1 /* crypto/bio/bf_buff.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
61 #include "internal/cryptlib.h"
62 #include <openssl/bio.h>
64 static int buffer_write(BIO
*h
, const char *buf
, int num
);
65 static int buffer_read(BIO
*h
, char *buf
, int size
);
66 static int buffer_puts(BIO
*h
, const char *str
);
67 static int buffer_gets(BIO
*h
, char *str
, int size
);
68 static long buffer_ctrl(BIO
*h
, int cmd
, long arg1
, void *arg2
);
69 static int buffer_new(BIO
*h
);
70 static int buffer_free(BIO
*data
);
71 static long buffer_callback_ctrl(BIO
*h
, int cmd
, bio_info_cb
*fp
);
72 #define DEFAULT_BUFFER_SIZE 4096
74 static BIO_METHOD methods_buffer
= {
87 BIO_METHOD
*BIO_f_buffer(void)
89 return (&methods_buffer
);
92 static int buffer_new(BIO
*bi
)
94 BIO_F_BUFFER_CTX
*ctx
= OPENSSL_zalloc(sizeof(*ctx
));
98 ctx
->ibuf_size
= DEFAULT_BUFFER_SIZE
;
99 ctx
->ibuf
= OPENSSL_malloc(DEFAULT_BUFFER_SIZE
);
100 if (ctx
->ibuf
== NULL
) {
104 ctx
->obuf_size
= DEFAULT_BUFFER_SIZE
;
105 ctx
->obuf
= OPENSSL_malloc(DEFAULT_BUFFER_SIZE
);
106 if (ctx
->obuf
== NULL
) {
107 OPENSSL_free(ctx
->ibuf
);
113 bi
->ptr
= (char *)ctx
;
118 static int buffer_free(BIO
*a
)
124 b
= (BIO_F_BUFFER_CTX
*)a
->ptr
;
125 OPENSSL_free(b
->ibuf
);
126 OPENSSL_free(b
->obuf
);
127 OPENSSL_free(a
->ptr
);
134 static int buffer_read(BIO
*b
, char *out
, int outl
)
137 BIO_F_BUFFER_CTX
*ctx
;
141 ctx
= (BIO_F_BUFFER_CTX
*)b
->ptr
;
143 if ((ctx
== NULL
) || (b
->next_bio
== NULL
))
146 BIO_clear_retry_flags(b
);
150 /* If there is stuff left over, grab it */
154 memcpy(out
, &(ctx
->ibuf
[ctx
->ibuf_off
]), i
);
165 * We may have done a partial read. try to do more. We have nothing in
166 * the buffer. If we get an error and have read some data, just return it
167 * and let them retry to get the error again. copy direct to parent
170 if (outl
> ctx
->ibuf_size
) {
172 i
= BIO_read(b
->next_bio
, out
, outl
);
174 BIO_copy_next_retry(b
);
176 return ((num
> 0) ? num
: i
);
189 /* we are going to be doing some buffering */
190 i
= BIO_read(b
->next_bio
, ctx
->ibuf
, ctx
->ibuf_size
);
192 BIO_copy_next_retry(b
);
194 return ((num
> 0) ? num
: i
);
201 /* Lets re-read using ourselves :-) */
205 static int buffer_write(BIO
*b
, const char *in
, int inl
)
208 BIO_F_BUFFER_CTX
*ctx
;
210 if ((in
== NULL
) || (inl
<= 0))
212 ctx
= (BIO_F_BUFFER_CTX
*)b
->ptr
;
213 if ((ctx
== NULL
) || (b
->next_bio
== NULL
))
216 BIO_clear_retry_flags(b
);
218 i
= ctx
->obuf_size
- (ctx
->obuf_len
+ ctx
->obuf_off
);
219 /* add to buffer and return */
221 memcpy(&(ctx
->obuf
[ctx
->obuf_off
+ ctx
->obuf_len
]), in
, inl
);
222 ctx
->obuf_len
+= inl
;
226 /* stuff already in buffer, so add to it first, then flush */
227 if (ctx
->obuf_len
!= 0) {
228 if (i
> 0) { /* lets fill it up if we can */
229 memcpy(&(ctx
->obuf
[ctx
->obuf_off
+ ctx
->obuf_len
]), in
, i
);
235 /* we now have a full buffer needing flushing */
237 i
= BIO_write(b
->next_bio
, &(ctx
->obuf
[ctx
->obuf_off
]),
240 BIO_copy_next_retry(b
);
243 return ((num
> 0) ? num
: i
);
249 if (ctx
->obuf_len
== 0)
254 * we only get here if the buffer has been flushed and we still have
259 /* we now have inl bytes to write */
260 while (inl
>= ctx
->obuf_size
) {
261 i
= BIO_write(b
->next_bio
, in
, inl
);
263 BIO_copy_next_retry(b
);
265 return ((num
> 0) ? num
: i
);
277 * copy the rest into the buffer since we have only a small amount left
282 static long buffer_ctrl(BIO
*b
, int cmd
, long num
, void *ptr
)
285 BIO_F_BUFFER_CTX
*ctx
;
291 ctx
= (BIO_F_BUFFER_CTX
*)b
->ptr
;
299 if (b
->next_bio
== NULL
)
301 ret
= BIO_ctrl(b
->next_bio
, cmd
, num
, ptr
);
304 ret
= (long)ctx
->obuf_len
;
306 case BIO_C_GET_BUFF_NUM_LINES
:
309 for (i
= 0; i
< ctx
->ibuf_len
; i
++) {
310 if (p1
[ctx
->ibuf_off
+ i
] == '\n')
314 case BIO_CTRL_WPENDING
:
315 ret
= (long)ctx
->obuf_len
;
317 if (b
->next_bio
== NULL
)
319 ret
= BIO_ctrl(b
->next_bio
, cmd
, num
, ptr
);
322 case BIO_CTRL_PENDING
:
323 ret
= (long)ctx
->ibuf_len
;
325 if (b
->next_bio
== NULL
)
327 ret
= BIO_ctrl(b
->next_bio
, cmd
, num
, ptr
);
330 case BIO_C_SET_BUFF_READ_DATA
:
331 if (num
> ctx
->ibuf_size
) {
332 p1
= OPENSSL_malloc((int)num
);
335 OPENSSL_free(ctx
->ibuf
);
339 ctx
->ibuf_len
= (int)num
;
340 memcpy(ctx
->ibuf
, ptr
, (int)num
);
343 case BIO_C_SET_BUFF_SIZE
:
348 obs
= ctx
->obuf_size
;
349 } else { /* if (*ip == 1) */
351 ibs
= ctx
->ibuf_size
;
360 if ((ibs
> DEFAULT_BUFFER_SIZE
) && (ibs
!= ctx
->ibuf_size
)) {
361 p1
= OPENSSL_malloc((int)num
);
365 if ((obs
> DEFAULT_BUFFER_SIZE
) && (obs
!= ctx
->obuf_size
)) {
366 p2
= OPENSSL_malloc((int)num
);
373 if (ctx
->ibuf
!= p1
) {
374 OPENSSL_free(ctx
->ibuf
);
378 ctx
->ibuf_size
= ibs
;
380 if (ctx
->obuf
!= p2
) {
381 OPENSSL_free(ctx
->obuf
);
385 ctx
->obuf_size
= obs
;
388 case BIO_C_DO_STATE_MACHINE
:
389 if (b
->next_bio
== NULL
)
391 BIO_clear_retry_flags(b
);
392 ret
= BIO_ctrl(b
->next_bio
, cmd
, num
, ptr
);
393 BIO_copy_next_retry(b
);
397 if (b
->next_bio
== NULL
)
399 if (ctx
->obuf_len
<= 0) {
400 ret
= BIO_ctrl(b
->next_bio
, cmd
, num
, ptr
);
405 BIO_clear_retry_flags(b
);
406 if (ctx
->obuf_len
> 0) {
407 r
= BIO_write(b
->next_bio
,
408 &(ctx
->obuf
[ctx
->obuf_off
]), ctx
->obuf_len
);
409 BIO_copy_next_retry(b
);
421 ret
= BIO_ctrl(b
->next_bio
, cmd
, num
, ptr
);
425 if (!BIO_set_read_buffer_size(dbio
, ctx
->ibuf_size
) ||
426 !BIO_set_write_buffer_size(dbio
, ctx
->obuf_size
))
430 if (b
->next_bio
== NULL
)
432 ret
= BIO_ctrl(b
->next_bio
, cmd
, num
, ptr
);
437 BIOerr(BIO_F_BUFFER_CTRL
, ERR_R_MALLOC_FAILURE
);
441 static long buffer_callback_ctrl(BIO
*b
, int cmd
, bio_info_cb
*fp
)
445 if (b
->next_bio
== NULL
)
449 ret
= BIO_callback_ctrl(b
->next_bio
, cmd
, fp
);
455 static int buffer_gets(BIO
*b
, char *buf
, int size
)
457 BIO_F_BUFFER_CTX
*ctx
;
458 int num
= 0, i
, flag
;
461 ctx
= (BIO_F_BUFFER_CTX
*)b
->ptr
;
462 size
--; /* reserve space for a '\0' */
463 BIO_clear_retry_flags(b
);
466 if (ctx
->ibuf_len
> 0) {
467 p
= &(ctx
->ibuf
[ctx
->ibuf_off
]);
469 for (i
= 0; (i
< ctx
->ibuf_len
) && (i
< size
); i
++) {
481 if (flag
|| size
== 0) {
485 } else { /* read another chunk */
487 i
= BIO_read(b
->next_bio
, ctx
->ibuf
, ctx
->ibuf_size
);
489 BIO_copy_next_retry(b
);
492 return ((num
> 0) ? num
: i
);
502 static int buffer_puts(BIO
*b
, const char *str
)
504 return (buffer_write(b
, str
, strlen(str
)));