1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
2 * All rights reserved.
3 *
4 * This package is an SSL implementation written
5 * by Eric Young (eay@cryptsoft.com).
6 * The implementation was written so as to conform with Netscapes SSL.
7 *
8 * This library is free for commercial and non-commercial use as long as
9 * the following conditions are aheared to. The following conditions
10 * apply to all code found in this distribution, be it the RC4, RSA,
11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
12 * included with this distribution is covered by the same copyright terms
13 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
14 *
15 * Copyright remains Eric Young's, and as such any Copyright notices in
16 * the code are not to be removed.
17 * If this package is used in a product, Eric Young should be given attribution
18 * as the author of the parts of the library used.
19 * This can be in the form of a textual message at program startup or
20 * in documentation (online or textual) provided with the package.
21 *
22 * Redistribution and use in source and binary forms, with or without
23 * modification, are permitted provided that the following conditions
24 * are met:
25 * 1. Redistributions of source code must retain the copyright
26 * notice, this list of conditions and the following disclaimer.
27 * 2. Redistributions in binary form must reproduce the above copyright
28 * notice, this list of conditions and the following disclaimer in the
29 * documentation and/or other materials provided with the distribution.
30 * 3. All advertising materials mentioning features or use of this software
31 * must display the following acknowledgement:
32 * "This product includes cryptographic software written by
33 * Eric Young (eay@cryptsoft.com)"
34 * The word 'cryptographic' can be left out if the rouines from the library
35 * being used are not cryptographic related :-).
36 * 4. If you include any Windows specific code (or a derivative thereof) from
37 * the apps directory (application code) you must include an acknowledgement:
38 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
39 *
40 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
41 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
44 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
45 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
46 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
49 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
50 * SUCH DAMAGE.
51 *
52 * The licence and distribution terms for any publically available version or
53 * derivative of this code cannot be changed. i.e. this code cannot simply be
54 * copied and put under another distribution licence
55 * [including the GNU Public Licence.] */
56
57 #include <openssl/bio.h>
58
59 #if !defined(OPENSSL_TRUSTY)
60
61 #include <assert.h>
62 #include <errno.h>
63 #include <string.h>
64
65 #if !defined(OPENSSL_WINDOWS)
66 #include <sys/socket.h>
67 #include <netinet/in.h>
68 #include <arpa/inet.h>
69 #include <unistd.h>
70 #else
71 OPENSSL_MSVC_PRAGMA(warning(push, 3))
72 #include <winsock2.h>
73 #include <ws2tcpip.h>
74 OPENSSL_MSVC_PRAGMA(warning(pop))
75 #endif
76
77 #include <openssl/err.h>
78 #include <openssl/mem.h>
79
80 #include "internal.h"
81 #include "../internal.h"
82
83
84 enum {
85 BIO_CONN_S_BEFORE,
86 BIO_CONN_S_BLOCKED_CONNECT,
87 BIO_CONN_S_OK,
88 };
89
90 typedef struct bio_connect_st {
91 int state;
92
93 char *param_hostname;
94 char *param_port;
95 int nbio;
96
97 unsigned short port;
98
99 struct sockaddr_storage them;
100 socklen_t them_length;
101
102 // the file descriptor is kept in bio->num in order to match the socket
103 // BIO.
104
105 // info_callback is called when the connection is initially made
106 // callback(BIO,state,ret); The callback should return 'ret', state is for
107 // compatibility with the SSL info_callback.
108 int (*info_callback)(const BIO *bio, int state, int ret);
109 } BIO_CONNECT;
110
111 #if !defined(OPENSSL_WINDOWS)
closesocket(int sock)112 static int closesocket(int sock) {
113 return close(sock);
114 }
115 #endif
116
117 // split_host_and_port sets |*out_host| and |*out_port| to the host and port
118 // parsed from |name|. It returns one on success or zero on error. Even when
119 // successful, |*out_port| may be NULL on return if no port was specified.
split_host_and_port(char ** out_host,char ** out_port,const char * name)120 static int split_host_and_port(char **out_host, char **out_port, const char *name) {
121 const char *host, *port = NULL;
122 size_t host_len = 0;
123
124 *out_host = NULL;
125 *out_port = NULL;
126
127 if (name[0] == '[') { // bracketed IPv6 address
128 const char *close = strchr(name, ']');
129 if (close == NULL) {
130 return 0;
131 }
132 host = name + 1;
133 host_len = close - host;
134 if (close[1] == ':') { // [IP]:port
135 port = close + 2;
136 } else if (close[1] != 0) {
137 return 0;
138 }
139 } else {
140 const char *colon = strchr(name, ':');
141 if (colon == NULL || strchr(colon + 1, ':') != NULL) { // IPv6 address
142 host = name;
143 host_len = strlen(name);
144 } else { // host:port
145 host = name;
146 host_len = colon - name;
147 port = colon + 1;
148 }
149 }
150
151 *out_host = OPENSSL_strndup(host, host_len);
152 if (*out_host == NULL) {
153 return 0;
154 }
155 if (port == NULL) {
156 *out_port = NULL;
157 return 1;
158 }
159 *out_port = OPENSSL_strdup(port);
160 if (*out_port == NULL) {
161 OPENSSL_free(*out_host);
162 *out_host = NULL;
163 return 0;
164 }
165 return 1;
166 }
167
conn_state(BIO * bio,BIO_CONNECT * c)168 static int conn_state(BIO *bio, BIO_CONNECT *c) {
169 int ret = -1, i;
170 int (*cb)(const BIO *, int, int) = NULL;
171
172 if (c->info_callback != NULL) {
173 cb = c->info_callback;
174 }
175
176 for (;;) {
177 switch (c->state) {
178 case BIO_CONN_S_BEFORE:
179 // If there's a hostname and a port, assume that both are
180 // exactly what they say. If there is only a hostname, try
181 // (just once) to split it into a hostname and port.
182
183 if (c->param_hostname == NULL) {
184 OPENSSL_PUT_ERROR(BIO, BIO_R_NO_HOSTNAME_SPECIFIED);
185 goto exit_loop;
186 }
187
188 if (c->param_port == NULL) {
189 char *host, *port;
190 if (!split_host_and_port(&host, &port, c->param_hostname) ||
191 port == NULL) {
192 OPENSSL_free(host);
193 OPENSSL_free(port);
194 OPENSSL_PUT_ERROR(BIO, BIO_R_NO_PORT_SPECIFIED);
195 ERR_add_error_data(2, "host=", c->param_hostname);
196 goto exit_loop;
197 }
198
199 OPENSSL_free(c->param_port);
200 c->param_port = port;
201 OPENSSL_free(c->param_hostname);
202 c->param_hostname = host;
203 }
204
205 if (!bio_ip_and_port_to_socket_and_addr(
206 &bio->num, &c->them, &c->them_length, c->param_hostname,
207 c->param_port)) {
208 OPENSSL_PUT_ERROR(BIO, BIO_R_UNABLE_TO_CREATE_SOCKET);
209 ERR_add_error_data(4, "host=", c->param_hostname, ":", c->param_port);
210 goto exit_loop;
211 }
212
213 if (c->nbio) {
214 if (!bio_socket_nbio(bio->num, 1)) {
215 OPENSSL_PUT_ERROR(BIO, BIO_R_ERROR_SETTING_NBIO);
216 ERR_add_error_data(4, "host=", c->param_hostname, ":",
217 c->param_port);
218 goto exit_loop;
219 }
220 }
221
222 i = 1;
223 ret = setsockopt(bio->num, SOL_SOCKET, SO_KEEPALIVE, (char *)&i,
224 sizeof(i));
225 if (ret < 0) {
226 OPENSSL_PUT_SYSTEM_ERROR();
227 OPENSSL_PUT_ERROR(BIO, BIO_R_KEEPALIVE);
228 ERR_add_error_data(4, "host=", c->param_hostname, ":", c->param_port);
229 goto exit_loop;
230 }
231
232 BIO_clear_retry_flags(bio);
233 ret = connect(bio->num, (struct sockaddr*) &c->them, c->them_length);
234 if (ret < 0) {
235 if (bio_fd_should_retry(ret)) {
236 BIO_set_flags(bio, (BIO_FLAGS_IO_SPECIAL | BIO_FLAGS_SHOULD_RETRY));
237 c->state = BIO_CONN_S_BLOCKED_CONNECT;
238 bio->retry_reason = BIO_RR_CONNECT;
239 } else {
240 OPENSSL_PUT_SYSTEM_ERROR();
241 OPENSSL_PUT_ERROR(BIO, BIO_R_CONNECT_ERROR);
242 ERR_add_error_data(4, "host=", c->param_hostname, ":",
243 c->param_port);
244 }
245 goto exit_loop;
246 } else {
247 c->state = BIO_CONN_S_OK;
248 }
249 break;
250
251 case BIO_CONN_S_BLOCKED_CONNECT:
252 i = bio_sock_error(bio->num);
253 if (i) {
254 if (bio_fd_should_retry(ret)) {
255 BIO_set_flags(bio, (BIO_FLAGS_IO_SPECIAL | BIO_FLAGS_SHOULD_RETRY));
256 c->state = BIO_CONN_S_BLOCKED_CONNECT;
257 bio->retry_reason = BIO_RR_CONNECT;
258 ret = -1;
259 } else {
260 BIO_clear_retry_flags(bio);
261 OPENSSL_PUT_SYSTEM_ERROR();
262 OPENSSL_PUT_ERROR(BIO, BIO_R_NBIO_CONNECT_ERROR);
263 ERR_add_error_data(4, "host=", c->param_hostname, ":", c->param_port);
264 ret = 0;
265 }
266 goto exit_loop;
267 } else {
268 c->state = BIO_CONN_S_OK;
269 }
270 break;
271
272 case BIO_CONN_S_OK:
273 ret = 1;
274 goto exit_loop;
275 default:
276 assert(0);
277 goto exit_loop;
278 }
279
280 if (cb != NULL) {
281 ret = cb((BIO *)bio, c->state, ret);
282 if (ret == 0) {
283 goto end;
284 }
285 }
286 }
287
288 exit_loop:
289 if (cb != NULL) {
290 ret = cb((BIO *)bio, c->state, ret);
291 }
292
293 end:
294 return ret;
295 }
296
BIO_CONNECT_new(void)297 static BIO_CONNECT *BIO_CONNECT_new(void) {
298 BIO_CONNECT *ret = OPENSSL_malloc(sizeof(BIO_CONNECT));
299
300 if (ret == NULL) {
301 return NULL;
302 }
303 OPENSSL_memset(ret, 0, sizeof(BIO_CONNECT));
304
305 ret->state = BIO_CONN_S_BEFORE;
306 return ret;
307 }
308
BIO_CONNECT_free(BIO_CONNECT * c)309 static void BIO_CONNECT_free(BIO_CONNECT *c) {
310 if (c == NULL) {
311 return;
312 }
313
314 OPENSSL_free(c->param_hostname);
315 OPENSSL_free(c->param_port);
316 OPENSSL_free(c);
317 }
318
conn_new(BIO * bio)319 static int conn_new(BIO *bio) {
320 bio->init = 0;
321 bio->num = -1;
322 bio->flags = 0;
323 bio->ptr = (char *)BIO_CONNECT_new();
324 return bio->ptr != NULL;
325 }
326
conn_close_socket(BIO * bio)327 static void conn_close_socket(BIO *bio) {
328 BIO_CONNECT *c = (BIO_CONNECT *) bio->ptr;
329
330 if (bio->num == -1) {
331 return;
332 }
333
334 // Only do a shutdown if things were established
335 if (c->state == BIO_CONN_S_OK) {
336 shutdown(bio->num, 2);
337 }
338 closesocket(bio->num);
339 bio->num = -1;
340 }
341
conn_free(BIO * bio)342 static int conn_free(BIO *bio) {
343 if (bio == NULL) {
344 return 0;
345 }
346
347 if (bio->shutdown) {
348 conn_close_socket(bio);
349 }
350
351 BIO_CONNECT_free((BIO_CONNECT*) bio->ptr);
352
353 return 1;
354 }
355
conn_read(BIO * bio,char * out,int out_len)356 static int conn_read(BIO *bio, char *out, int out_len) {
357 int ret = 0;
358 BIO_CONNECT *data;
359
360 data = (BIO_CONNECT *)bio->ptr;
361 if (data->state != BIO_CONN_S_OK) {
362 ret = conn_state(bio, data);
363 if (ret <= 0) {
364 return ret;
365 }
366 }
367
368 bio_clear_socket_error();
369 ret = recv(bio->num, out, out_len, 0);
370 BIO_clear_retry_flags(bio);
371 if (ret <= 0) {
372 if (bio_fd_should_retry(ret)) {
373 BIO_set_retry_read(bio);
374 }
375 }
376
377 return ret;
378 }
379
conn_write(BIO * bio,const char * in,int in_len)380 static int conn_write(BIO *bio, const char *in, int in_len) {
381 int ret;
382 BIO_CONNECT *data;
383
384 data = (BIO_CONNECT *)bio->ptr;
385 if (data->state != BIO_CONN_S_OK) {
386 ret = conn_state(bio, data);
387 if (ret <= 0) {
388 return ret;
389 }
390 }
391
392 bio_clear_socket_error();
393 ret = send(bio->num, in, in_len, 0);
394 BIO_clear_retry_flags(bio);
395 if (ret <= 0) {
396 if (bio_fd_should_retry(ret)) {
397 BIO_set_retry_write(bio);
398 }
399 }
400
401 return ret;
402 }
403
conn_ctrl(BIO * bio,int cmd,long num,void * ptr)404 static long conn_ctrl(BIO *bio, int cmd, long num, void *ptr) {
405 int *ip;
406 long ret = 1;
407 BIO_CONNECT *data;
408
409 data = (BIO_CONNECT *)bio->ptr;
410
411 switch (cmd) {
412 case BIO_CTRL_RESET:
413 ret = 0;
414 data->state = BIO_CONN_S_BEFORE;
415 conn_close_socket(bio);
416 bio->flags = 0;
417 break;
418 case BIO_C_DO_STATE_MACHINE:
419 // use this one to start the connection
420 if (data->state != BIO_CONN_S_OK) {
421 ret = (long)conn_state(bio, data);
422 } else {
423 ret = 1;
424 }
425 break;
426 case BIO_C_SET_CONNECT:
427 if (ptr != NULL) {
428 bio->init = 1;
429 if (num == 0) {
430 OPENSSL_free(data->param_hostname);
431 data->param_hostname = OPENSSL_strdup(ptr);
432 if (data->param_hostname == NULL) {
433 ret = 0;
434 }
435 } else if (num == 1) {
436 OPENSSL_free(data->param_port);
437 data->param_port = OPENSSL_strdup(ptr);
438 if (data->param_port == NULL) {
439 ret = 0;
440 }
441 } else {
442 ret = 0;
443 }
444 }
445 break;
446 case BIO_C_SET_NBIO:
447 data->nbio = (int)num;
448 break;
449 case BIO_C_GET_FD:
450 if (bio->init) {
451 ip = (int *)ptr;
452 if (ip != NULL) {
453 *ip = bio->num;
454 }
455 ret = bio->num;
456 } else {
457 ret = -1;
458 }
459 break;
460 case BIO_CTRL_GET_CLOSE:
461 ret = bio->shutdown;
462 break;
463 case BIO_CTRL_SET_CLOSE:
464 bio->shutdown = (int)num;
465 break;
466 case BIO_CTRL_PENDING:
467 case BIO_CTRL_WPENDING:
468 ret = 0;
469 break;
470 case BIO_CTRL_FLUSH:
471 break;
472 case BIO_CTRL_GET_CALLBACK: {
473 int (**fptr)(const BIO *bio, int state, int xret);
474 fptr = (int (**)(const BIO *bio, int state, int xret))ptr;
475 *fptr = data->info_callback;
476 } break;
477 default:
478 ret = 0;
479 break;
480 }
481 return ret;
482 }
483
conn_callback_ctrl(BIO * bio,int cmd,bio_info_cb fp)484 static long conn_callback_ctrl(BIO *bio, int cmd, bio_info_cb fp) {
485 long ret = 1;
486 BIO_CONNECT *data;
487
488 data = (BIO_CONNECT *)bio->ptr;
489
490 switch (cmd) {
491 case BIO_CTRL_SET_CALLBACK:
492 data->info_callback = (int (*)(const struct bio_st *, int, int))fp;
493 break;
494 default:
495 ret = 0;
496 break;
497 }
498 return ret;
499 }
500
BIO_new_connect(const char * hostname)501 BIO *BIO_new_connect(const char *hostname) {
502 BIO *ret;
503
504 ret = BIO_new(BIO_s_connect());
505 if (ret == NULL) {
506 return NULL;
507 }
508 if (!BIO_set_conn_hostname(ret, hostname)) {
509 BIO_free(ret);
510 return NULL;
511 }
512 return ret;
513 }
514
515 static const BIO_METHOD methods_connectp = {
516 BIO_TYPE_CONNECT, "socket connect", conn_write, conn_read,
517 NULL /* puts */, NULL /* gets */, conn_ctrl, conn_new,
518 conn_free, conn_callback_ctrl,
519 };
520
BIO_s_connect(void)521 const BIO_METHOD *BIO_s_connect(void) { return &methods_connectp; }
522
BIO_set_conn_hostname(BIO * bio,const char * name)523 int BIO_set_conn_hostname(BIO *bio, const char *name) {
524 return BIO_ctrl(bio, BIO_C_SET_CONNECT, 0, (void*) name);
525 }
526
BIO_set_conn_port(BIO * bio,const char * port_str)527 int BIO_set_conn_port(BIO *bio, const char *port_str) {
528 return BIO_ctrl(bio, BIO_C_SET_CONNECT, 1, (void*) port_str);
529 }
530
BIO_set_conn_int_port(BIO * bio,const int * port)531 int BIO_set_conn_int_port(BIO *bio, const int *port) {
532 char buf[DECIMAL_SIZE(int) + 1];
533 BIO_snprintf(buf, sizeof(buf), "%d", *port);
534 return BIO_set_conn_port(bio, buf);
535 }
536
BIO_set_nbio(BIO * bio,int on)537 int BIO_set_nbio(BIO *bio, int on) {
538 return BIO_ctrl(bio, BIO_C_SET_NBIO, on, NULL);
539 }
540
BIO_do_connect(BIO * bio)541 int BIO_do_connect(BIO *bio) {
542 return BIO_ctrl(bio, BIO_C_DO_STATE_MACHINE, 0, NULL);
543 }
544
545 #endif // OPENSSL_TRUSTY
546