1 /* crypto/bio/bf_buff.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
61 #include "internal/cryptlib.h"
62 #include <openssl/bio.h>
64 static int buffer_write(BIO
*h
, const char *buf
, int num
);
65 static int buffer_read(BIO
*h
, char *buf
, int size
);
66 static int buffer_puts(BIO
*h
, const char *str
);
67 static int buffer_gets(BIO
*h
, char *str
, int size
);
68 static long buffer_ctrl(BIO
*h
, int cmd
, long arg1
, void *arg2
);
69 static int buffer_new(BIO
*h
);
70 static int buffer_free(BIO
*data
);
71 static long buffer_callback_ctrl(BIO
*h
, int cmd
, bio_info_cb
*fp
);
72 #define DEFAULT_BUFFER_SIZE 4096
74 static BIO_METHOD methods_buffer
= {
87 BIO_METHOD
*BIO_f_buffer(void)
89 return (&methods_buffer
);
92 static int buffer_new(BIO
*bi
)
94 BIO_F_BUFFER_CTX
*ctx
= OPENSSL_malloc(sizeof(*ctx
));
98 ctx
->ibuf
= OPENSSL_malloc(DEFAULT_BUFFER_SIZE
);
99 if (ctx
->ibuf
== NULL
) {
103 ctx
->obuf
= OPENSSL_malloc(DEFAULT_BUFFER_SIZE
);
104 if (ctx
->obuf
== NULL
) {
105 OPENSSL_free(ctx
->ibuf
);
109 ctx
->ibuf_size
= DEFAULT_BUFFER_SIZE
;
110 ctx
->obuf_size
= DEFAULT_BUFFER_SIZE
;
117 bi
->ptr
= (char *)ctx
;
122 static int buffer_free(BIO
*a
)
128 b
= (BIO_F_BUFFER_CTX
*)a
->ptr
;
129 OPENSSL_free(b
->ibuf
);
130 OPENSSL_free(b
->obuf
);
131 OPENSSL_free(a
->ptr
);
138 static int buffer_read(BIO
*b
, char *out
, int outl
)
141 BIO_F_BUFFER_CTX
*ctx
;
145 ctx
= (BIO_F_BUFFER_CTX
*)b
->ptr
;
147 if ((ctx
== NULL
) || (b
->next_bio
== NULL
))
150 BIO_clear_retry_flags(b
);
154 /* If there is stuff left over, grab it */
158 memcpy(out
, &(ctx
->ibuf
[ctx
->ibuf_off
]), i
);
169 * We may have done a partial read. try to do more. We have nothing in
170 * the buffer. If we get an error and have read some data, just return it
171 * and let them retry to get the error again. copy direct to parent
174 if (outl
> ctx
->ibuf_size
) {
176 i
= BIO_read(b
->next_bio
, out
, outl
);
178 BIO_copy_next_retry(b
);
180 return ((num
> 0) ? num
: i
);
193 /* we are going to be doing some buffering */
194 i
= BIO_read(b
->next_bio
, ctx
->ibuf
, ctx
->ibuf_size
);
196 BIO_copy_next_retry(b
);
198 return ((num
> 0) ? num
: i
);
205 /* Lets re-read using ourselves :-) */
209 static int buffer_write(BIO
*b
, const char *in
, int inl
)
212 BIO_F_BUFFER_CTX
*ctx
;
214 if ((in
== NULL
) || (inl
<= 0))
216 ctx
= (BIO_F_BUFFER_CTX
*)b
->ptr
;
217 if ((ctx
== NULL
) || (b
->next_bio
== NULL
))
220 BIO_clear_retry_flags(b
);
222 i
= ctx
->obuf_size
- (ctx
->obuf_len
+ ctx
->obuf_off
);
223 /* add to buffer and return */
225 memcpy(&(ctx
->obuf
[ctx
->obuf_off
+ ctx
->obuf_len
]), in
, inl
);
226 ctx
->obuf_len
+= inl
;
230 /* stuff already in buffer, so add to it first, then flush */
231 if (ctx
->obuf_len
!= 0) {
232 if (i
> 0) { /* lets fill it up if we can */
233 memcpy(&(ctx
->obuf
[ctx
->obuf_off
+ ctx
->obuf_len
]), in
, i
);
239 /* we now have a full buffer needing flushing */
241 i
= BIO_write(b
->next_bio
, &(ctx
->obuf
[ctx
->obuf_off
]),
244 BIO_copy_next_retry(b
);
247 return ((num
> 0) ? num
: i
);
253 if (ctx
->obuf_len
== 0)
258 * we only get here if the buffer has been flushed and we still have
263 /* we now have inl bytes to write */
264 while (inl
>= ctx
->obuf_size
) {
265 i
= BIO_write(b
->next_bio
, in
, inl
);
267 BIO_copy_next_retry(b
);
269 return ((num
> 0) ? num
: i
);
281 * copy the rest into the buffer since we have only a small amount left
286 static long buffer_ctrl(BIO
*b
, int cmd
, long num
, void *ptr
)
289 BIO_F_BUFFER_CTX
*ctx
;
295 ctx
= (BIO_F_BUFFER_CTX
*)b
->ptr
;
303 if (b
->next_bio
== NULL
)
305 ret
= BIO_ctrl(b
->next_bio
, cmd
, num
, ptr
);
308 ret
= (long)ctx
->obuf_len
;
310 case BIO_C_GET_BUFF_NUM_LINES
:
313 for (i
= 0; i
< ctx
->ibuf_len
; i
++) {
314 if (p1
[ctx
->ibuf_off
+ i
] == '\n')
318 case BIO_CTRL_WPENDING
:
319 ret
= (long)ctx
->obuf_len
;
321 if (b
->next_bio
== NULL
)
323 ret
= BIO_ctrl(b
->next_bio
, cmd
, num
, ptr
);
326 case BIO_CTRL_PENDING
:
327 ret
= (long)ctx
->ibuf_len
;
329 if (b
->next_bio
== NULL
)
331 ret
= BIO_ctrl(b
->next_bio
, cmd
, num
, ptr
);
334 case BIO_C_SET_BUFF_READ_DATA
:
335 if (num
> ctx
->ibuf_size
) {
336 p1
= OPENSSL_malloc((int)num
);
339 OPENSSL_free(ctx
->ibuf
);
343 ctx
->ibuf_len
= (int)num
;
344 memcpy(ctx
->ibuf
, ptr
, (int)num
);
347 case BIO_C_SET_BUFF_SIZE
:
352 obs
= ctx
->obuf_size
;
353 } else { /* if (*ip == 1) */
355 ibs
= ctx
->ibuf_size
;
364 if ((ibs
> DEFAULT_BUFFER_SIZE
) && (ibs
!= ctx
->ibuf_size
)) {
365 p1
= OPENSSL_malloc((int)num
);
369 if ((obs
> DEFAULT_BUFFER_SIZE
) && (obs
!= ctx
->obuf_size
)) {
370 p2
= OPENSSL_malloc((int)num
);
377 if (ctx
->ibuf
!= p1
) {
378 OPENSSL_free(ctx
->ibuf
);
382 ctx
->ibuf_size
= ibs
;
384 if (ctx
->obuf
!= p2
) {
385 OPENSSL_free(ctx
->obuf
);
389 ctx
->obuf_size
= obs
;
392 case BIO_C_DO_STATE_MACHINE
:
393 if (b
->next_bio
== NULL
)
395 BIO_clear_retry_flags(b
);
396 ret
= BIO_ctrl(b
->next_bio
, cmd
, num
, ptr
);
397 BIO_copy_next_retry(b
);
401 if (b
->next_bio
== NULL
)
403 if (ctx
->obuf_len
<= 0) {
404 ret
= BIO_ctrl(b
->next_bio
, cmd
, num
, ptr
);
409 BIO_clear_retry_flags(b
);
410 if (ctx
->obuf_len
> 0) {
411 r
= BIO_write(b
->next_bio
,
412 &(ctx
->obuf
[ctx
->obuf_off
]), ctx
->obuf_len
);
413 BIO_copy_next_retry(b
);
425 ret
= BIO_ctrl(b
->next_bio
, cmd
, num
, ptr
);
429 if (!BIO_set_read_buffer_size(dbio
, ctx
->ibuf_size
) ||
430 !BIO_set_write_buffer_size(dbio
, ctx
->obuf_size
))
434 if (b
->next_bio
== NULL
)
436 ret
= BIO_ctrl(b
->next_bio
, cmd
, num
, ptr
);
441 BIOerr(BIO_F_BUFFER_CTRL
, ERR_R_MALLOC_FAILURE
);
445 static long buffer_callback_ctrl(BIO
*b
, int cmd
, bio_info_cb
*fp
)
449 if (b
->next_bio
== NULL
)
453 ret
= BIO_callback_ctrl(b
->next_bio
, cmd
, fp
);
459 static int buffer_gets(BIO
*b
, char *buf
, int size
)
461 BIO_F_BUFFER_CTX
*ctx
;
462 int num
= 0, i
, flag
;
465 ctx
= (BIO_F_BUFFER_CTX
*)b
->ptr
;
466 size
--; /* reserve space for a '\0' */
467 BIO_clear_retry_flags(b
);
470 if (ctx
->ibuf_len
> 0) {
471 p
= &(ctx
->ibuf
[ctx
->ibuf_off
]);
473 for (i
= 0; (i
< ctx
->ibuf_len
) && (i
< size
); i
++) {
485 if (flag
|| size
== 0) {
489 } else { /* read another chunk */
491 i
= BIO_read(b
->next_bio
, ctx
->ibuf
, ctx
->ibuf_size
);
493 BIO_copy_next_retry(b
);
496 return ((num
> 0) ? num
: i
);
506 static int buffer_puts(BIO
*b
, const char *str
)
508 return (buffer_write(b
, str
, strlen(str
)));