|  | // Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved. | 
|  | // | 
|  | // Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | // you may not use this file except in compliance with the License. | 
|  | // You may obtain a copy of the License at | 
|  | // | 
|  | //     https://www.apache.org/licenses/LICENSE-2.0 | 
|  | // | 
|  | // Unless required by applicable law or agreed to in writing, software | 
|  | // distributed under the License is distributed on an "AS IS" BASIS, | 
|  | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | // See the License for the specific language governing permissions and | 
|  | // limitations under the License. | 
|  |  | 
|  | #include <openssl/bio.h> | 
|  |  | 
|  | #if !defined(OPENSSL_NO_SOCK) | 
|  |  | 
|  | #include <assert.h> | 
|  | #include <errno.h> | 
|  | #include <string.h> | 
|  |  | 
|  | #if !defined(OPENSSL_WINDOWS) | 
|  | #include <arpa/inet.h> | 
|  | #include <netinet/in.h> | 
|  | #include <sys/socket.h> | 
|  | #include <unistd.h> | 
|  | #else | 
|  | #include <winsock2.h> | 
|  | #include <ws2tcpip.h> | 
|  | #endif | 
|  |  | 
|  | #include <openssl/err.h> | 
|  | #include <openssl/mem.h> | 
|  |  | 
|  | #include "../internal.h" | 
|  | #include "internal.h" | 
|  |  | 
|  |  | 
|  | enum { | 
|  | BIO_CONN_S_BEFORE, | 
|  | BIO_CONN_S_BLOCKED_CONNECT, | 
|  | BIO_CONN_S_OK, | 
|  | }; | 
|  |  | 
|  | namespace { | 
|  | typedef struct bio_connect_st { | 
|  | int state; | 
|  |  | 
|  | char *param_hostname; | 
|  | char *param_port; | 
|  | int nbio; | 
|  |  | 
|  | unsigned short port; | 
|  |  | 
|  | struct sockaddr_storage them; | 
|  | socklen_t them_length; | 
|  |  | 
|  | // the file descriptor is kept in bio->num in order to match the socket | 
|  | // BIO. | 
|  |  | 
|  | // info_callback is called when the connection is initially made | 
|  | // callback(BIO,state,ret);  The callback should return 'ret', state is for | 
|  | // compatibility with the SSL info_callback. | 
|  | int (*info_callback)(BIO *bio, int state, int ret); | 
|  | } BIO_CONNECT; | 
|  | }  // namespace | 
|  |  | 
|  | #if !defined(OPENSSL_WINDOWS) | 
|  | static int closesocket(int sock) { return close(sock); } | 
|  | #endif | 
|  |  | 
|  | // split_host_and_port sets |*out_host| and |*out_port| to the host and port | 
|  | // parsed from |name|. It returns one on success or zero on error. Even when | 
|  | // successful, |*out_port| may be NULL on return if no port was specified. | 
|  | static int split_host_and_port(char **out_host, char **out_port, | 
|  | const char *name) { | 
|  | const char *host, *port = NULL; | 
|  | size_t host_len = 0; | 
|  |  | 
|  | *out_host = NULL; | 
|  | *out_port = NULL; | 
|  |  | 
|  | if (name[0] == '[') {  // bracketed IPv6 address | 
|  | const char *close = strchr(name, ']'); | 
|  | if (close == NULL) { | 
|  | return 0; | 
|  | } | 
|  | host = name + 1; | 
|  | host_len = close - host; | 
|  | if (close[1] == ':') {  // [IP]:port | 
|  | port = close + 2; | 
|  | } else if (close[1] != 0) { | 
|  | return 0; | 
|  | } | 
|  | } else { | 
|  | const char *colon = strchr(name, ':'); | 
|  | if (colon == NULL || strchr(colon + 1, ':') != NULL) {  // IPv6 address | 
|  | host = name; | 
|  | host_len = strlen(name); | 
|  | } else {  // host:port | 
|  | host = name; | 
|  | host_len = colon - name; | 
|  | port = colon + 1; | 
|  | } | 
|  | } | 
|  |  | 
|  | *out_host = OPENSSL_strndup(host, host_len); | 
|  | if (*out_host == NULL) { | 
|  | return 0; | 
|  | } | 
|  | if (port == NULL) { | 
|  | *out_port = NULL; | 
|  | return 1; | 
|  | } | 
|  | *out_port = OPENSSL_strdup(port); | 
|  | if (*out_port == NULL) { | 
|  | OPENSSL_free(*out_host); | 
|  | *out_host = NULL; | 
|  | return 0; | 
|  | } | 
|  | return 1; | 
|  | } | 
|  |  | 
|  | static int conn_state(BIO *bio, BIO_CONNECT *c) { | 
|  | int ret = -1, i; | 
|  | int (*cb)(BIO *, int, int) = NULL; | 
|  |  | 
|  | if (c->info_callback != NULL) { | 
|  | cb = c->info_callback; | 
|  | } | 
|  |  | 
|  | for (;;) { | 
|  | switch (c->state) { | 
|  | case BIO_CONN_S_BEFORE: | 
|  | // If there's a hostname and a port, assume that both are | 
|  | // exactly what they say. If there is only a hostname, try | 
|  | // (just once) to split it into a hostname and port. | 
|  |  | 
|  | if (c->param_hostname == NULL) { | 
|  | OPENSSL_PUT_ERROR(BIO, BIO_R_NO_HOSTNAME_SPECIFIED); | 
|  | goto exit_loop; | 
|  | } | 
|  |  | 
|  | if (c->param_port == NULL) { | 
|  | char *host, *port; | 
|  | if (!split_host_and_port(&host, &port, c->param_hostname) || | 
|  | port == NULL) { | 
|  | OPENSSL_free(host); | 
|  | OPENSSL_free(port); | 
|  | OPENSSL_PUT_ERROR(BIO, BIO_R_NO_PORT_SPECIFIED); | 
|  | ERR_add_error_data(2, "host=", c->param_hostname); | 
|  | goto exit_loop; | 
|  | } | 
|  |  | 
|  | OPENSSL_free(c->param_port); | 
|  | c->param_port = port; | 
|  | OPENSSL_free(c->param_hostname); | 
|  | c->param_hostname = host; | 
|  | } | 
|  |  | 
|  | if (!bio_ip_and_port_to_socket_and_addr( | 
|  | &bio->num, &c->them, &c->them_length, c->param_hostname, | 
|  | c->param_port)) { | 
|  | OPENSSL_PUT_ERROR(BIO, BIO_R_UNABLE_TO_CREATE_SOCKET); | 
|  | ERR_add_error_data(4, "host=", c->param_hostname, ":", c->param_port); | 
|  | goto exit_loop; | 
|  | } | 
|  |  | 
|  | if (c->nbio) { | 
|  | if (!bio_socket_nbio(bio->num, 1)) { | 
|  | OPENSSL_PUT_ERROR(BIO, BIO_R_ERROR_SETTING_NBIO); | 
|  | ERR_add_error_data(4, "host=", c->param_hostname, ":", | 
|  | c->param_port); | 
|  | goto exit_loop; | 
|  | } | 
|  | } | 
|  |  | 
|  | i = 1; | 
|  | ret = setsockopt(bio->num, SOL_SOCKET, SO_KEEPALIVE, (char *)&i, | 
|  | sizeof(i)); | 
|  | if (ret < 0) { | 
|  | OPENSSL_PUT_SYSTEM_ERROR(); | 
|  | OPENSSL_PUT_ERROR(BIO, BIO_R_KEEPALIVE); | 
|  | ERR_add_error_data(4, "host=", c->param_hostname, ":", c->param_port); | 
|  | goto exit_loop; | 
|  | } | 
|  |  | 
|  | BIO_clear_retry_flags(bio); | 
|  | ret = connect(bio->num, (struct sockaddr *)&c->them, c->them_length); | 
|  | if (ret < 0) { | 
|  | if (bio_socket_should_retry(ret)) { | 
|  | BIO_set_flags(bio, (BIO_FLAGS_IO_SPECIAL | BIO_FLAGS_SHOULD_RETRY)); | 
|  | c->state = BIO_CONN_S_BLOCKED_CONNECT; | 
|  | bio->retry_reason = BIO_RR_CONNECT; | 
|  | } else { | 
|  | OPENSSL_PUT_SYSTEM_ERROR(); | 
|  | OPENSSL_PUT_ERROR(BIO, BIO_R_CONNECT_ERROR); | 
|  | ERR_add_error_data(4, "host=", c->param_hostname, ":", | 
|  | c->param_port); | 
|  | } | 
|  | goto exit_loop; | 
|  | } else { | 
|  | c->state = BIO_CONN_S_OK; | 
|  | } | 
|  | break; | 
|  |  | 
|  | case BIO_CONN_S_BLOCKED_CONNECT: | 
|  | i = bio_sock_error(bio->num); | 
|  | if (i) { | 
|  | if (bio_socket_should_retry(ret)) { | 
|  | BIO_set_flags(bio, (BIO_FLAGS_IO_SPECIAL | BIO_FLAGS_SHOULD_RETRY)); | 
|  | c->state = BIO_CONN_S_BLOCKED_CONNECT; | 
|  | bio->retry_reason = BIO_RR_CONNECT; | 
|  | ret = -1; | 
|  | } else { | 
|  | BIO_clear_retry_flags(bio); | 
|  | OPENSSL_PUT_SYSTEM_ERROR(); | 
|  | OPENSSL_PUT_ERROR(BIO, BIO_R_NBIO_CONNECT_ERROR); | 
|  | ERR_add_error_data(4, "host=", c->param_hostname, ":", | 
|  | c->param_port); | 
|  | ret = 0; | 
|  | } | 
|  | goto exit_loop; | 
|  | } else { | 
|  | c->state = BIO_CONN_S_OK; | 
|  | } | 
|  | break; | 
|  |  | 
|  | case BIO_CONN_S_OK: | 
|  | ret = 1; | 
|  | goto exit_loop; | 
|  | default: | 
|  | assert(0); | 
|  | goto exit_loop; | 
|  | } | 
|  |  | 
|  | if (cb != NULL) { | 
|  | ret = cb((BIO *)bio, c->state, ret); | 
|  | if (ret == 0) { | 
|  | goto end; | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | exit_loop: | 
|  | if (cb != NULL) { | 
|  | ret = cb((BIO *)bio, c->state, ret); | 
|  | } | 
|  |  | 
|  | end: | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | static BIO_CONNECT *BIO_CONNECT_new(void) { | 
|  | BIO_CONNECT *ret = | 
|  | reinterpret_cast<BIO_CONNECT *>(OPENSSL_zalloc(sizeof(BIO_CONNECT))); | 
|  | if (ret == NULL) { | 
|  | return NULL; | 
|  | } | 
|  | ret->state = BIO_CONN_S_BEFORE; | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | static void BIO_CONNECT_free(BIO_CONNECT *c) { | 
|  | if (c == nullptr) { | 
|  | return; | 
|  | } | 
|  | OPENSSL_free(c->param_hostname); | 
|  | OPENSSL_free(c->param_port); | 
|  | OPENSSL_free(c); | 
|  | } | 
|  |  | 
|  | static int conn_new(BIO *bio) { | 
|  | bio->init = 0; | 
|  | bio->num = -1; | 
|  | bio->flags = 0; | 
|  | bio->ptr = BIO_CONNECT_new(); | 
|  | return bio->ptr != NULL; | 
|  | } | 
|  |  | 
|  | static void conn_close_socket(BIO *bio) { | 
|  | BIO_CONNECT *c = (BIO_CONNECT *)bio->ptr; | 
|  |  | 
|  | if (bio->num == -1) { | 
|  | return; | 
|  | } | 
|  |  | 
|  | // Only do a shutdown if things were established | 
|  | if (c->state == BIO_CONN_S_OK) { | 
|  | shutdown(bio->num, 2); | 
|  | } | 
|  | closesocket(bio->num); | 
|  | bio->num = -1; | 
|  | } | 
|  |  | 
|  | static int conn_free(BIO *bio) { | 
|  | if (bio->shutdown) { | 
|  | conn_close_socket(bio); | 
|  | } | 
|  |  | 
|  | BIO_CONNECT_free((BIO_CONNECT *)bio->ptr); | 
|  |  | 
|  | return 1; | 
|  | } | 
|  |  | 
|  | static int conn_read(BIO *bio, char *out, int out_len) { | 
|  | int ret = 0; | 
|  | BIO_CONNECT *data; | 
|  |  | 
|  | data = (BIO_CONNECT *)bio->ptr; | 
|  | if (data->state != BIO_CONN_S_OK) { | 
|  | ret = conn_state(bio, data); | 
|  | if (ret <= 0) { | 
|  | return ret; | 
|  | } | 
|  | } | 
|  |  | 
|  | bio_clear_socket_error(); | 
|  | ret = (int)recv(bio->num, out, out_len, 0); | 
|  | BIO_clear_retry_flags(bio); | 
|  | if (ret <= 0) { | 
|  | if (bio_socket_should_retry(ret)) { | 
|  | BIO_set_retry_read(bio); | 
|  | } | 
|  | } | 
|  |  | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | static int conn_write(BIO *bio, const char *in, int in_len) { | 
|  | int ret; | 
|  | BIO_CONNECT *data; | 
|  |  | 
|  | data = (BIO_CONNECT *)bio->ptr; | 
|  | if (data->state != BIO_CONN_S_OK) { | 
|  | ret = conn_state(bio, data); | 
|  | if (ret <= 0) { | 
|  | return ret; | 
|  | } | 
|  | } | 
|  |  | 
|  | bio_clear_socket_error(); | 
|  | ret = (int)send(bio->num, in, in_len, 0); | 
|  | BIO_clear_retry_flags(bio); | 
|  | if (ret <= 0) { | 
|  | if (bio_socket_should_retry(ret)) { | 
|  | BIO_set_retry_write(bio); | 
|  | } | 
|  | } | 
|  |  | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | static long conn_ctrl(BIO *bio, int cmd, long num, void *ptr) { | 
|  | BIO_CONNECT *data = static_cast<BIO_CONNECT *>(bio->ptr); | 
|  | switch (cmd) { | 
|  | case BIO_CTRL_RESET: | 
|  | data->state = BIO_CONN_S_BEFORE; | 
|  | conn_close_socket(bio); | 
|  | bio->flags = 0; | 
|  | return 0; | 
|  | case BIO_C_DO_STATE_MACHINE: | 
|  | // use this one to start the connection | 
|  | if (data->state != BIO_CONN_S_OK) { | 
|  | return conn_state(bio, data); | 
|  | } else { | 
|  | return 1; | 
|  | } | 
|  | case BIO_C_SET_CONNECT: | 
|  | if (ptr == nullptr) { | 
|  | return 0; | 
|  | } | 
|  | bio->init = 1; | 
|  | if (num == 0) { | 
|  | OPENSSL_free(data->param_hostname); | 
|  | data->param_hostname = | 
|  | OPENSSL_strdup(reinterpret_cast<const char *>(ptr)); | 
|  | if (data->param_hostname == nullptr) { | 
|  | return 0; | 
|  | } | 
|  | } else if (num == 1) { | 
|  | OPENSSL_free(data->param_port); | 
|  | data->param_port = OPENSSL_strdup(reinterpret_cast<const char *>(ptr)); | 
|  | if (data->param_port == nullptr) { | 
|  | return 0; | 
|  | } | 
|  | } else { | 
|  | return 0; | 
|  | } | 
|  | return 1; | 
|  | case BIO_C_SET_NBIO: | 
|  | data->nbio = static_cast<int>(num); | 
|  | return 1; | 
|  | case BIO_C_GET_FD: | 
|  | if (bio->init) { | 
|  | int *out = static_cast<int *>(ptr); | 
|  | if (out != nullptr) { | 
|  | *out = bio->num; | 
|  | } | 
|  | return bio->num; | 
|  | } else { | 
|  | return -1; | 
|  | } | 
|  | case BIO_CTRL_GET_CLOSE: | 
|  | return bio->shutdown; | 
|  | case BIO_CTRL_SET_CLOSE: | 
|  | bio->shutdown = static_cast<int>(num); | 
|  | return 1; | 
|  | case BIO_CTRL_FLUSH: | 
|  | return 1; | 
|  | case BIO_CTRL_GET_CALLBACK: { | 
|  | auto out = reinterpret_cast<int (**)(BIO *bio, int state, int xret)>(ptr); | 
|  | *out = data->info_callback; | 
|  | return 1; | 
|  | } | 
|  | default: | 
|  | return 0; | 
|  | } | 
|  | } | 
|  |  | 
|  | static long conn_callback_ctrl(BIO *bio, int cmd, BIO_info_cb *fp) { | 
|  | BIO_CONNECT *data = static_cast<BIO_CONNECT *>(bio->ptr); | 
|  | switch (cmd) { | 
|  | case BIO_CTRL_SET_CALLBACK: | 
|  | data->info_callback = fp; | 
|  | return 1; | 
|  | default: | 
|  | return 0; | 
|  | } | 
|  | } | 
|  |  | 
|  | BIO *BIO_new_connect(const char *hostname) { | 
|  | BIO *ret; | 
|  |  | 
|  | ret = BIO_new(BIO_s_connect()); | 
|  | if (ret == NULL) { | 
|  | return NULL; | 
|  | } | 
|  | if (!BIO_set_conn_hostname(ret, hostname)) { | 
|  | BIO_free(ret); | 
|  | return NULL; | 
|  | } | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | static const BIO_METHOD methods_connectp = { | 
|  | BIO_TYPE_CONNECT, "socket connect", conn_write, | 
|  | conn_read,        /*gets=*/nullptr, conn_ctrl, | 
|  | conn_new,         conn_free,        conn_callback_ctrl, | 
|  | }; | 
|  |  | 
|  | const BIO_METHOD *BIO_s_connect(void) { return &methods_connectp; } | 
|  |  | 
|  | int BIO_set_conn_hostname(BIO *bio, const char *name) { | 
|  | return (int)BIO_ctrl(bio, BIO_C_SET_CONNECT, 0, (void *)name); | 
|  | } | 
|  |  | 
|  | int BIO_set_conn_port(BIO *bio, const char *port_str) { | 
|  | return (int)BIO_ctrl(bio, BIO_C_SET_CONNECT, 1, (void *)port_str); | 
|  | } | 
|  |  | 
|  | int BIO_set_conn_int_port(BIO *bio, const int *port) { | 
|  | char buf[DECIMAL_SIZE(int) + 1]; | 
|  | snprintf(buf, sizeof(buf), "%d", *port); | 
|  | return BIO_set_conn_port(bio, buf); | 
|  | } | 
|  |  | 
|  | int BIO_set_nbio(BIO *bio, int on) { | 
|  | return (int)BIO_ctrl(bio, BIO_C_SET_NBIO, on, NULL); | 
|  | } | 
|  |  | 
|  | int BIO_do_connect(BIO *bio) { | 
|  | return (int)BIO_ctrl(bio, BIO_C_DO_STATE_MACHINE, 0, NULL); | 
|  | } | 
|  |  | 
|  | #endif  // OPENSSL_NO_SOCK |