bss_conn.c revision 59191
1214455Srpaulo/* crypto/bio/bss_conn.c */ 2214455Srpaulo/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 3214455Srpaulo * All rights reserved. 4214455Srpaulo * 5214455Srpaulo * This package is an SSL implementation written 6214455Srpaulo * by Eric Young (eay@cryptsoft.com). 7214455Srpaulo * The implementation was written so as to conform with Netscapes SSL. 8214455Srpaulo * 9214455Srpaulo * This library is free for commercial and non-commercial use as long as 10214455Srpaulo * the following conditions are aheared to. The following conditions 11214455Srpaulo * apply to all code found in this distribution, be it the RC4, RSA, 12214455Srpaulo * lhash, DES, etc., code; not just the SSL code. The SSL documentation 13214455Srpaulo * included with this distribution is covered by the same copyright terms 14214455Srpaulo * except that the holder is Tim Hudson (tjh@cryptsoft.com). 15214455Srpaulo * 16214455Srpaulo * Copyright remains Eric Young's, and as such any Copyright notices in 17214455Srpaulo * the code are not to be removed. 18214455Srpaulo * If this package is used in a product, Eric Young should be given attribution 19214455Srpaulo * as the author of the parts of the library used. 20214455Srpaulo * This can be in the form of a textual message at program startup or 21214455Srpaulo * in documentation (online or textual) provided with the package. 22214455Srpaulo * 23214455Srpaulo * Redistribution and use in source and binary forms, with or without 24214455Srpaulo * modification, are permitted provided that the following conditions 25214455Srpaulo * are met: 26214455Srpaulo * 1. Redistributions of source code must retain the copyright 27214455Srpaulo * notice, this list of conditions and the following disclaimer. 28214455Srpaulo * 2. Redistributions in binary form must reproduce the above copyright 29214455Srpaulo * notice, this list of conditions and the following disclaimer in the 30214455Srpaulo * documentation and/or other materials provided with the distribution. 31214455Srpaulo * 3. All advertising materials mentioning features or use of this software 32214455Srpaulo * must display the following acknowledgement: 33214455Srpaulo * "This product includes cryptographic software written by 34214455Srpaulo * Eric Young (eay@cryptsoft.com)" 35214455Srpaulo * The word 'cryptographic' can be left out if the rouines from the library 36214455Srpaulo * being used are not cryptographic related :-). 37 * 4. If you include any Windows specific code (or a derivative thereof) from 38 * the apps directory (application code) you must include an acknowledgement: 39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 40 * 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 51 * SUCH DAMAGE. 52 * 53 * The licence and distribution terms for any publically available version or 54 * derivative of this code cannot be changed. i.e. this code cannot simply be 55 * copied and put under another distribution licence 56 * [including the GNU Public Licence.] 57 */ 58 59#ifndef NO_SOCK 60 61#include <stdio.h> 62#include <errno.h> 63#define USE_SOCKETS 64#include "cryptlib.h" 65#include <openssl/bio.h> 66 67#ifdef WIN16 68#define SOCKET_PROTOCOL 0 /* more microsoft stupidity */ 69#else 70#define SOCKET_PROTOCOL IPPROTO_TCP 71#endif 72 73#if (defined(VMS) && __VMS_VER < 70000000) 74/* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */ 75#undef FIONBIO 76#endif 77 78 79typedef struct bio_connect_st 80 { 81 int state; 82 83 char *param_hostname; 84 char *param_port; 85 int nbio; 86 87 unsigned char ip[4]; 88 unsigned short port; 89 90 struct sockaddr_in them; 91 92 /* int socket; this will be kept in bio->num so that it is 93 * compatible with the bss_sock bio */ 94 95 /* called when the connection is initially made 96 * callback(BIO,state,ret); The callback should return 97 * 'ret'. state is for compatibility with the ssl info_callback */ 98 int (*info_callback)(); 99 } BIO_CONNECT; 100 101static int conn_write(BIO *h,char *buf,int num); 102static int conn_read(BIO *h,char *buf,int size); 103static int conn_puts(BIO *h,char *str); 104static long conn_ctrl(BIO *h,int cmd,long arg1,char *arg2); 105static int conn_new(BIO *h); 106static int conn_free(BIO *data); 107static long conn_callback_ctrl(BIO *h,int cmd,void *(*fp)()); 108 109static int conn_state(BIO *b, BIO_CONNECT *c); 110static void conn_close_socket(BIO *data); 111BIO_CONNECT *BIO_CONNECT_new(void ); 112void BIO_CONNECT_free(BIO_CONNECT *a); 113 114static BIO_METHOD methods_connectp= 115 { 116 BIO_TYPE_CONNECT, 117 "socket connect", 118 conn_write, 119 conn_read, 120 conn_puts, 121 NULL, /* connect_gets, */ 122 conn_ctrl, 123 conn_new, 124 conn_free, 125 conn_callback_ctrl, 126 }; 127 128static int conn_state(BIO *b, BIO_CONNECT *c) 129 { 130 int ret= -1,i; 131 unsigned long l; 132 char *p,*q; 133 int (*cb)()=NULL; 134 135 if (c->info_callback != NULL) 136 cb=c->info_callback; 137 138 for (;;) 139 { 140 switch (c->state) 141 { 142 case BIO_CONN_S_BEFORE: 143 p=c->param_hostname; 144 if (p == NULL) 145 { 146 BIOerr(BIO_F_CONN_STATE,BIO_R_NO_HOSTNAME_SPECIFIED); 147 goto exit_loop; 148 } 149 for ( ; *p != '\0'; p++) 150 { 151 if ((*p == ':') || (*p == '/')) break; 152 } 153 154 i= *p; 155 if ((i == ':') || (i == '/')) 156 { 157 158 *(p++)='\0'; 159 if (i == ':') 160 { 161 for (q=p; *q; q++) 162 if (*q == '/') 163 { 164 *q='\0'; 165 break; 166 } 167 if (c->param_port != NULL) 168 Free(c->param_port); 169 c->param_port=BUF_strdup(p); 170 } 171 } 172 173 if (c->param_port == NULL) 174 { 175 BIOerr(BIO_F_CONN_STATE,BIO_R_NO_PORT_SPECIFIED); 176 ERR_add_error_data(2,"host=",c->param_hostname); 177 goto exit_loop; 178 } 179 c->state=BIO_CONN_S_GET_IP; 180 break; 181 182 case BIO_CONN_S_GET_IP: 183 if (BIO_get_host_ip(c->param_hostname,&(c->ip[0])) <= 0) 184 goto exit_loop; 185 c->state=BIO_CONN_S_GET_PORT; 186 break; 187 188 case BIO_CONN_S_GET_PORT: 189 if (c->param_port == NULL) 190 { 191 abort(); 192 goto exit_loop; 193 } 194 else if (BIO_get_port(c->param_port,&c->port) <= 0) 195 goto exit_loop; 196 c->state=BIO_CONN_S_CREATE_SOCKET; 197 break; 198 199 case BIO_CONN_S_CREATE_SOCKET: 200 /* now setup address */ 201 memset((char *)&c->them,0,sizeof(c->them)); 202 c->them.sin_family=AF_INET; 203 c->them.sin_port=htons((unsigned short)c->port); 204 l=(unsigned long) 205 ((unsigned long)c->ip[0]<<24L)| 206 ((unsigned long)c->ip[1]<<16L)| 207 ((unsigned long)c->ip[2]<< 8L)| 208 ((unsigned long)c->ip[3]); 209 c->them.sin_addr.s_addr=htonl(l); 210 c->state=BIO_CONN_S_CREATE_SOCKET; 211 212 ret=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL); 213 if (ret == INVALID_SOCKET) 214 { 215 SYSerr(SYS_F_SOCKET,get_last_socket_error()); 216 ERR_add_error_data(4,"host=",c->param_hostname, 217 ":",c->param_port); 218 BIOerr(BIO_F_CONN_STATE,BIO_R_UNABLE_TO_CREATE_SOCKET); 219 goto exit_loop; 220 } 221 b->num=ret; 222 c->state=BIO_CONN_S_NBIO; 223 break; 224 225 case BIO_CONN_S_NBIO: 226 if (c->nbio) 227 { 228 if (!BIO_socket_nbio(b->num,1)) 229 { 230 BIOerr(BIO_F_CONN_STATE,BIO_R_ERROR_SETTING_NBIO); 231 ERR_add_error_data(4,"host=", 232 c->param_hostname, 233 ":",c->param_port); 234 goto exit_loop; 235 } 236 } 237 c->state=BIO_CONN_S_CONNECT; 238 239#ifdef SO_KEEPALIVE 240 i=1; 241 i=setsockopt(b->num,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,sizeof(i)); 242 if (i < 0) 243 { 244 SYSerr(SYS_F_SOCKET,get_last_socket_error()); 245 ERR_add_error_data(4,"host=",c->param_hostname, 246 ":",c->param_port); 247 BIOerr(BIO_F_CONN_STATE,BIO_R_KEEPALIVE); 248 goto exit_loop; 249 } 250#endif 251 break; 252 253 case BIO_CONN_S_CONNECT: 254 BIO_clear_retry_flags(b); 255 ret=connect(b->num, 256 (struct sockaddr *)&c->them, 257 sizeof(c->them)); 258 b->retry_reason=0; 259 if (ret < 0) 260 { 261 if (BIO_sock_should_retry(ret)) 262 { 263 BIO_set_retry_special(b); 264 c->state=BIO_CONN_S_BLOCKED_CONNECT; 265 b->retry_reason=BIO_RR_CONNECT; 266 } 267 else 268 { 269 SYSerr(SYS_F_CONNECT,get_last_socket_error()); 270 ERR_add_error_data(4,"host=", 271 c->param_hostname, 272 ":",c->param_port); 273 BIOerr(BIO_F_CONN_STATE,BIO_R_CONNECT_ERROR); 274 } 275 goto exit_loop; 276 } 277 else 278 c->state=BIO_CONN_S_OK; 279 break; 280 281 case BIO_CONN_S_BLOCKED_CONNECT: 282 i=BIO_sock_error(b->num); 283 if (i) 284 { 285 BIO_clear_retry_flags(b); 286 SYSerr(SYS_F_CONNECT,i); 287 ERR_add_error_data(4,"host=", 288 c->param_hostname, 289 ":",c->param_port); 290 BIOerr(BIO_F_CONN_STATE,BIO_R_NBIO_CONNECT_ERROR); 291 ret=0; 292 goto exit_loop; 293 } 294 else 295 c->state=BIO_CONN_S_OK; 296 break; 297 298 case BIO_CONN_S_OK: 299 ret=1; 300 goto exit_loop; 301 default: 302 abort(); 303 goto exit_loop; 304 } 305 306 if (cb != NULL) 307 { 308 if (!(ret=cb((BIO *)b,c->state,ret))) 309 goto end; 310 } 311 } 312 313 /* Loop does not exit */ 314exit_loop: 315 if (cb != NULL) 316 ret=cb((BIO *)b,c->state,ret); 317end: 318 return(ret); 319 } 320 321BIO_CONNECT *BIO_CONNECT_new(void) 322 { 323 BIO_CONNECT *ret; 324 325 if ((ret=(BIO_CONNECT *)Malloc(sizeof(BIO_CONNECT))) == NULL) 326 return(NULL); 327 ret->state=BIO_CONN_S_BEFORE; 328 ret->param_hostname=NULL; 329 ret->param_port=NULL; 330 ret->info_callback=NULL; 331 ret->nbio=0; 332 ret->ip[0]=0; 333 ret->ip[1]=0; 334 ret->ip[2]=0; 335 ret->ip[3]=0; 336 ret->port=0; 337 memset((char *)&ret->them,0,sizeof(ret->them)); 338 return(ret); 339 } 340 341void BIO_CONNECT_free(BIO_CONNECT *a) 342 { 343 if(a == NULL) 344 return; 345 346 if (a->param_hostname != NULL) 347 Free(a->param_hostname); 348 if (a->param_port != NULL) 349 Free(a->param_port); 350 Free(a); 351 } 352 353BIO_METHOD *BIO_s_connect(void) 354 { 355 return(&methods_connectp); 356 } 357 358static int conn_new(BIO *bi) 359 { 360 bi->init=0; 361 bi->num=INVALID_SOCKET; 362 bi->flags=0; 363 if ((bi->ptr=(char *)BIO_CONNECT_new()) == NULL) 364 return(0); 365 else 366 return(1); 367 } 368 369static void conn_close_socket(BIO *bio) 370 { 371 BIO_CONNECT *c; 372 373 c=(BIO_CONNECT *)bio->ptr; 374 if (bio->num != INVALID_SOCKET) 375 { 376 /* Only do a shutdown if things were established */ 377 if (c->state == BIO_CONN_S_OK) 378 shutdown(bio->num,2); 379 closesocket(bio->num); 380 bio->num=INVALID_SOCKET; 381 } 382 } 383 384static int conn_free(BIO *a) 385 { 386 BIO_CONNECT *data; 387 388 if (a == NULL) return(0); 389 data=(BIO_CONNECT *)a->ptr; 390 391 if (a->shutdown) 392 { 393 conn_close_socket(a); 394 BIO_CONNECT_free(data); 395 a->ptr=NULL; 396 a->flags=0; 397 a->init=0; 398 } 399 return(1); 400 } 401 402static int conn_read(BIO *b, char *out, int outl) 403 { 404 int ret=0; 405 BIO_CONNECT *data; 406 407 data=(BIO_CONNECT *)b->ptr; 408 if (data->state != BIO_CONN_S_OK) 409 { 410 ret=conn_state(b,data); 411 if (ret <= 0) 412 return(ret); 413 } 414 415 if (out != NULL) 416 { 417 clear_socket_error(); 418 ret=readsocket(b->num,out,outl); 419 BIO_clear_retry_flags(b); 420 if (ret <= 0) 421 { 422 if (BIO_sock_should_retry(ret)) 423 BIO_set_retry_read(b); 424 } 425 } 426 return(ret); 427 } 428 429static int conn_write(BIO *b, char *in, int inl) 430 { 431 int ret; 432 BIO_CONNECT *data; 433 434 data=(BIO_CONNECT *)b->ptr; 435 if (data->state != BIO_CONN_S_OK) 436 { 437 ret=conn_state(b,data); 438 if (ret <= 0) return(ret); 439 } 440 441 clear_socket_error(); 442 ret=writesocket(b->num,in,inl); 443 BIO_clear_retry_flags(b); 444 if (ret <= 0) 445 { 446 if (BIO_sock_should_retry(ret)) 447 BIO_set_retry_write(b); 448 } 449 return(ret); 450 } 451 452static long conn_ctrl(BIO *b, int cmd, long num, char *ptr) 453 { 454 BIO *dbio; 455 int *ip; 456 const char **pptr; 457 long ret=1; 458 BIO_CONNECT *data; 459 460 data=(BIO_CONNECT *)b->ptr; 461 462 switch (cmd) 463 { 464 case BIO_CTRL_RESET: 465 ret=0; 466 data->state=BIO_CONN_S_BEFORE; 467 conn_close_socket(b); 468 b->flags=0; 469 break; 470 case BIO_C_DO_STATE_MACHINE: 471 /* use this one to start the connection */ 472 if (!data->state != BIO_CONN_S_OK) 473 ret=(long)conn_state(b,data); 474 else 475 ret=1; 476 break; 477 case BIO_C_GET_CONNECT: 478 if (ptr != NULL) 479 { 480 pptr=(const char **)ptr; 481 if (num == 0) 482 { 483 *pptr=data->param_hostname; 484 485 } 486 else if (num == 1) 487 { 488 *pptr=data->param_port; 489 } 490 else if (num == 2) 491 { 492 *pptr= (char *)&(data->ip[0]); 493 } 494 else if (num == 3) 495 { 496 *((int *)ptr)=data->port; 497 } 498 if ((!b->init) || (ptr == NULL)) 499 *pptr="not initialized"; 500 ret=1; 501 } 502 break; 503 case BIO_C_SET_CONNECT: 504 if (ptr != NULL) 505 { 506 b->init=1; 507 if (num == 0) 508 { 509 if (data->param_hostname != NULL) 510 Free(data->param_hostname); 511 data->param_hostname=BUF_strdup(ptr); 512 } 513 else if (num == 1) 514 { 515 if (data->param_port != NULL) 516 Free(data->param_port); 517 data->param_port=BUF_strdup(ptr); 518 } 519 else if (num == 2) 520 { 521 char buf[16]; 522 523 sprintf(buf,"%d.%d.%d.%d", 524 ptr[0],ptr[1],ptr[2],ptr[3]); 525 if (data->param_hostname != NULL) 526 Free(data->param_hostname); 527 data->param_hostname=BUF_strdup(buf); 528 memcpy(&(data->ip[0]),ptr,4); 529 } 530 else if (num == 3) 531 { 532 char buf[16]; 533 534 sprintf(buf,"%d",*(int *)ptr); 535 if (data->param_port != NULL) 536 Free(data->param_port); 537 data->param_port=BUF_strdup(buf); 538 data->port= *(int *)ptr; 539 } 540 } 541 break; 542 case BIO_C_SET_NBIO: 543 data->nbio=(int)num; 544 break; 545 case BIO_C_GET_FD: 546 if (b->init) 547 { 548 ip=(int *)ptr; 549 if (ip != NULL) 550 *ip=b->num; 551 ret=b->num; 552 } 553 else 554 ret= -1; 555 break; 556 case BIO_CTRL_GET_CLOSE: 557 ret=b->shutdown; 558 break; 559 case BIO_CTRL_SET_CLOSE: 560 b->shutdown=(int)num; 561 break; 562 case BIO_CTRL_PENDING: 563 case BIO_CTRL_WPENDING: 564 ret=0; 565 break; 566 case BIO_CTRL_FLUSH: 567 break; 568 case BIO_CTRL_DUP: 569 { 570 dbio=(BIO *)ptr; 571 if (data->param_port) 572 BIO_set_conn_port(dbio,data->param_port); 573 if (data->param_hostname) 574 BIO_set_conn_hostname(dbio,data->param_hostname); 575 BIO_set_nbio(dbio,data->nbio); 576 (void)BIO_set_info_callback(dbio,(void *(*)())(data->info_callback)); 577 } 578 break; 579 case BIO_CTRL_SET_CALLBACK: 580 { 581#if 0 /* FIXME: Should this be used? -- Richard Levitte */ 582 BIOerr(BIO_F_CONN_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); 583 ret = -1; 584#else 585 ret=0; 586#endif 587 } 588 break; 589 case BIO_CTRL_GET_CALLBACK: 590 { 591 int (**fptr)(); 592 593 fptr=(int (**)())ptr; 594 *fptr=data->info_callback; 595 } 596 break; 597 default: 598 ret=0; 599 break; 600 } 601 return(ret); 602 } 603 604static long conn_callback_ctrl(BIO *b, int cmd, void *(*fp)()) 605 { 606 long ret=1; 607 BIO_CONNECT *data; 608 609 data=(BIO_CONNECT *)b->ptr; 610 611 switch (cmd) 612 { 613 case BIO_CTRL_SET_CALLBACK: 614 { 615 data->info_callback=(int (*)())fp; 616 } 617 break; 618 default: 619 ret=0; 620 break; 621 } 622 return(ret); 623 } 624 625static int conn_puts(BIO *bp, char *str) 626 { 627 int n,ret; 628 629 n=strlen(str); 630 ret=conn_write(bp,str,n); 631 return(ret); 632 } 633 634BIO *BIO_new_connect(char *str) 635 { 636 BIO *ret; 637 638 ret=BIO_new(BIO_s_connect()); 639 if (ret == NULL) return(NULL); 640 if (BIO_set_conn_hostname(ret,str)) 641 return(ret); 642 else 643 { 644 BIO_free(ret); 645 return(NULL); 646 } 647 } 648 649#endif 650 651