1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
2  * All rights reserved.
3  *
4  * This package is an SSL implementation written
5  * by Eric Young (eay@cryptsoft.com).
6  * The implementation was written so as to conform with Netscapes SSL.
7  *
8  * This library is free for commercial and non-commercial use as long as
9  * the following conditions are aheared to.  The following conditions
10  * apply to all code found in this distribution, be it the RC4, RSA,
11  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
12  * included with this distribution is covered by the same copyright terms
13  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
14  *
15  * Copyright remains Eric Young's, and as such any Copyright notices in
16  * the code are not to be removed.
17  * If this package is used in a product, Eric Young should be given attribution
18  * as the author of the parts of the library used.
19  * This can be in the form of a textual message at program startup or
20  * in documentation (online or textual) provided with the package.
21  *
22  * Redistribution and use in source and binary forms, with or without
23  * modification, are permitted provided that the following conditions
24  * are met:
25  * 1. Redistributions of source code must retain the copyright
26  *    notice, this list of conditions and the following disclaimer.
27  * 2. Redistributions in binary form must reproduce the above copyright
28  *    notice, this list of conditions and the following disclaimer in the
29  *    documentation and/or other materials provided with the distribution.
30  * 3. All advertising materials mentioning features or use of this software
31  *    must display the following acknowledgement:
32  *    "This product includes cryptographic software written by
33  *     Eric Young (eay@cryptsoft.com)"
34  *    The word 'cryptographic' can be left out if the rouines from the library
35  *    being used are not cryptographic related :-).
36  * 4. If you include any Windows specific code (or a derivative thereof) from
37  *    the apps directory (application code) you must include an acknowledgement:
38  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
39  *
40  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
41  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
43  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
44  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
45  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
46  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
49  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
50  * SUCH DAMAGE.
51  *
52  * The licence and distribution terms for any publically available version or
53  * derivative of this code cannot be changed.  i.e. this code cannot simply be
54  * copied and put under another distribution licence
55  * [including the GNU Public Licence.] */
56 
57 #include <openssl/bio.h>
58 
59 #if !defined(OPENSSL_TRUSTY)
60 
61 #include <assert.h>
62 #include <errno.h>
63 #include <string.h>
64 
65 #if !defined(OPENSSL_WINDOWS)
66 #include <sys/socket.h>
67 #include <netinet/in.h>
68 #include <arpa/inet.h>
69 #include <unistd.h>
70 #else
71 OPENSSL_MSVC_PRAGMA(warning(push, 3))
72 #include <winsock2.h>
73 #include <ws2tcpip.h>
74 OPENSSL_MSVC_PRAGMA(warning(pop))
75 #endif
76 
77 #include <openssl/err.h>
78 #include <openssl/mem.h>
79 
80 #include "internal.h"
81 #include "../internal.h"
82 
83 
84 enum {
85   BIO_CONN_S_BEFORE,
86   BIO_CONN_S_BLOCKED_CONNECT,
87   BIO_CONN_S_OK,
88 };
89 
90 typedef struct bio_connect_st {
91   int state;
92 
93   char *param_hostname;
94   char *param_port;
95   int nbio;
96 
97   unsigned short port;
98 
99   struct sockaddr_storage them;
100   socklen_t them_length;
101 
102   // the file descriptor is kept in bio->num in order to match the socket
103   // BIO.
104 
105   // info_callback is called when the connection is initially made
106   // callback(BIO,state,ret);  The callback should return 'ret', state is for
107   // compatibility with the SSL info_callback.
108   int (*info_callback)(const BIO *bio, int state, int ret);
109 } BIO_CONNECT;
110 
111 #if !defined(OPENSSL_WINDOWS)
closesocket(int sock)112 static int closesocket(int sock) {
113   return close(sock);
114 }
115 #endif
116 
117 // split_host_and_port sets |*out_host| and |*out_port| to the host and port
118 // parsed from |name|. It returns one on success or zero on error. Even when
119 // successful, |*out_port| may be NULL on return if no port was specified.
split_host_and_port(char ** out_host,char ** out_port,const char * name)120 static int split_host_and_port(char **out_host, char **out_port, const char *name) {
121   const char *host, *port = NULL;
122   size_t host_len = 0;
123 
124   *out_host = NULL;
125   *out_port = NULL;
126 
127   if (name[0] == '[') {  // bracketed IPv6 address
128     const char *close = strchr(name, ']');
129     if (close == NULL) {
130       return 0;
131     }
132     host = name + 1;
133     host_len = close - host;
134     if (close[1] == ':') {  // [IP]:port
135       port = close + 2;
136     } else if (close[1] != 0) {
137       return 0;
138     }
139   } else {
140     const char *colon = strchr(name, ':');
141     if (colon == NULL || strchr(colon + 1, ':') != NULL) {  // IPv6 address
142       host = name;
143       host_len = strlen(name);
144     } else {  // host:port
145       host = name;
146       host_len = colon - name;
147       port = colon + 1;
148     }
149   }
150 
151   *out_host = OPENSSL_strndup(host, host_len);
152   if (*out_host == NULL) {
153     return 0;
154   }
155   if (port == NULL) {
156     *out_port = NULL;
157     return 1;
158   }
159   *out_port = OPENSSL_strdup(port);
160   if (*out_port == NULL) {
161     OPENSSL_free(*out_host);
162     *out_host = NULL;
163     return 0;
164   }
165   return 1;
166 }
167 
conn_state(BIO * bio,BIO_CONNECT * c)168 static int conn_state(BIO *bio, BIO_CONNECT *c) {
169   int ret = -1, i;
170   int (*cb)(const BIO *, int, int) = NULL;
171 
172   if (c->info_callback != NULL) {
173     cb = c->info_callback;
174   }
175 
176   for (;;) {
177     switch (c->state) {
178       case BIO_CONN_S_BEFORE:
179         // If there's a hostname and a port, assume that both are
180         // exactly what they say. If there is only a hostname, try
181         // (just once) to split it into a hostname and port.
182 
183         if (c->param_hostname == NULL) {
184           OPENSSL_PUT_ERROR(BIO, BIO_R_NO_HOSTNAME_SPECIFIED);
185           goto exit_loop;
186         }
187 
188         if (c->param_port == NULL) {
189           char *host, *port;
190           if (!split_host_and_port(&host, &port, c->param_hostname) ||
191               port == NULL) {
192             OPENSSL_free(host);
193             OPENSSL_free(port);
194             OPENSSL_PUT_ERROR(BIO, BIO_R_NO_PORT_SPECIFIED);
195             ERR_add_error_data(2, "host=", c->param_hostname);
196             goto exit_loop;
197           }
198 
199           OPENSSL_free(c->param_port);
200           c->param_port = port;
201           OPENSSL_free(c->param_hostname);
202           c->param_hostname = host;
203         }
204 
205         if (!bio_ip_and_port_to_socket_and_addr(
206                 &bio->num, &c->them, &c->them_length, c->param_hostname,
207                 c->param_port)) {
208           OPENSSL_PUT_ERROR(BIO, BIO_R_UNABLE_TO_CREATE_SOCKET);
209           ERR_add_error_data(4, "host=", c->param_hostname, ":", c->param_port);
210           goto exit_loop;
211         }
212 
213         if (c->nbio) {
214           if (!bio_socket_nbio(bio->num, 1)) {
215             OPENSSL_PUT_ERROR(BIO, BIO_R_ERROR_SETTING_NBIO);
216             ERR_add_error_data(4, "host=", c->param_hostname, ":",
217                                c->param_port);
218             goto exit_loop;
219           }
220         }
221 
222         i = 1;
223         ret = setsockopt(bio->num, SOL_SOCKET, SO_KEEPALIVE, (char *)&i,
224                          sizeof(i));
225         if (ret < 0) {
226           OPENSSL_PUT_SYSTEM_ERROR();
227           OPENSSL_PUT_ERROR(BIO, BIO_R_KEEPALIVE);
228           ERR_add_error_data(4, "host=", c->param_hostname, ":", c->param_port);
229           goto exit_loop;
230         }
231 
232         BIO_clear_retry_flags(bio);
233         ret = connect(bio->num, (struct sockaddr*) &c->them, c->them_length);
234         if (ret < 0) {
235           if (bio_fd_should_retry(ret)) {
236             BIO_set_flags(bio, (BIO_FLAGS_IO_SPECIAL | BIO_FLAGS_SHOULD_RETRY));
237             c->state = BIO_CONN_S_BLOCKED_CONNECT;
238             bio->retry_reason = BIO_RR_CONNECT;
239           } else {
240             OPENSSL_PUT_SYSTEM_ERROR();
241             OPENSSL_PUT_ERROR(BIO, BIO_R_CONNECT_ERROR);
242             ERR_add_error_data(4, "host=", c->param_hostname, ":",
243                                c->param_port);
244           }
245           goto exit_loop;
246         } else {
247           c->state = BIO_CONN_S_OK;
248         }
249         break;
250 
251       case BIO_CONN_S_BLOCKED_CONNECT:
252         i = bio_sock_error(bio->num);
253         if (i) {
254           if (bio_fd_should_retry(ret)) {
255             BIO_set_flags(bio, (BIO_FLAGS_IO_SPECIAL | BIO_FLAGS_SHOULD_RETRY));
256             c->state = BIO_CONN_S_BLOCKED_CONNECT;
257             bio->retry_reason = BIO_RR_CONNECT;
258             ret = -1;
259           } else {
260             BIO_clear_retry_flags(bio);
261             OPENSSL_PUT_SYSTEM_ERROR();
262             OPENSSL_PUT_ERROR(BIO, BIO_R_NBIO_CONNECT_ERROR);
263             ERR_add_error_data(4, "host=", c->param_hostname, ":", c->param_port);
264             ret = 0;
265           }
266           goto exit_loop;
267         } else {
268           c->state = BIO_CONN_S_OK;
269         }
270         break;
271 
272       case BIO_CONN_S_OK:
273         ret = 1;
274         goto exit_loop;
275       default:
276         assert(0);
277         goto exit_loop;
278     }
279 
280     if (cb != NULL) {
281       ret = cb((BIO *)bio, c->state, ret);
282       if (ret == 0) {
283         goto end;
284       }
285     }
286   }
287 
288 exit_loop:
289   if (cb != NULL) {
290     ret = cb((BIO *)bio, c->state, ret);
291   }
292 
293 end:
294   return ret;
295 }
296 
BIO_CONNECT_new(void)297 static BIO_CONNECT *BIO_CONNECT_new(void) {
298   BIO_CONNECT *ret = OPENSSL_malloc(sizeof(BIO_CONNECT));
299 
300   if (ret == NULL) {
301     return NULL;
302   }
303   OPENSSL_memset(ret, 0, sizeof(BIO_CONNECT));
304 
305   ret->state = BIO_CONN_S_BEFORE;
306   return ret;
307 }
308 
BIO_CONNECT_free(BIO_CONNECT * c)309 static void BIO_CONNECT_free(BIO_CONNECT *c) {
310   if (c == NULL) {
311     return;
312   }
313 
314   OPENSSL_free(c->param_hostname);
315   OPENSSL_free(c->param_port);
316   OPENSSL_free(c);
317 }
318 
conn_new(BIO * bio)319 static int conn_new(BIO *bio) {
320   bio->init = 0;
321   bio->num = -1;
322   bio->flags = 0;
323   bio->ptr = (char *)BIO_CONNECT_new();
324   return bio->ptr != NULL;
325 }
326 
conn_close_socket(BIO * bio)327 static void conn_close_socket(BIO *bio) {
328   BIO_CONNECT *c = (BIO_CONNECT *) bio->ptr;
329 
330   if (bio->num == -1) {
331     return;
332   }
333 
334   // Only do a shutdown if things were established
335   if (c->state == BIO_CONN_S_OK) {
336     shutdown(bio->num, 2);
337   }
338   closesocket(bio->num);
339   bio->num = -1;
340 }
341 
conn_free(BIO * bio)342 static int conn_free(BIO *bio) {
343   if (bio == NULL) {
344     return 0;
345   }
346 
347   if (bio->shutdown) {
348     conn_close_socket(bio);
349   }
350 
351   BIO_CONNECT_free((BIO_CONNECT*) bio->ptr);
352 
353   return 1;
354 }
355 
conn_read(BIO * bio,char * out,int out_len)356 static int conn_read(BIO *bio, char *out, int out_len) {
357   int ret = 0;
358   BIO_CONNECT *data;
359 
360   data = (BIO_CONNECT *)bio->ptr;
361   if (data->state != BIO_CONN_S_OK) {
362     ret = conn_state(bio, data);
363     if (ret <= 0) {
364       return ret;
365     }
366   }
367 
368   bio_clear_socket_error();
369   ret = recv(bio->num, out, out_len, 0);
370   BIO_clear_retry_flags(bio);
371   if (ret <= 0) {
372     if (bio_fd_should_retry(ret)) {
373       BIO_set_retry_read(bio);
374     }
375   }
376 
377   return ret;
378 }
379 
conn_write(BIO * bio,const char * in,int in_len)380 static int conn_write(BIO *bio, const char *in, int in_len) {
381   int ret;
382   BIO_CONNECT *data;
383 
384   data = (BIO_CONNECT *)bio->ptr;
385   if (data->state != BIO_CONN_S_OK) {
386     ret = conn_state(bio, data);
387     if (ret <= 0) {
388       return ret;
389     }
390   }
391 
392   bio_clear_socket_error();
393   ret = send(bio->num, in, in_len, 0);
394   BIO_clear_retry_flags(bio);
395   if (ret <= 0) {
396     if (bio_fd_should_retry(ret)) {
397       BIO_set_retry_write(bio);
398     }
399   }
400 
401   return ret;
402 }
403 
conn_ctrl(BIO * bio,int cmd,long num,void * ptr)404 static long conn_ctrl(BIO *bio, int cmd, long num, void *ptr) {
405   int *ip;
406   long ret = 1;
407   BIO_CONNECT *data;
408 
409   data = (BIO_CONNECT *)bio->ptr;
410 
411   switch (cmd) {
412     case BIO_CTRL_RESET:
413       ret = 0;
414       data->state = BIO_CONN_S_BEFORE;
415       conn_close_socket(bio);
416       bio->flags = 0;
417       break;
418     case BIO_C_DO_STATE_MACHINE:
419       // use this one to start the connection
420       if (data->state != BIO_CONN_S_OK) {
421         ret = (long)conn_state(bio, data);
422       } else {
423         ret = 1;
424       }
425       break;
426     case BIO_C_SET_CONNECT:
427       if (ptr != NULL) {
428         bio->init = 1;
429         if (num == 0) {
430           OPENSSL_free(data->param_hostname);
431           data->param_hostname = OPENSSL_strdup(ptr);
432           if (data->param_hostname == NULL) {
433             ret = 0;
434           }
435         } else if (num == 1) {
436           OPENSSL_free(data->param_port);
437           data->param_port = OPENSSL_strdup(ptr);
438           if (data->param_port == NULL) {
439             ret = 0;
440           }
441         } else {
442           ret = 0;
443         }
444       }
445       break;
446     case BIO_C_SET_NBIO:
447       data->nbio = (int)num;
448       break;
449     case BIO_C_GET_FD:
450       if (bio->init) {
451         ip = (int *)ptr;
452         if (ip != NULL) {
453           *ip = bio->num;
454         }
455         ret = bio->num;
456       } else {
457         ret = -1;
458       }
459       break;
460     case BIO_CTRL_GET_CLOSE:
461       ret = bio->shutdown;
462       break;
463     case BIO_CTRL_SET_CLOSE:
464       bio->shutdown = (int)num;
465       break;
466     case BIO_CTRL_PENDING:
467     case BIO_CTRL_WPENDING:
468       ret = 0;
469       break;
470     case BIO_CTRL_FLUSH:
471       break;
472     case BIO_CTRL_GET_CALLBACK: {
473       int (**fptr)(const BIO *bio, int state, int xret);
474       fptr = (int (**)(const BIO *bio, int state, int xret))ptr;
475       *fptr = data->info_callback;
476     } break;
477     default:
478       ret = 0;
479       break;
480   }
481   return ret;
482 }
483 
conn_callback_ctrl(BIO * bio,int cmd,bio_info_cb fp)484 static long conn_callback_ctrl(BIO *bio, int cmd, bio_info_cb fp) {
485   long ret = 1;
486   BIO_CONNECT *data;
487 
488   data = (BIO_CONNECT *)bio->ptr;
489 
490   switch (cmd) {
491     case BIO_CTRL_SET_CALLBACK:
492       data->info_callback = (int (*)(const struct bio_st *, int, int))fp;
493       break;
494     default:
495       ret = 0;
496       break;
497   }
498   return ret;
499 }
500 
BIO_new_connect(const char * hostname)501 BIO *BIO_new_connect(const char *hostname) {
502   BIO *ret;
503 
504   ret = BIO_new(BIO_s_connect());
505   if (ret == NULL) {
506     return NULL;
507   }
508   if (!BIO_set_conn_hostname(ret, hostname)) {
509     BIO_free(ret);
510     return NULL;
511   }
512   return ret;
513 }
514 
515 static const BIO_METHOD methods_connectp = {
516     BIO_TYPE_CONNECT, "socket connect",   conn_write, conn_read,
517     NULL /* puts */,  NULL /* gets */,    conn_ctrl,  conn_new,
518     conn_free,        conn_callback_ctrl,
519 };
520 
BIO_s_connect(void)521 const BIO_METHOD *BIO_s_connect(void) { return &methods_connectp; }
522 
BIO_set_conn_hostname(BIO * bio,const char * name)523 int BIO_set_conn_hostname(BIO *bio, const char *name) {
524   return BIO_ctrl(bio, BIO_C_SET_CONNECT, 0, (void*) name);
525 }
526 
BIO_set_conn_port(BIO * bio,const char * port_str)527 int BIO_set_conn_port(BIO *bio, const char *port_str) {
528   return BIO_ctrl(bio, BIO_C_SET_CONNECT, 1, (void*) port_str);
529 }
530 
BIO_set_conn_int_port(BIO * bio,const int * port)531 int BIO_set_conn_int_port(BIO *bio, const int *port) {
532   char buf[DECIMAL_SIZE(int) + 1];
533   BIO_snprintf(buf, sizeof(buf), "%d", *port);
534   return BIO_set_conn_port(bio, buf);
535 }
536 
BIO_set_nbio(BIO * bio,int on)537 int BIO_set_nbio(BIO *bio, int on) {
538   return BIO_ctrl(bio, BIO_C_SET_NBIO, on, NULL);
539 }
540 
BIO_do_connect(BIO * bio)541 int BIO_do_connect(BIO *bio) {
542   return BIO_ctrl(bio, BIO_C_DO_STATE_MACHINE, 0, NULL);
543 }
544 
545 #endif  // OPENSSL_TRUSTY
546