Convert LS_VERBOSE and LS_INFO logs in OpenSSLStreamAdapter to DLOG
Bug: none Change-Id: I008b76557cc928f9ceeea76927f7de4e4c6f9473 Reviewed-on: https://webrtc-review.googlesource.com/c/src/+/186580 Reviewed-by: Danil Chapovalov <danilchap@webrtc.org> Commit-Queue: Tommi <tommi@webrtc.org> Cr-Commit-Position: refs/heads/master@{#32297}
This commit is contained in:
parent
0f1f72eba4
commit
d48ff45707
@ -547,7 +547,7 @@ StreamResult OpenSSLStreamAdapter::Write(const void* data,
|
||||
size_t data_len,
|
||||
size_t* written,
|
||||
int* error) {
|
||||
RTC_LOG(LS_VERBOSE) << "OpenSSLStreamAdapter::Write(" << data_len << ")";
|
||||
RTC_DLOG(LS_VERBOSE) << "OpenSSLStreamAdapter::Write(" << data_len << ")";
|
||||
|
||||
switch (state_) {
|
||||
case SSL_NONE:
|
||||
@ -587,18 +587,18 @@ StreamResult OpenSSLStreamAdapter::Write(const void* data,
|
||||
int ssl_error = SSL_get_error(ssl_, code);
|
||||
switch (ssl_error) {
|
||||
case SSL_ERROR_NONE:
|
||||
RTC_LOG(LS_VERBOSE) << " -- success";
|
||||
RTC_DLOG(LS_VERBOSE) << " -- success";
|
||||
RTC_DCHECK_GT(code, 0);
|
||||
RTC_DCHECK_LE(code, data_len);
|
||||
if (written)
|
||||
*written = code;
|
||||
return SR_SUCCESS;
|
||||
case SSL_ERROR_WANT_READ:
|
||||
RTC_LOG(LS_VERBOSE) << " -- error want read";
|
||||
RTC_DLOG(LS_VERBOSE) << " -- error want read";
|
||||
ssl_write_needs_read_ = true;
|
||||
return SR_BLOCK;
|
||||
case SSL_ERROR_WANT_WRITE:
|
||||
RTC_LOG(LS_VERBOSE) << " -- error want write";
|
||||
RTC_DLOG(LS_VERBOSE) << " -- error want write";
|
||||
return SR_BLOCK;
|
||||
|
||||
case SSL_ERROR_ZERO_RETURN:
|
||||
@ -616,7 +616,7 @@ StreamResult OpenSSLStreamAdapter::Read(void* data,
|
||||
size_t data_len,
|
||||
size_t* read,
|
||||
int* error) {
|
||||
RTC_LOG(LS_VERBOSE) << "OpenSSLStreamAdapter::Read(" << data_len << ")";
|
||||
RTC_DLOG(LS_VERBOSE) << "OpenSSLStreamAdapter::Read(" << data_len << ")";
|
||||
switch (state_) {
|
||||
case SSL_NONE:
|
||||
// pass-through in clear text
|
||||
@ -654,7 +654,7 @@ StreamResult OpenSSLStreamAdapter::Read(void* data,
|
||||
|
||||
switch (ssl_error) {
|
||||
case SSL_ERROR_NONE:
|
||||
RTC_LOG(LS_VERBOSE) << " -- success";
|
||||
RTC_DLOG(LS_VERBOSE) << " -- success";
|
||||
RTC_DCHECK_GT(code, 0);
|
||||
RTC_DCHECK_LE(code, data_len);
|
||||
if (read) {
|
||||
@ -666,7 +666,7 @@ StreamResult OpenSSLStreamAdapter::Read(void* data,
|
||||
unsigned int pending = SSL_pending(ssl_);
|
||||
|
||||
if (pending) {
|
||||
RTC_LOG(LS_INFO) << " -- short DTLS read. flushing";
|
||||
RTC_DLOG(LS_INFO) << " -- short DTLS read. flushing";
|
||||
FlushInput(pending);
|
||||
if (error) {
|
||||
*error = SSE_MSG_TRUNC;
|
||||
@ -676,14 +676,14 @@ StreamResult OpenSSLStreamAdapter::Read(void* data,
|
||||
}
|
||||
return SR_SUCCESS;
|
||||
case SSL_ERROR_WANT_READ:
|
||||
RTC_LOG(LS_VERBOSE) << " -- error want read";
|
||||
RTC_DLOG(LS_VERBOSE) << " -- error want read";
|
||||
return SR_BLOCK;
|
||||
case SSL_ERROR_WANT_WRITE:
|
||||
RTC_LOG(LS_VERBOSE) << " -- error want write";
|
||||
RTC_DLOG(LS_VERBOSE) << " -- error want write";
|
||||
ssl_read_needs_write_ = true;
|
||||
return SR_BLOCK;
|
||||
case SSL_ERROR_ZERO_RETURN:
|
||||
RTC_LOG(LS_VERBOSE) << " -- remote side closed";
|
||||
RTC_DLOG(LS_VERBOSE) << " -- remote side closed";
|
||||
Close();
|
||||
return SR_EOS;
|
||||
default:
|
||||
@ -713,7 +713,7 @@ void OpenSSLStreamAdapter::FlushInput(unsigned int left) {
|
||||
return;
|
||||
}
|
||||
|
||||
RTC_LOG(LS_VERBOSE) << " -- flushed " << code << " bytes";
|
||||
RTC_DLOG(LS_VERBOSE) << " -- flushed " << code << " bytes";
|
||||
left -= code;
|
||||
}
|
||||
}
|
||||
@ -751,7 +751,7 @@ void OpenSSLStreamAdapter::OnEvent(StreamInterface* stream,
|
||||
RTC_DCHECK(stream == this->stream());
|
||||
|
||||
if ((events & SE_OPEN)) {
|
||||
RTC_LOG(LS_VERBOSE) << "OpenSSLStreamAdapter::OnEvent SE_OPEN";
|
||||
RTC_DLOG(LS_VERBOSE) << "OpenSSLStreamAdapter::OnEvent SE_OPEN";
|
||||
if (state_ != SSL_WAIT) {
|
||||
RTC_DCHECK(state_ == SSL_NONE);
|
||||
events_to_signal |= SE_OPEN;
|
||||
@ -765,9 +765,9 @@ void OpenSSLStreamAdapter::OnEvent(StreamInterface* stream,
|
||||
}
|
||||
|
||||
if ((events & (SE_READ | SE_WRITE))) {
|
||||
RTC_LOG(LS_VERBOSE) << "OpenSSLStreamAdapter::OnEvent"
|
||||
<< ((events & SE_READ) ? " SE_READ" : "")
|
||||
<< ((events & SE_WRITE) ? " SE_WRITE" : "");
|
||||
RTC_DLOG(LS_VERBOSE) << "OpenSSLStreamAdapter::OnEvent"
|
||||
<< ((events & SE_READ) ? " SE_READ" : "")
|
||||
<< ((events & SE_WRITE) ? " SE_WRITE" : "");
|
||||
if (state_ == SSL_NONE) {
|
||||
events_to_signal |= events & (SE_READ | SE_WRITE);
|
||||
} else if (state_ == SSL_CONNECTING) {
|
||||
@ -778,20 +778,20 @@ void OpenSSLStreamAdapter::OnEvent(StreamInterface* stream,
|
||||
} else if (state_ == SSL_CONNECTED) {
|
||||
if (((events & SE_READ) && ssl_write_needs_read_) ||
|
||||
(events & SE_WRITE)) {
|
||||
RTC_LOG(LS_VERBOSE) << " -- onStreamWriteable";
|
||||
RTC_DLOG(LS_VERBOSE) << " -- onStreamWriteable";
|
||||
events_to_signal |= SE_WRITE;
|
||||
}
|
||||
if (((events & SE_WRITE) && ssl_read_needs_write_) ||
|
||||
(events & SE_READ)) {
|
||||
RTC_LOG(LS_VERBOSE) << " -- onStreamReadable";
|
||||
RTC_DLOG(LS_VERBOSE) << " -- onStreamReadable";
|
||||
events_to_signal |= SE_READ;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if ((events & SE_CLOSE)) {
|
||||
RTC_LOG(LS_VERBOSE) << "OpenSSLStreamAdapter::OnEvent(SE_CLOSE, " << err
|
||||
<< ")";
|
||||
RTC_DLOG(LS_VERBOSE) << "OpenSSLStreamAdapter::OnEvent(SE_CLOSE, " << err
|
||||
<< ")";
|
||||
Cleanup(0);
|
||||
events_to_signal |= SE_CLOSE;
|
||||
// SE_CLOSE is the only event that uses the final parameter to OnEvent().
|
||||
@ -819,7 +819,7 @@ void OpenSSLStreamAdapter::SetTimeout(int delay_ms) {
|
||||
owner_, webrtc::TimeDelta::Millis(delay_ms),
|
||||
[flag = task_safety_.flag(), this]() {
|
||||
if (flag->alive()) {
|
||||
RTC_LOG(LS_INFO) << "DTLS timeout expired";
|
||||
RTC_DLOG(LS_INFO) << "DTLS timeout expired";
|
||||
timeout_task_.Stop();
|
||||
DTLSv1_handle_timeout(ssl_);
|
||||
ContinueSSL();
|
||||
@ -834,7 +834,7 @@ void OpenSSLStreamAdapter::SetTimeout(int delay_ms) {
|
||||
int OpenSSLStreamAdapter::BeginSSL() {
|
||||
RTC_DCHECK(state_ == SSL_CONNECTING);
|
||||
// The underlying stream has opened.
|
||||
RTC_LOG(LS_INFO) << "BeginSSL with peer.";
|
||||
RTC_DLOG(LS_INFO) << "BeginSSL with peer.";
|
||||
|
||||
BIO* bio = nullptr;
|
||||
|
||||
@ -877,7 +877,7 @@ int OpenSSLStreamAdapter::BeginSSL() {
|
||||
}
|
||||
|
||||
int OpenSSLStreamAdapter::ContinueSSL() {
|
||||
RTC_LOG(LS_VERBOSE) << "ContinueSSL";
|
||||
RTC_DLOG(LS_VERBOSE) << "ContinueSSL";
|
||||
RTC_DCHECK(state_ == SSL_CONNECTING);
|
||||
|
||||
// Clear the DTLS timer
|
||||
@ -888,7 +888,7 @@ int OpenSSLStreamAdapter::ContinueSSL() {
|
||||
|
||||
switch (ssl_error) {
|
||||
case SSL_ERROR_NONE:
|
||||
RTC_LOG(LS_VERBOSE) << " -- success";
|
||||
RTC_DLOG(LS_VERBOSE) << " -- success";
|
||||
// By this point, OpenSSL should have given us a certificate, or errored
|
||||
// out if one was missing.
|
||||
RTC_DCHECK(peer_cert_chain_ || !GetClientAuthEnabled());
|
||||
@ -909,7 +909,7 @@ int OpenSSLStreamAdapter::ContinueSSL() {
|
||||
break;
|
||||
|
||||
case SSL_ERROR_WANT_READ: {
|
||||
RTC_LOG(LS_VERBOSE) << " -- error want read";
|
||||
RTC_DLOG(LS_VERBOSE) << " -- error want read";
|
||||
struct timeval timeout;
|
||||
if (DTLSv1_get_timeout(ssl_, &timeout)) {
|
||||
int delay = timeout.tv_sec * 1000 + timeout.tv_usec / 1000;
|
||||
@ -918,7 +918,7 @@ int OpenSSLStreamAdapter::ContinueSSL() {
|
||||
} break;
|
||||
|
||||
case SSL_ERROR_WANT_WRITE:
|
||||
RTC_LOG(LS_VERBOSE) << " -- error want write";
|
||||
RTC_DLOG(LS_VERBOSE) << " -- error want write";
|
||||
break;
|
||||
|
||||
case SSL_ERROR_ZERO_RETURN:
|
||||
@ -928,8 +928,8 @@ int OpenSSLStreamAdapter::ContinueSSL() {
|
||||
if (err_code != 0 && ERR_GET_REASON(err_code) == SSL_R_NO_SHARED_CIPHER) {
|
||||
ssl_handshake_err = SSLHandshakeError::INCOMPATIBLE_CIPHERSUITE;
|
||||
}
|
||||
RTC_LOG(LS_VERBOSE) << " -- error " << code << ", " << err_code << ", "
|
||||
<< ERR_GET_REASON(err_code);
|
||||
RTC_DLOG(LS_VERBOSE) << " -- error " << code << ", " << err_code << ", "
|
||||
<< ERR_GET_REASON(err_code);
|
||||
SignalSSLHandshakeError(ssl_handshake_err);
|
||||
return (ssl_error != 0) ? ssl_error : -1;
|
||||
}
|
||||
@ -952,7 +952,7 @@ void OpenSSLStreamAdapter::Error(const char* context,
|
||||
}
|
||||
|
||||
void OpenSSLStreamAdapter::Cleanup(uint8_t alert) {
|
||||
RTC_LOG(LS_INFO) << "Cleanup";
|
||||
RTC_DLOG(LS_INFO) << "Cleanup";
|
||||
|
||||
if (state_ != SSL_ERROR) {
|
||||
state_ = SSL_CLOSED;
|
||||
@ -1103,7 +1103,7 @@ bool OpenSSLStreamAdapter::VerifyPeerCertificate() {
|
||||
// Ignore any verification error if the digest matches, since there is no
|
||||
// value in checking the validity of a self-signed cert issued by untrusted
|
||||
// sources.
|
||||
RTC_LOG(LS_INFO) << "Accepted peer certificate.";
|
||||
RTC_DLOG(LS_INFO) << "Accepted peer certificate.";
|
||||
peer_certificate_verified_ = true;
|
||||
return true;
|
||||
}
|
||||
@ -1138,7 +1138,7 @@ int OpenSSLStreamAdapter::SSLVerifyCallback(X509_STORE_CTX* store, void* arg) {
|
||||
// If the peer certificate digest isn't known yet, we'll wait to verify
|
||||
// until it's known, and for now just return a success status.
|
||||
if (stream->peer_certificate_digest_algorithm_.empty()) {
|
||||
RTC_LOG(LS_INFO) << "Waiting to verify certificate until digest is known.";
|
||||
RTC_DLOG(LS_INFO) << "Waiting to verify certificate until digest is known.";
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user