497,17 @@ void TLSWrap::ClearOut() {
456
497
457
498
458
499
void TLSWrap::ClearIn () {
500
+ Debug (this , " Trying to write cleartext input" );
459
501
// Ignore cycling data if ClientHello wasn't yet parsed
460
- if (!hello_parser_.IsEnded ())
502
+ if (!hello_parser_.IsEnded ()) {
503
+ Debug (this , " Returning from ClearIn(), hello_parser_ active" );
461
504
return ;
505
+ }
462
506
463
- if (ssl_ == nullptr )
507
+ if (ssl_ == nullptr ) {
508
+ Debug (this , " Returning from ClearIn(), ssl_ == nullptr" );
464
509
return ;
510
+ }
465
511
466
512
std::vector<uv_buf_t > buffers;
467
513
buffers.swap (pending_cleartext_input_);
@@ -474,13 +520,15 @@ void TLSWrap::ClearIn() {
474
520
size_t avail = buffers[i].len ;
475
521
char * data = buffers[i].base ;
476
522
written = SSL_write (ssl_.get (), data, avail);
523
+ Debug (this , " Writing %zu bytes, written = %d" , avail, written);
477
524
CHECK (written == -1 || written == static_cast <int >(avail));
478
525
if (written == -1 )
479
526
break ;
480
527
}
481
528
482
529
// All written
483
530
if (i == buffers.size ()) {
531
+ Debug (this , " Successfully wrote all data to SSL" );
484
532
// We wrote all the buffers, so no writes failed (written < 0 on failure).
485
533
CHECK_GE (written, 0 );
486
534
return ;
@@ -494,11 +542,13 @@ void TLSWrap::ClearIn() {
494
542
std::string error_str;
495
543
Local<Value> arg = GetSSLError (written, &err, &error_str);
496
544
if (!arg.IsEmpty ()) {
545
+ Debug (this , " Got SSL error (%d)" , err);
497
546
write_callback_scheduled_ = true ;
498
547
// XXX(sam) Should forward an error object with .code/.function/.etc, if
499
548
// possible.
500
549
InvokeQueued (UV_EPROTO, error_str.c_str ());
501
550
} else {
551
+ Debug (this , " Pushing back %zu buffers" , buffers.size () - i);
502
552
// Push back the not-yet-written pending buffers into their queue.
503
553
// This can be skipped in the error case because no further writes
504
554
// would succeed anyway.
@@ -511,6 +561,17 @@ void TLSWrap::ClearIn() {
511
561
}
512
562
513
563
564
+ std::string TLSWrap::diagnostic_name () const {
565
+ std::string name = " TLSWrap " ;
566
+ if (is_server ())
567
+ name += " server (" ;
568
+ else
569
+ name += " client (" ;
570
+ name += std::to_string (static_cast <int64_t >(get_async_id ())) + " )" ;
571
+ return name;
572
+ }
573
+
574
+
514
575
AsyncWrap* TLSWrap::GetAsyncWrap () {
515
576
return static_cast <AsyncWrap*>(this );
516
577
}
@@ -540,13 +601,15 @@ bool TLSWrap::IsClosing() {
540
601
541
602
542
603
int TLSWrap::ReadStart () {
604
+ Debug (this , " ReadStart()" );
543
605
if (stream_ != nullptr )
544
606
return stream_->ReadStart ();
545
607
return 0 ;
546
608
}
547
609
548
610
549
611
int TLSWrap::ReadStop () {
612
+ Debug (this , " ReadStop()" );
550
613
if (stream_ != nullptr )
551
614
return stream_->ReadStop ();
552
615
return 0 ;
@@ -569,6 +632,7 @@ int TLSWrap::DoWrite(WriteWrap* w,
569
632
size_t count,
570
633
uv_stream_t * send_handle) {
571
634
CHECK_NULL (send_handle);
635
+ Debug (this , " DoWrite()" );
572
636
573
637
if (ssl_ == nullptr ) {
574
638
ClearError ();
@@ -596,8 +660,10 @@ int TLSWrap::DoWrite(WriteWrap* w,
596
660
// onto the socket, we just want the side-effects. After, make sure the
597
661
// WriteWrap was accepted by the stream, or that we call Done() on it.
598
662
if (empty) {
663
+ Debug (this , " Empty write" );
599
664
ClearOut ();
600
665
if (BIO_pending (enc_out_) == 0 ) {
666
+ Debug (this , " No pending encrypted output, writing to underlying stream" );
601
667
CHECK_NULL (current_empty_write_);
602
668
current_empty_write_ = w;
603
669
StreamWriteResult res =
@@ -628,6 +694,7 @@ int TLSWrap::DoWrite(WriteWrap* w,
628
694
for (i = 0 ; i < count; i++) {
629
695
written = SSL_write (ssl_.get (), bufs[i].base , bufs[i].len );
630
696
CHECK (written == -1 || written == static_cast <int >(bufs[i].len ));
697
+ Debug (this , " Writing %zu bytes, written = %d" , bufs[i].len , written);
631
698
if (written == -1 )
632
699
break ;
633
700
}
@@ -638,10 +705,12 @@ int TLSWrap::DoWrite(WriteWrap* w,
638
705
639
706
// If we stopped writing because of an error, it's fatal, discard the data.
640
707
if (!arg.IsEmpty ()) {
708
+ Debug (this , " Got SSL error (%d), returning UV_EPROTO" , err);
641
709
current_write_ = nullptr ;
642
710
return UV_EPROTO;
643
711
}
644
712
713
+ Debug (this , " Saving %zu buffers for later write" , count - i);
645
714
// Otherwise, save unwritten data so it can be written later by ClearIn().
646
715
pending_cleartext_input_.insert (pending_cleartext_input_.end (),
647
716
&bufs[i],
@@ -665,6 +734,7 @@ uv_buf_t TLSWrap::OnStreamAlloc(size_t suggested_size) {
665
734
666
735
667
736
void TLSWrap::OnStreamRead (ssize_t nread, const uv_buf_t & buf) {
737
+ Debug (this , " Read %zd bytes from underlying stream" , nread);
668
738
if (nread < 0 ) {
669
739
// Error should be emitted only after all data was read
670
740
ClearOut ();
@@ -698,6 +768,7 @@ void TLSWrap::OnStreamRead(ssize_t nread, const uv_buf_t& buf) {
698
768
size_t avail = 0 ;
699
769
uint8_t * data = reinterpret_cast <uint8_t *>(enc_in->Peek (&avail));
700
770
CHECK_IMPLIES (data == nullptr , avail == 0 );
771
+ Debug (this , " Passing %zu bytes to the hello parser" , avail);
701
772
return hello_parser_.Parse (data, avail);
702
773
}
703
774
@@ -712,6 +783,7 @@ ShutdownWrap* TLSWrap::CreateShutdownWrap(Local<Object> req_wrap_object) {
712
783
713
784
714
785
int TLSWrap::DoShutdown (ShutdownWrap* req_wrap) {
786
+ Debug (this , " DoShutdown()" );
715
787
crypto::MarkPopErrorOnReturn mark_pop_error_on_return;
716
788
717
789
if (ssl_ && SSL_shutdown (ssl_.get ()) == 0 )
@@ -770,6 +842,7 @@ void TLSWrap::EnableSessionCallbacks(
770
842
void TLSWrap::DestroySSL (const FunctionCallbackInfo<Value>& args) {
771
843
TLSWrap* wrap;
772
844
ASSIGN_OR_RETURN_UNWRAP (&wrap, args.Holder ());
845
+ Debug (wrap, " DestroySSL()" );
773
846
774
847
// If there is a write happening, mark it as finished.
775
848
wrap->write_callback_scheduled_ = true ;
@@ -784,6 +857,7 @@ void TLSWrap::DestroySSL(const FunctionCallbackInfo<Value>& args) {
784
857
785
858
if (wrap->stream_ != nullptr )
786
859
wrap->stream_ ->RemoveStreamListener (wrap);
860
+ Debug (wrap, " DestroySSL() finished" );
787
861
}
788
862
789
863
@@ -796,6 +870,7 @@ void TLSWrap::EnableCertCb(const FunctionCallbackInfo<Value>& args) {
796
870
797
871
void TLSWrap::OnClientHelloParseEnd (void * arg) {
798
872
TLSWrap* c = static_cast <TLSWrap*>(arg);
873
+ Debug (c, " OnClientHelloParseEnd()" );
799
874
c->Cycle ();
800
875
}
801
876
0 commit comments