xref: /freebsd/crypto/openssl/crypto/bio/bss_conn.c (revision 7bd6fde3)
1 /* crypto/bio/bss_conn.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  *
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  *
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  *
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  *
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  *
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 
59 #include <stdio.h>
60 #include <errno.h>
61 #define USE_SOCKETS
62 #include "cryptlib.h"
63 #include <openssl/bio.h>
64 
65 #ifndef OPENSSL_NO_SOCK
66 
67 #ifdef OPENSSL_SYS_WIN16
68 #define SOCKET_PROTOCOL 0 /* more microsoft stupidity */
69 #else
70 #define SOCKET_PROTOCOL IPPROTO_TCP
71 #endif
72 
73 #if (defined(OPENSSL_SYS_VMS) && __VMS_VER < 70000000)
74 /* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */
75 #undef FIONBIO
76 #endif
77 
78 
79 typedef struct bio_connect_st
80 	{
81 	int state;
82 
83 	char *param_hostname;
84 	char *param_port;
85 	int nbio;
86 
87 	unsigned char ip[4];
88 	unsigned short port;
89 
90 	struct sockaddr_in them;
91 
92 	/* int socket; this will be kept in bio->num so that it is
93 	 * compatible with the bss_sock bio */
94 
95 	/* called when the connection is initially made
96 	 *  callback(BIO,state,ret);  The callback should return
97 	 * 'ret'.  state is for compatibility with the ssl info_callback */
98 	int (*info_callback)(const BIO *bio,int state,int ret);
99 	} BIO_CONNECT;
100 
101 static int conn_write(BIO *h, const char *buf, int num);
102 static int conn_read(BIO *h, char *buf, int size);
103 static int conn_puts(BIO *h, const char *str);
104 static long conn_ctrl(BIO *h, int cmd, long arg1, void *arg2);
105 static int conn_new(BIO *h);
106 static int conn_free(BIO *data);
107 static long conn_callback_ctrl(BIO *h, int cmd, bio_info_cb *);
108 
109 static int conn_state(BIO *b, BIO_CONNECT *c);
110 static void conn_close_socket(BIO *data);
111 BIO_CONNECT *BIO_CONNECT_new(void );
112 void BIO_CONNECT_free(BIO_CONNECT *a);
113 
114 static BIO_METHOD methods_connectp=
115 	{
116 	BIO_TYPE_CONNECT,
117 	"socket connect",
118 	conn_write,
119 	conn_read,
120 	conn_puts,
121 	NULL, /* connect_gets, */
122 	conn_ctrl,
123 	conn_new,
124 	conn_free,
125 	conn_callback_ctrl,
126 	};
127 
128 static int conn_state(BIO *b, BIO_CONNECT *c)
129 	{
130 	int ret= -1,i;
131 	unsigned long l;
132 	char *p,*q;
133 	int (*cb)(const BIO *,int,int)=NULL;
134 
135 	if (c->info_callback != NULL)
136 		cb=c->info_callback;
137 
138 	for (;;)
139 		{
140 		switch (c->state)
141 			{
142 		case BIO_CONN_S_BEFORE:
143 			p=c->param_hostname;
144 			if (p == NULL)
145 				{
146 				BIOerr(BIO_F_CONN_STATE,BIO_R_NO_HOSTNAME_SPECIFIED);
147 				goto exit_loop;
148 				}
149 			for ( ; *p != '\0'; p++)
150 				{
151 				if ((*p == ':') || (*p == '/')) break;
152 				}
153 
154 			i= *p;
155 			if ((i == ':') || (i == '/'))
156 				{
157 
158 				*(p++)='\0';
159 				if (i == ':')
160 					{
161 					for (q=p; *q; q++)
162 						if (*q == '/')
163 							{
164 							*q='\0';
165 							break;
166 							}
167 					if (c->param_port != NULL)
168 						OPENSSL_free(c->param_port);
169 					c->param_port=BUF_strdup(p);
170 					}
171 				}
172 
173 			if (c->param_port == NULL)
174 				{
175 				BIOerr(BIO_F_CONN_STATE,BIO_R_NO_PORT_SPECIFIED);
176 				ERR_add_error_data(2,"host=",c->param_hostname);
177 				goto exit_loop;
178 				}
179 			c->state=BIO_CONN_S_GET_IP;
180 			break;
181 
182 		case BIO_CONN_S_GET_IP:
183 			if (BIO_get_host_ip(c->param_hostname,&(c->ip[0])) <= 0)
184 				goto exit_loop;
185 			c->state=BIO_CONN_S_GET_PORT;
186 			break;
187 
188 		case BIO_CONN_S_GET_PORT:
189 			if (c->param_port == NULL)
190 				{
191 				/* abort(); */
192 				goto exit_loop;
193 				}
194 			else if (BIO_get_port(c->param_port,&c->port) <= 0)
195 				goto exit_loop;
196 			c->state=BIO_CONN_S_CREATE_SOCKET;
197 			break;
198 
199 		case BIO_CONN_S_CREATE_SOCKET:
200 			/* now setup address */
201 			memset((char *)&c->them,0,sizeof(c->them));
202 			c->them.sin_family=AF_INET;
203 			c->them.sin_port=htons((unsigned short)c->port);
204 			l=(unsigned long)
205 				((unsigned long)c->ip[0]<<24L)|
206 				((unsigned long)c->ip[1]<<16L)|
207 				((unsigned long)c->ip[2]<< 8L)|
208 				((unsigned long)c->ip[3]);
209 			c->them.sin_addr.s_addr=htonl(l);
210 			c->state=BIO_CONN_S_CREATE_SOCKET;
211 
212 			ret=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL);
213 			if (ret == INVALID_SOCKET)
214 				{
215 				SYSerr(SYS_F_SOCKET,get_last_socket_error());
216 				ERR_add_error_data(4,"host=",c->param_hostname,
217 					":",c->param_port);
218 				BIOerr(BIO_F_CONN_STATE,BIO_R_UNABLE_TO_CREATE_SOCKET);
219 				goto exit_loop;
220 				}
221 			b->num=ret;
222 			c->state=BIO_CONN_S_NBIO;
223 			break;
224 
225 		case BIO_CONN_S_NBIO:
226 			if (c->nbio)
227 				{
228 				if (!BIO_socket_nbio(b->num,1))
229 					{
230 					BIOerr(BIO_F_CONN_STATE,BIO_R_ERROR_SETTING_NBIO);
231 					ERR_add_error_data(4,"host=",
232 						c->param_hostname,
233 						":",c->param_port);
234 					goto exit_loop;
235 					}
236 				}
237 			c->state=BIO_CONN_S_CONNECT;
238 
239 #if defined(SO_KEEPALIVE) && !defined(OPENSSL_SYS_MPE)
240 			i=1;
241 			i=setsockopt(b->num,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,sizeof(i));
242 			if (i < 0)
243 				{
244 				SYSerr(SYS_F_SOCKET,get_last_socket_error());
245 				ERR_add_error_data(4,"host=",c->param_hostname,
246 					":",c->param_port);
247 				BIOerr(BIO_F_CONN_STATE,BIO_R_KEEPALIVE);
248 				goto exit_loop;
249 				}
250 #endif
251 			break;
252 
253 		case BIO_CONN_S_CONNECT:
254 			BIO_clear_retry_flags(b);
255 			ret=connect(b->num,
256 				(struct sockaddr *)&c->them,
257 				sizeof(c->them));
258 			b->retry_reason=0;
259 			if (ret < 0)
260 				{
261 				if (BIO_sock_should_retry(ret))
262 					{
263 					BIO_set_retry_special(b);
264 					c->state=BIO_CONN_S_BLOCKED_CONNECT;
265 					b->retry_reason=BIO_RR_CONNECT;
266 					}
267 				else
268 					{
269 					SYSerr(SYS_F_CONNECT,get_last_socket_error());
270 					ERR_add_error_data(4,"host=",
271 						c->param_hostname,
272 						":",c->param_port);
273 					BIOerr(BIO_F_CONN_STATE,BIO_R_CONNECT_ERROR);
274 					}
275 				goto exit_loop;
276 				}
277 			else
278 				c->state=BIO_CONN_S_OK;
279 			break;
280 
281 		case BIO_CONN_S_BLOCKED_CONNECT:
282 			i=BIO_sock_error(b->num);
283 			if (i)
284 				{
285 				BIO_clear_retry_flags(b);
286 				SYSerr(SYS_F_CONNECT,i);
287 				ERR_add_error_data(4,"host=",
288 					c->param_hostname,
289 					":",c->param_port);
290 				BIOerr(BIO_F_CONN_STATE,BIO_R_NBIO_CONNECT_ERROR);
291 				ret=0;
292 				goto exit_loop;
293 				}
294 			else
295 				c->state=BIO_CONN_S_OK;
296 			break;
297 
298 		case BIO_CONN_S_OK:
299 			ret=1;
300 			goto exit_loop;
301 		default:
302 			/* abort(); */
303 			goto exit_loop;
304 			}
305 
306 		if (cb != NULL)
307 			{
308 			if (!(ret=cb((BIO *)b,c->state,ret)))
309 				goto end;
310 			}
311 		}
312 
313 	/* Loop does not exit */
314 exit_loop:
315 	if (cb != NULL)
316 		ret=cb((BIO *)b,c->state,ret);
317 end:
318 	return(ret);
319 	}
320 
321 BIO_CONNECT *BIO_CONNECT_new(void)
322 	{
323 	BIO_CONNECT *ret;
324 
325 	if ((ret=(BIO_CONNECT *)OPENSSL_malloc(sizeof(BIO_CONNECT))) == NULL)
326 		return(NULL);
327 	ret->state=BIO_CONN_S_BEFORE;
328 	ret->param_hostname=NULL;
329 	ret->param_port=NULL;
330 	ret->info_callback=NULL;
331 	ret->nbio=0;
332 	ret->ip[0]=0;
333 	ret->ip[1]=0;
334 	ret->ip[2]=0;
335 	ret->ip[3]=0;
336 	ret->port=0;
337 	memset((char *)&ret->them,0,sizeof(ret->them));
338 	return(ret);
339 	}
340 
341 void BIO_CONNECT_free(BIO_CONNECT *a)
342 	{
343 	if(a == NULL)
344 	    return;
345 
346 	if (a->param_hostname != NULL)
347 		OPENSSL_free(a->param_hostname);
348 	if (a->param_port != NULL)
349 		OPENSSL_free(a->param_port);
350 	OPENSSL_free(a);
351 	}
352 
353 BIO_METHOD *BIO_s_connect(void)
354 	{
355 	return(&methods_connectp);
356 	}
357 
358 static int conn_new(BIO *bi)
359 	{
360 	bi->init=0;
361 	bi->num=INVALID_SOCKET;
362 	bi->flags=0;
363 	if ((bi->ptr=(char *)BIO_CONNECT_new()) == NULL)
364 		return(0);
365 	else
366 		return(1);
367 	}
368 
369 static void conn_close_socket(BIO *bio)
370 	{
371 	BIO_CONNECT *c;
372 
373 	c=(BIO_CONNECT *)bio->ptr;
374 	if (bio->num != INVALID_SOCKET)
375 		{
376 		/* Only do a shutdown if things were established */
377 		if (c->state == BIO_CONN_S_OK)
378 			shutdown(bio->num,2);
379 		closesocket(bio->num);
380 		bio->num=INVALID_SOCKET;
381 		}
382 	}
383 
384 static int conn_free(BIO *a)
385 	{
386 	BIO_CONNECT *data;
387 
388 	if (a == NULL) return(0);
389 	data=(BIO_CONNECT *)a->ptr;
390 
391 	if (a->shutdown)
392 		{
393 		conn_close_socket(a);
394 		BIO_CONNECT_free(data);
395 		a->ptr=NULL;
396 		a->flags=0;
397 		a->init=0;
398 		}
399 	return(1);
400 	}
401 
402 static int conn_read(BIO *b, char *out, int outl)
403 	{
404 	int ret=0;
405 	BIO_CONNECT *data;
406 
407 	data=(BIO_CONNECT *)b->ptr;
408 	if (data->state != BIO_CONN_S_OK)
409 		{
410 		ret=conn_state(b,data);
411 		if (ret <= 0)
412 				return(ret);
413 		}
414 
415 	if (out != NULL)
416 		{
417 		clear_socket_error();
418 		ret=readsocket(b->num,out,outl);
419 		BIO_clear_retry_flags(b);
420 		if (ret <= 0)
421 			{
422 			if (BIO_sock_should_retry(ret))
423 				BIO_set_retry_read(b);
424 			}
425 		}
426 	return(ret);
427 	}
428 
429 static int conn_write(BIO *b, const char *in, int inl)
430 	{
431 	int ret;
432 	BIO_CONNECT *data;
433 
434 	data=(BIO_CONNECT *)b->ptr;
435 	if (data->state != BIO_CONN_S_OK)
436 		{
437 		ret=conn_state(b,data);
438 		if (ret <= 0) return(ret);
439 		}
440 
441 	clear_socket_error();
442 	ret=writesocket(b->num,in,inl);
443 	BIO_clear_retry_flags(b);
444 	if (ret <= 0)
445 		{
446 		if (BIO_sock_should_retry(ret))
447 			BIO_set_retry_write(b);
448 		}
449 	return(ret);
450 	}
451 
452 static long conn_ctrl(BIO *b, int cmd, long num, void *ptr)
453 	{
454 	BIO *dbio;
455 	int *ip;
456 	const char **pptr;
457 	long ret=1;
458 	BIO_CONNECT *data;
459 
460 	data=(BIO_CONNECT *)b->ptr;
461 
462 	switch (cmd)
463 		{
464 	case BIO_CTRL_RESET:
465 		ret=0;
466 		data->state=BIO_CONN_S_BEFORE;
467 		conn_close_socket(b);
468 		b->flags=0;
469 		break;
470 	case BIO_C_DO_STATE_MACHINE:
471 		/* use this one to start the connection */
472 		if (data->state != BIO_CONN_S_OK)
473 			ret=(long)conn_state(b,data);
474 		else
475 			ret=1;
476 		break;
477 	case BIO_C_GET_CONNECT:
478 		if (ptr != NULL)
479 			{
480 			pptr=(const char **)ptr;
481 			if (num == 0)
482 				{
483 				*pptr=data->param_hostname;
484 
485 				}
486 			else if (num == 1)
487 				{
488 				*pptr=data->param_port;
489 				}
490 			else if (num == 2)
491 				{
492 				*pptr= (char *)&(data->ip[0]);
493 				}
494 			else if (num == 3)
495 				{
496 				*((int *)ptr)=data->port;
497 				}
498 			if ((!b->init) || (ptr == NULL))
499 				*pptr="not initialized";
500 			ret=1;
501 			}
502 		break;
503 	case BIO_C_SET_CONNECT:
504 		if (ptr != NULL)
505 			{
506 			b->init=1;
507 			if (num == 0)
508 				{
509 				if (data->param_hostname != NULL)
510 					OPENSSL_free(data->param_hostname);
511 				data->param_hostname=BUF_strdup(ptr);
512 				}
513 			else if (num == 1)
514 				{
515 				if (data->param_port != NULL)
516 					OPENSSL_free(data->param_port);
517 				data->param_port=BUF_strdup(ptr);
518 				}
519 			else if (num == 2)
520 				{
521 				char buf[16];
522 				unsigned char *p = ptr;
523 
524 				BIO_snprintf(buf,sizeof buf,"%d.%d.%d.%d",
525 					     p[0],p[1],p[2],p[3]);
526 				if (data->param_hostname != NULL)
527 					OPENSSL_free(data->param_hostname);
528 				data->param_hostname=BUF_strdup(buf);
529 				memcpy(&(data->ip[0]),ptr,4);
530 				}
531 			else if (num == 3)
532 				{
533 				char buf[DECIMAL_SIZE(int)+1];
534 
535 				BIO_snprintf(buf,sizeof buf,"%d",*(int *)ptr);
536 				if (data->param_port != NULL)
537 					OPENSSL_free(data->param_port);
538 				data->param_port=BUF_strdup(buf);
539 				data->port= *(int *)ptr;
540 				}
541 			}
542 		break;
543 	case BIO_C_SET_NBIO:
544 		data->nbio=(int)num;
545 		break;
546 	case BIO_C_GET_FD:
547 		if (b->init)
548 			{
549 			ip=(int *)ptr;
550 			if (ip != NULL)
551 				*ip=b->num;
552 			ret=b->num;
553 			}
554 		else
555 			ret= -1;
556 		break;
557 	case BIO_CTRL_GET_CLOSE:
558 		ret=b->shutdown;
559 		break;
560 	case BIO_CTRL_SET_CLOSE:
561 		b->shutdown=(int)num;
562 		break;
563 	case BIO_CTRL_PENDING:
564 	case BIO_CTRL_WPENDING:
565 		ret=0;
566 		break;
567 	case BIO_CTRL_FLUSH:
568 		break;
569 	case BIO_CTRL_DUP:
570 		{
571 		dbio=(BIO *)ptr;
572 		if (data->param_port)
573 			BIO_set_conn_port(dbio,data->param_port);
574 		if (data->param_hostname)
575 			BIO_set_conn_hostname(dbio,data->param_hostname);
576 		BIO_set_nbio(dbio,data->nbio);
577 		/* FIXME: the cast of the function seems unlikely to be a good idea */
578                 (void)BIO_set_info_callback(dbio,(bio_info_cb *)data->info_callback);
579 		}
580 		break;
581 	case BIO_CTRL_SET_CALLBACK:
582 		{
583 #if 0 /* FIXME: Should this be used?  -- Richard Levitte */
584 		BIOerr(BIO_F_CONN_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
585 		ret = -1;
586 #else
587 		ret=0;
588 #endif
589 		}
590 		break;
591 	case BIO_CTRL_GET_CALLBACK:
592 		{
593 		int (**fptr)(const BIO *bio,int state,int xret);
594 
595 		fptr=(int (**)(const BIO *bio,int state,int xret))ptr;
596 		*fptr=data->info_callback;
597 		}
598 		break;
599 	default:
600 		ret=0;
601 		break;
602 		}
603 	return(ret);
604 	}
605 
606 static long conn_callback_ctrl(BIO *b, int cmd, bio_info_cb *fp)
607 	{
608 	long ret=1;
609 	BIO_CONNECT *data;
610 
611 	data=(BIO_CONNECT *)b->ptr;
612 
613 	switch (cmd)
614 		{
615 	case BIO_CTRL_SET_CALLBACK:
616 		{
617 		data->info_callback=(int (*)(const struct bio_st *, int, int))fp;
618 		}
619 		break;
620 	default:
621 		ret=0;
622 		break;
623 		}
624 	return(ret);
625 	}
626 
627 static int conn_puts(BIO *bp, const char *str)
628 	{
629 	int n,ret;
630 
631 	n=strlen(str);
632 	ret=conn_write(bp,str,n);
633 	return(ret);
634 	}
635 
636 BIO *BIO_new_connect(char *str)
637 	{
638 	BIO *ret;
639 
640 	ret=BIO_new(BIO_s_connect());
641 	if (ret == NULL) return(NULL);
642 	if (BIO_set_conn_hostname(ret,str))
643 		return(ret);
644 	else
645 		{
646 		BIO_free(ret);
647 		return(NULL);
648 		}
649 	}
650 
651 #endif
652 
653