]>
Commit | Line | Data |
---|---|---|
b1322259 RS |
1 | /* |
2 | * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved. | |
d02b48c6 | 3 | * |
09abbca1 | 4 | * Licensed under the Apache License 2.0 (the "License"). You may not use |
b1322259 RS |
5 | * this file except in compliance with the License. You can obtain a copy |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
d02b48c6 RE |
8 | */ |
9 | ||
d02b48c6 RE |
10 | #include <stdio.h> |
11 | #include <errno.h> | |
706457b7 | 12 | #include "bio_local.h" |
b39fc560 | 13 | #include "internal/cryptlib.h" |
6ba76c4f | 14 | #include "internal/ktls.h" |
c836f8ef DSH |
15 | |
16 | #ifndef OPENSSL_NO_SOCK | |
17 | ||
0f113f3e | 18 | # include <openssl/bio.h> |
d02b48c6 | 19 | |
0f113f3e | 20 | # ifdef WATT32 |
2c25ebd1 RL |
21 | /* Watt-32 uses same names */ |
22 | # undef sock_write | |
23 | # undef sock_read | |
24 | # undef sock_puts | |
25 | # define sock_write SockWrite | |
0f113f3e MC |
26 | # define sock_read SockRead |
27 | # define sock_puts SockPuts | |
28 | # endif | |
f642ebc1 | 29 | |
0e1c0612 UM |
30 | static int sock_write(BIO *h, const char *buf, int num); |
31 | static int sock_read(BIO *h, char *buf, int size); | |
32 | static int sock_puts(BIO *h, const char *str); | |
33 | static long sock_ctrl(BIO *h, int cmd, long arg1, void *arg2); | |
d02b48c6 RE |
34 | static int sock_new(BIO *h); |
35 | static int sock_free(BIO *data); | |
36 | int BIO_sock_should_retry(int s); | |
d02b48c6 | 37 | |
04f6b0fd | 38 | static const BIO_METHOD methods_sockp = { |
0f113f3e MC |
39 | BIO_TYPE_SOCKET, |
40 | "socket", | |
3befffa3 MC |
41 | /* TODO: Convert to new style write function */ |
42 | bwrite_conv, | |
0f113f3e | 43 | sock_write, |
d07aee2c MC |
44 | /* TODO: Convert to new style read function */ |
45 | bread_conv, | |
0f113f3e MC |
46 | sock_read, |
47 | sock_puts, | |
b4ff6622 | 48 | NULL, /* sock_gets, */ |
0f113f3e MC |
49 | sock_ctrl, |
50 | sock_new, | |
51 | sock_free, | |
b4ff6622 | 52 | NULL, /* sock_callback_ctrl */ |
0f113f3e | 53 | }; |
d02b48c6 | 54 | |
04f6b0fd | 55 | const BIO_METHOD *BIO_s_socket(void) |
0f113f3e | 56 | { |
26a7d938 | 57 | return &methods_sockp; |
0f113f3e | 58 | } |
d02b48c6 | 59 | |
6b691a5c | 60 | BIO *BIO_new_socket(int fd, int close_flag) |
0f113f3e MC |
61 | { |
62 | BIO *ret; | |
d02b48c6 | 63 | |
0f113f3e MC |
64 | ret = BIO_new(BIO_s_socket()); |
65 | if (ret == NULL) | |
26a7d938 | 66 | return NULL; |
0f113f3e | 67 | BIO_set_fd(ret, fd, close_flag); |
6ba76c4f BP |
68 | # ifndef OPENSSL_NO_KTLS |
69 | { | |
70 | /* | |
71 | * The new socket is created successfully regardless of ktls_enable. | |
72 | * ktls_enable doesn't change any functionality of the socket, except | |
73 | * changing the setsockopt to enable the processing of ktls_start. | |
74 | * Thus, it is not a problem to call it for non-TLS sockets. | |
75 | */ | |
76 | ktls_enable(fd); | |
77 | } | |
78 | # endif | |
26a7d938 | 79 | return ret; |
0f113f3e | 80 | } |
d02b48c6 | 81 | |
6b691a5c | 82 | static int sock_new(BIO *bi) |
0f113f3e MC |
83 | { |
84 | bi->init = 0; | |
85 | bi->num = 0; | |
86 | bi->ptr = NULL; | |
87 | bi->flags = 0; | |
208fb891 | 88 | return 1; |
0f113f3e | 89 | } |
d02b48c6 | 90 | |
6b691a5c | 91 | static int sock_free(BIO *a) |
0f113f3e MC |
92 | { |
93 | if (a == NULL) | |
26a7d938 | 94 | return 0; |
0f113f3e MC |
95 | if (a->shutdown) { |
96 | if (a->init) { | |
8731a4fc | 97 | BIO_closesocket(a->num); |
0f113f3e MC |
98 | } |
99 | a->init = 0; | |
100 | a->flags = 0; | |
101 | } | |
208fb891 | 102 | return 1; |
0f113f3e MC |
103 | } |
104 | ||
6b691a5c | 105 | static int sock_read(BIO *b, char *out, int outl) |
0f113f3e MC |
106 | { |
107 | int ret = 0; | |
108 | ||
109 | if (out != NULL) { | |
110 | clear_socket_error(); | |
e401ef80 BP |
111 | # ifndef OPENSSL_NO_KTLS |
112 | if (BIO_get_ktls_recv(b)) | |
113 | ret = ktls_read_record(b->num, out, outl); | |
114 | else | |
115 | # endif | |
116 | ret = readsocket(b->num, out, outl); | |
0f113f3e MC |
117 | BIO_clear_retry_flags(b); |
118 | if (ret <= 0) { | |
119 | if (BIO_sock_should_retry(ret)) | |
120 | BIO_set_retry_read(b); | |
d924dbf4 MC |
121 | else if (ret == 0) |
122 | b->flags |= BIO_FLAGS_IN_EOF; | |
0f113f3e MC |
123 | } |
124 | } | |
26a7d938 | 125 | return ret; |
0f113f3e | 126 | } |
d02b48c6 | 127 | |
0e1c0612 | 128 | static int sock_write(BIO *b, const char *in, int inl) |
0f113f3e | 129 | { |
6ba76c4f | 130 | int ret = 0; |
0f113f3e MC |
131 | |
132 | clear_socket_error(); | |
6ba76c4f BP |
133 | # ifndef OPENSSL_NO_KTLS |
134 | if (BIO_should_ktls_ctrl_msg_flag(b)) { | |
135 | unsigned char record_type = (intptr_t)b->ptr; | |
136 | ret = ktls_send_ctrl_message(b->num, record_type, in, inl); | |
137 | if (ret >= 0) { | |
138 | ret = inl; | |
139 | BIO_clear_ktls_ctrl_msg_flag(b); | |
140 | } | |
141 | } else | |
142 | # endif | |
143 | ret = writesocket(b->num, in, inl); | |
0f113f3e MC |
144 | BIO_clear_retry_flags(b); |
145 | if (ret <= 0) { | |
146 | if (BIO_sock_should_retry(ret)) | |
147 | BIO_set_retry_write(b); | |
148 | } | |
26a7d938 | 149 | return ret; |
0f113f3e | 150 | } |
d02b48c6 | 151 | |
0e1c0612 | 152 | static long sock_ctrl(BIO *b, int cmd, long num, void *ptr) |
0f113f3e MC |
153 | { |
154 | long ret = 1; | |
155 | int *ip; | |
6ba76c4f | 156 | # ifndef OPENSSL_NO_KTLS |
2111f5c2 AG |
157 | # ifdef __FreeBSD__ |
158 | struct tls_enable *crypto_info; | |
159 | # else | |
6ba76c4f | 160 | struct tls12_crypto_info_aes_gcm_128 *crypto_info; |
2111f5c2 | 161 | # endif |
6ba76c4f | 162 | # endif |
0f113f3e MC |
163 | |
164 | switch (cmd) { | |
165 | case BIO_C_SET_FD: | |
166 | sock_free(b); | |
167 | b->num = *((int *)ptr); | |
168 | b->shutdown = (int)num; | |
169 | b->init = 1; | |
170 | break; | |
171 | case BIO_C_GET_FD: | |
172 | if (b->init) { | |
173 | ip = (int *)ptr; | |
174 | if (ip != NULL) | |
175 | *ip = b->num; | |
176 | ret = b->num; | |
177 | } else | |
178 | ret = -1; | |
179 | break; | |
180 | case BIO_CTRL_GET_CLOSE: | |
181 | ret = b->shutdown; | |
182 | break; | |
183 | case BIO_CTRL_SET_CLOSE: | |
184 | b->shutdown = (int)num; | |
185 | break; | |
186 | case BIO_CTRL_DUP: | |
187 | case BIO_CTRL_FLUSH: | |
188 | ret = 1; | |
189 | break; | |
6ba76c4f | 190 | # ifndef OPENSSL_NO_KTLS |
e401ef80 | 191 | case BIO_CTRL_SET_KTLS: |
2111f5c2 AG |
192 | # ifdef __FreeBSD__ |
193 | crypto_info = (struct tls_enable *)ptr; | |
194 | # else | |
6ba76c4f | 195 | crypto_info = (struct tls12_crypto_info_aes_gcm_128 *)ptr; |
2111f5c2 | 196 | # endif |
6ba76c4f BP |
197 | ret = ktls_start(b->num, crypto_info, sizeof(*crypto_info), num); |
198 | if (ret) | |
e401ef80 | 199 | BIO_set_ktls_flag(b, num); |
6ba76c4f BP |
200 | break; |
201 | case BIO_CTRL_GET_KTLS_SEND: | |
e401ef80 BP |
202 | return BIO_should_ktls_flag(b, 1); |
203 | case BIO_CTRL_GET_KTLS_RECV: | |
204 | return BIO_should_ktls_flag(b, 0); | |
205 | case BIO_CTRL_SET_KTLS_TX_SEND_CTRL_MSG: | |
6ba76c4f BP |
206 | BIO_set_ktls_ctrl_msg_flag(b); |
207 | b->ptr = (void *)num; | |
208 | ret = 0; | |
209 | break; | |
e401ef80 | 210 | case BIO_CTRL_CLEAR_KTLS_TX_CTRL_MSG: |
6ba76c4f BP |
211 | BIO_clear_ktls_ctrl_msg_flag(b); |
212 | ret = 0; | |
213 | break; | |
214 | # endif | |
d924dbf4 MC |
215 | case BIO_CTRL_EOF: |
216 | ret = (b->flags & BIO_FLAGS_IN_EOF) != 0 ? 1 : 0; | |
217 | break; | |
0f113f3e MC |
218 | default: |
219 | ret = 0; | |
220 | break; | |
221 | } | |
26a7d938 | 222 | return ret; |
0f113f3e | 223 | } |
d02b48c6 | 224 | |
0e1c0612 | 225 | static int sock_puts(BIO *bp, const char *str) |
0f113f3e MC |
226 | { |
227 | int n, ret; | |
d02b48c6 | 228 | |
0f113f3e MC |
229 | n = strlen(str); |
230 | ret = sock_write(bp, str, n); | |
26a7d938 | 231 | return ret; |
0f113f3e | 232 | } |
d02b48c6 | 233 | |
6b691a5c | 234 | int BIO_sock_should_retry(int i) |
0f113f3e MC |
235 | { |
236 | int err; | |
58964a49 | 237 | |
0f113f3e MC |
238 | if ((i == 0) || (i == -1)) { |
239 | err = get_last_socket_error(); | |
d02b48c6 | 240 | |
26a7d938 | 241 | return BIO_sock_non_fatal_error(err); |
0f113f3e | 242 | } |
26a7d938 | 243 | return 0; |
0f113f3e | 244 | } |
d02b48c6 | 245 | |
6b691a5c | 246 | int BIO_sock_non_fatal_error(int err) |
0f113f3e MC |
247 | { |
248 | switch (err) { | |
1fbab1dc | 249 | # if defined(OPENSSL_SYS_WINDOWS) |
0f113f3e MC |
250 | # if defined(WSAEWOULDBLOCK) |
251 | case WSAEWOULDBLOCK: | |
252 | # endif | |
d02b48c6 RE |
253 | # endif |
254 | ||
0f113f3e MC |
255 | # ifdef EWOULDBLOCK |
256 | # ifdef WSAEWOULDBLOCK | |
257 | # if WSAEWOULDBLOCK != EWOULDBLOCK | |
258 | case EWOULDBLOCK: | |
259 | # endif | |
260 | # else | |
261 | case EWOULDBLOCK: | |
dfeab068 | 262 | # endif |
d02b48c6 | 263 | # endif |
d02b48c6 | 264 | |
0f113f3e MC |
265 | # if defined(ENOTCONN) |
266 | case ENOTCONN: | |
267 | # endif | |
268 | ||
269 | # ifdef EINTR | |
270 | case EINTR: | |
271 | # endif | |
272 | ||
273 | # ifdef EAGAIN | |
274 | # if EWOULDBLOCK != EAGAIN | |
275 | case EAGAIN: | |
d02b48c6 | 276 | # endif |
d02b48c6 | 277 | # endif |
d02b48c6 | 278 | |
0f113f3e MC |
279 | # ifdef EPROTO |
280 | case EPROTO: | |
281 | # endif | |
58964a49 | 282 | |
0f113f3e MC |
283 | # ifdef EINPROGRESS |
284 | case EINPROGRESS: | |
285 | # endif | |
d02b48c6 | 286 | |
0f113f3e MC |
287 | # ifdef EALREADY |
288 | case EALREADY: | |
d02b48c6 | 289 | # endif |
208fb891 | 290 | return 1; |
0f113f3e MC |
291 | default: |
292 | break; | |
293 | } | |
26a7d938 | 294 | return 0; |
0f113f3e MC |
295 | } |
296 | ||
297 | #endif /* #ifndef OPENSSL_NO_SOCK */ |