|
1 /* crypto/bio/b_sock.c */ |
|
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
|
3 * All rights reserved. |
|
4 * |
|
5 * This package is an SSL implementation written |
|
6 * by Eric Young (eay@cryptsoft.com). |
|
7 * The implementation was written so as to conform with Netscapes SSL. |
|
8 * |
|
9 * This library is free for commercial and non-commercial use as long as |
|
10 * the following conditions are aheared to. The following conditions |
|
11 * apply to all code found in this distribution, be it the RC4, RSA, |
|
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
|
13 * included with this distribution is covered by the same copyright terms |
|
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
|
15 * |
|
16 * Copyright remains Eric Young's, and as such any Copyright notices in |
|
17 * the code are not to be removed. |
|
18 * If this package is used in a product, Eric Young should be given attribution |
|
19 * as the author of the parts of the library used. |
|
20 * This can be in the form of a textual message at program startup or |
|
21 * in documentation (online or textual) provided with the package. |
|
22 * |
|
23 * Redistribution and use in source and binary forms, with or without |
|
24 * modification, are permitted provided that the following conditions |
|
25 * are met: |
|
26 * 1. Redistributions of source code must retain the copyright |
|
27 * notice, this list of conditions and the following disclaimer. |
|
28 * 2. Redistributions in binary form must reproduce the above copyright |
|
29 * notice, this list of conditions and the following disclaimer in the |
|
30 * documentation and/or other materials provided with the distribution. |
|
31 * 3. All advertising materials mentioning features or use of this software |
|
32 * must display the following acknowledgement: |
|
33 * "This product includes cryptographic software written by |
|
34 * Eric Young (eay@cryptsoft.com)" |
|
35 * The word 'cryptographic' can be left out if the rouines from the library |
|
36 * being used are not cryptographic related :-). |
|
37 * 4. If you include any Windows specific code (or a derivative thereof) from |
|
38 * the apps directory (application code) you must include an acknowledgement: |
|
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
|
40 * |
|
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
|
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
|
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
|
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE |
|
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
|
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
|
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
|
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
|
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
|
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
|
51 * SUCH DAMAGE. |
|
52 * |
|
53 * The licence and distribution terms for any publically available version or |
|
54 * derivative of this code cannot be changed. i.e. this code cannot simply be |
|
55 * copied and put under another distribution licence |
|
56 * [including the GNU Public Licence.] |
|
57 */ |
|
58 |
|
59 /* |
|
60 © Portions copyright (c) 2006 Nokia Corporation. All rights reserved. |
|
61 */ |
|
62 |
|
63 |
|
64 #include <stdio.h> |
|
65 #include <stdlib.h> |
|
66 #include <errno.h> |
|
67 #define USE_SOCKETS |
|
68 #include "cryptlib.h" |
|
69 #include <openssl/bio.h> |
|
70 #if defined(OPENSSL_SYS_NETWARE) && defined(NETWARE_BSDSOCK) |
|
71 #include "netdb.h" |
|
72 #endif |
|
73 #if (defined(SYMBIAN) && (defined(__WINSCW__) || defined(__WINS__))) |
|
74 #include "libcrypto_wsd_macros.h" |
|
75 #include "libcrypto_wsd.h" |
|
76 #endif |
|
77 |
|
78 |
|
79 #ifndef OPENSSL_NO_SOCK |
|
80 |
|
81 #ifdef OPENSSL_SYS_WIN16 |
|
82 #define SOCKET_PROTOCOL 0 /* more microsoft stupidity */ |
|
83 #else |
|
84 #define SOCKET_PROTOCOL IPPROTO_TCP |
|
85 #endif |
|
86 |
|
87 #ifdef SO_MAXCONN |
|
88 #define MAX_LISTEN SO_MAXCONN |
|
89 #elif defined(SOMAXCONN) |
|
90 #define MAX_LISTEN SOMAXCONN |
|
91 #else |
|
92 #define MAX_LISTEN 32 |
|
93 #endif |
|
94 |
|
95 #if defined(OPENSSL_SYS_WINDOWS) || (defined(OPENSSL_SYS_NETWARE) && !defined(NETWARE_BSDSOCK)) |
|
96 static int wsa_init_done=0; |
|
97 #endif |
|
98 |
|
99 #if 0 |
|
100 static unsigned long BIO_ghbn_hits=0L; |
|
101 static unsigned long BIO_ghbn_miss=0L; |
|
102 |
|
103 #define GHBN_NUM 4 |
|
104 static struct ghbn_cache_st |
|
105 { |
|
106 char name[129]; |
|
107 struct hostent *ent; |
|
108 unsigned long order; |
|
109 } ghbn_cache[GHBN_NUM]; |
|
110 #endif |
|
111 |
|
112 static int get_ip(const char *str,unsigned char *ip); |
|
113 #if 0 |
|
114 static void ghbn_free(struct hostent *a); |
|
115 static struct hostent *ghbn_dup(struct hostent *a); |
|
116 #endif |
|
117 EXPORT_C int BIO_get_host_ip(const char *str, unsigned char *ip) |
|
118 { |
|
119 int i; |
|
120 int err = 1; |
|
121 int locked = 0; |
|
122 struct hostent *he; |
|
123 |
|
124 i=get_ip(str,ip); |
|
125 if (i < 0) |
|
126 { |
|
127 BIOerr(BIO_F_BIO_GET_HOST_IP,BIO_R_INVALID_IP_ADDRESS); |
|
128 goto err; |
|
129 } |
|
130 |
|
131 /* At this point, we have something that is most probably correct |
|
132 in some way, so let's init the socket. */ |
|
133 if (BIO_sock_init() != 1) |
|
134 return 0; /* don't generate another error code here */ |
|
135 |
|
136 /* If the string actually contained an IP address, we need not do |
|
137 anything more */ |
|
138 if (i > 0) return(1); |
|
139 |
|
140 /* do a gethostbyname */ |
|
141 CRYPTO_w_lock(CRYPTO_LOCK_GETHOSTBYNAME); |
|
142 locked = 1; |
|
143 he=BIO_gethostbyname(str); |
|
144 if (he == NULL) |
|
145 { |
|
146 BIOerr(BIO_F_BIO_GET_HOST_IP,BIO_R_BAD_HOSTNAME_LOOKUP); |
|
147 goto err; |
|
148 } |
|
149 |
|
150 /* cast to short because of win16 winsock definition */ |
|
151 if ((short)he->h_addrtype != AF_INET) |
|
152 { |
|
153 BIOerr(BIO_F_BIO_GET_HOST_IP,BIO_R_GETHOSTBYNAME_ADDR_IS_NOT_AF_INET); |
|
154 goto err; |
|
155 } |
|
156 for (i=0; i<4; i++) |
|
157 ip[i]=he->h_addr_list[0][i]; |
|
158 err = 0; |
|
159 |
|
160 err: |
|
161 if (locked) |
|
162 CRYPTO_w_unlock(CRYPTO_LOCK_GETHOSTBYNAME); |
|
163 if (err) |
|
164 { |
|
165 ERR_add_error_data(2,"host=",str); |
|
166 return 0; |
|
167 } |
|
168 else |
|
169 return 1; |
|
170 } |
|
171 |
|
172 EXPORT_C int BIO_get_port(const char *str, unsigned short *port_ptr) |
|
173 { |
|
174 int i; |
|
175 struct servent *s; |
|
176 |
|
177 if (str == NULL) |
|
178 { |
|
179 BIOerr(BIO_F_BIO_GET_PORT,BIO_R_NO_PORT_DEFINED); |
|
180 return(0); |
|
181 } |
|
182 i=atoi(str); |
|
183 if (i != 0) |
|
184 *port_ptr=(unsigned short)i; |
|
185 else |
|
186 { |
|
187 CRYPTO_w_lock(CRYPTO_LOCK_GETSERVBYNAME); |
|
188 /* Note: under VMS with SOCKETSHR, it seems like the first |
|
189 * parameter is 'char *', instead of 'const char *' |
|
190 */ |
|
191 s=getservbyname( |
|
192 #ifndef CONST_STRICT |
|
193 (char *) |
|
194 #endif |
|
195 str,"tcp"); |
|
196 if(s != NULL) |
|
197 *port_ptr=ntohs((unsigned short)s->s_port); |
|
198 CRYPTO_w_unlock(CRYPTO_LOCK_GETSERVBYNAME); |
|
199 if(s == NULL) |
|
200 { |
|
201 if (strcmp(str,"http") == 0) |
|
202 *port_ptr=80; |
|
203 else if (strcmp(str,"telnet") == 0) |
|
204 *port_ptr=23; |
|
205 else if (strcmp(str,"socks") == 0) |
|
206 *port_ptr=1080; |
|
207 else if (strcmp(str,"https") == 0) |
|
208 *port_ptr=443; |
|
209 else if (strcmp(str,"ssl") == 0) |
|
210 *port_ptr=443; |
|
211 else if (strcmp(str,"ftp") == 0) |
|
212 *port_ptr=21; |
|
213 else if (strcmp(str,"gopher") == 0) |
|
214 *port_ptr=70; |
|
215 #if 0 |
|
216 else if (strcmp(str,"wais") == 0) |
|
217 *port_ptr=21; |
|
218 #endif |
|
219 else |
|
220 { |
|
221 SYSerr(SYS_F_GETSERVBYNAME,get_last_socket_error()); |
|
222 ERR_add_error_data(3,"service='",str,"'"); |
|
223 return(0); |
|
224 } |
|
225 } |
|
226 } |
|
227 return(1); |
|
228 } |
|
229 |
|
230 EXPORT_C int BIO_sock_error(int sock) |
|
231 { |
|
232 int j,i; |
|
233 int size; |
|
234 |
|
235 size=sizeof(int); |
|
236 /* Note: under Windows the third parameter is of type (char *) |
|
237 * whereas under other systems it is (void *) if you don't have |
|
238 * a cast it will choke the compiler: if you do have a cast then |
|
239 * you can either go for (char *) or (void *). |
|
240 */ |
|
241 i=getsockopt(sock,SOL_SOCKET,SO_ERROR,(void *)&j,(void *)&size); |
|
242 if (i < 0) |
|
243 return(1); |
|
244 else |
|
245 return(j); |
|
246 } |
|
247 |
|
248 #if 0 |
|
249 long BIO_ghbn_ctrl(int cmd, int iarg, char *parg) |
|
250 { |
|
251 int i; |
|
252 char **p; |
|
253 |
|
254 switch (cmd) |
|
255 { |
|
256 case BIO_GHBN_CTRL_HITS: |
|
257 return(BIO_ghbn_hits); |
|
258 /* break; */ |
|
259 case BIO_GHBN_CTRL_MISSES: |
|
260 return(BIO_ghbn_miss); |
|
261 /* break; */ |
|
262 case BIO_GHBN_CTRL_CACHE_SIZE: |
|
263 return(GHBN_NUM); |
|
264 /* break; */ |
|
265 case BIO_GHBN_CTRL_GET_ENTRY: |
|
266 if ((iarg >= 0) && (iarg <GHBN_NUM) && |
|
267 (ghbn_cache[iarg].order > 0)) |
|
268 { |
|
269 p=(char **)parg; |
|
270 if (p == NULL) return(0); |
|
271 *p=ghbn_cache[iarg].name; |
|
272 ghbn_cache[iarg].name[128]='\0'; |
|
273 return(1); |
|
274 } |
|
275 return(0); |
|
276 /* break; */ |
|
277 case BIO_GHBN_CTRL_FLUSH: |
|
278 for (i=0; i<GHBN_NUM; i++) |
|
279 ghbn_cache[i].order=0; |
|
280 break; |
|
281 default: |
|
282 return(0); |
|
283 } |
|
284 return(1); |
|
285 } |
|
286 #endif |
|
287 |
|
288 #if 0 |
|
289 static struct hostent *ghbn_dup(struct hostent *a) |
|
290 { |
|
291 struct hostent *ret; |
|
292 int i,j; |
|
293 |
|
294 MemCheck_off(); |
|
295 ret=(struct hostent *)OPENSSL_malloc(sizeof(struct hostent)); |
|
296 if (ret == NULL) return(NULL); |
|
297 memset(ret,0,sizeof(struct hostent)); |
|
298 |
|
299 for (i=0; a->h_aliases[i] != NULL; i++) |
|
300 ; |
|
301 i++; |
|
302 ret->h_aliases = (char **)OPENSSL_malloc(i*sizeof(char *)); |
|
303 if (ret->h_aliases == NULL) |
|
304 goto err; |
|
305 memset(ret->h_aliases, 0, i*sizeof(char *)); |
|
306 |
|
307 for (i=0; a->h_addr_list[i] != NULL; i++) |
|
308 ; |
|
309 i++; |
|
310 ret->h_addr_list=(char **)OPENSSL_malloc(i*sizeof(char *)); |
|
311 if (ret->h_addr_list == NULL) |
|
312 goto err; |
|
313 memset(ret->h_addr_list, 0, i*sizeof(char *)); |
|
314 |
|
315 j=strlen(a->h_name)+1; |
|
316 if ((ret->h_name=OPENSSL_malloc(j)) == NULL) goto err; |
|
317 memcpy((char *)ret->h_name,a->h_name,j); |
|
318 for (i=0; a->h_aliases[i] != NULL; i++) |
|
319 { |
|
320 j=strlen(a->h_aliases[i])+1; |
|
321 if ((ret->h_aliases[i]=OPENSSL_malloc(j)) == NULL) goto err; |
|
322 memcpy(ret->h_aliases[i],a->h_aliases[i],j); |
|
323 } |
|
324 ret->h_length=a->h_length; |
|
325 ret->h_addrtype=a->h_addrtype; |
|
326 for (i=0; a->h_addr_list[i] != NULL; i++) |
|
327 { |
|
328 if ((ret->h_addr_list[i]=OPENSSL_malloc(a->h_length)) == NULL) |
|
329 goto err; |
|
330 memcpy(ret->h_addr_list[i],a->h_addr_list[i],a->h_length); |
|
331 } |
|
332 if (0) |
|
333 { |
|
334 err: |
|
335 if (ret != NULL) |
|
336 ghbn_free(ret); |
|
337 ret=NULL; |
|
338 } |
|
339 MemCheck_on(); |
|
340 return(ret); |
|
341 } |
|
342 |
|
343 static void ghbn_free(struct hostent *a) |
|
344 { |
|
345 int i; |
|
346 |
|
347 if(a == NULL) |
|
348 return; |
|
349 |
|
350 if (a->h_aliases != NULL) |
|
351 { |
|
352 for (i=0; a->h_aliases[i] != NULL; i++) |
|
353 OPENSSL_free(a->h_aliases[i]); |
|
354 OPENSSL_free(a->h_aliases); |
|
355 } |
|
356 if (a->h_addr_list != NULL) |
|
357 { |
|
358 for (i=0; a->h_addr_list[i] != NULL; i++) |
|
359 OPENSSL_free(a->h_addr_list[i]); |
|
360 OPENSSL_free(a->h_addr_list); |
|
361 } |
|
362 if (a->h_name != NULL) OPENSSL_free(a->h_name); |
|
363 OPENSSL_free(a); |
|
364 } |
|
365 |
|
366 #endif |
|
367 |
|
368 EXPORT_C struct hostent *BIO_gethostbyname(const char *name) |
|
369 { |
|
370 #if 1 |
|
371 /* Caching gethostbyname() results forever is wrong, |
|
372 * so we have to let the true gethostbyname() worry about this */ |
|
373 return gethostbyname(name); |
|
374 #else |
|
375 struct hostent *ret; |
|
376 int i,lowi=0,j; |
|
377 unsigned long low= (unsigned long)-1; |
|
378 |
|
379 |
|
380 # if 0 |
|
381 /* It doesn't make sense to use locking here: The function interface |
|
382 * is not thread-safe, because threads can never be sure when |
|
383 * some other thread destroys the data they were given a pointer to. |
|
384 */ |
|
385 CRYPTO_w_lock(CRYPTO_LOCK_GETHOSTBYNAME); |
|
386 # endif |
|
387 j=strlen(name); |
|
388 if (j < 128) |
|
389 { |
|
390 for (i=0; i<GHBN_NUM; i++) |
|
391 { |
|
392 if (low > ghbn_cache[i].order) |
|
393 { |
|
394 low=ghbn_cache[i].order; |
|
395 lowi=i; |
|
396 } |
|
397 if (ghbn_cache[i].order > 0) |
|
398 { |
|
399 if (strncmp(name,ghbn_cache[i].name,128) == 0) |
|
400 break; |
|
401 } |
|
402 } |
|
403 } |
|
404 else |
|
405 i=GHBN_NUM; |
|
406 |
|
407 if (i == GHBN_NUM) /* no hit*/ |
|
408 { |
|
409 BIO_ghbn_miss++; |
|
410 /* Note: under VMS with SOCKETSHR, it seems like the first |
|
411 * parameter is 'char *', instead of 'const char *' |
|
412 */ |
|
413 ret=gethostbyname( |
|
414 # ifndef CONST_STRICT |
|
415 (char *) |
|
416 # endif |
|
417 name); |
|
418 |
|
419 if (ret == NULL) |
|
420 goto end; |
|
421 if (j > 128) /* too big to cache */ |
|
422 { |
|
423 # if 0 |
|
424 /* If we were trying to make this function thread-safe (which |
|
425 * is bound to fail), we'd have to give up in this case |
|
426 * (or allocate more memory). */ |
|
427 ret = NULL; |
|
428 # endif |
|
429 goto end; |
|
430 } |
|
431 |
|
432 /* else add to cache */ |
|
433 if (ghbn_cache[lowi].ent != NULL) |
|
434 ghbn_free(ghbn_cache[lowi].ent); /* XXX not thread-safe */ |
|
435 ghbn_cache[lowi].name[0] = '\0'; |
|
436 |
|
437 if((ret=ghbn_cache[lowi].ent=ghbn_dup(ret)) == NULL) |
|
438 { |
|
439 BIOerr(BIO_F_BIO_GETHOSTBYNAME,ERR_R_MALLOC_FAILURE); |
|
440 goto end; |
|
441 } |
|
442 strncpy(ghbn_cache[lowi].name,name,128); |
|
443 ghbn_cache[lowi].order=BIO_ghbn_miss+BIO_ghbn_hits; |
|
444 } |
|
445 else |
|
446 { |
|
447 BIO_ghbn_hits++; |
|
448 ret= ghbn_cache[i].ent; |
|
449 ghbn_cache[i].order=BIO_ghbn_miss+BIO_ghbn_hits; |
|
450 } |
|
451 end: |
|
452 # if 0 |
|
453 CRYPTO_w_unlock(CRYPTO_LOCK_GETHOSTBYNAME); |
|
454 # endif |
|
455 return(ret); |
|
456 #endif |
|
457 } |
|
458 |
|
459 |
|
460 EXPORT_C int BIO_sock_init(void) |
|
461 { |
|
462 #ifdef OPENSSL_SYS_WINDOWS |
|
463 static struct WSAData wsa_state; |
|
464 |
|
465 if (!wsa_init_done) |
|
466 { |
|
467 int err; |
|
468 |
|
469 wsa_init_done=1; |
|
470 memset(&wsa_state,0,sizeof(wsa_state)); |
|
471 if (WSAStartup(0x0101,&wsa_state)!=0) |
|
472 { |
|
473 err=WSAGetLastError(); |
|
474 SYSerr(SYS_F_WSASTARTUP,err); |
|
475 BIOerr(BIO_F_BIO_SOCK_INIT,BIO_R_WSASTARTUP); |
|
476 return(-1); |
|
477 } |
|
478 } |
|
479 #endif /* OPENSSL_SYS_WINDOWS */ |
|
480 #ifdef WATT32 |
|
481 extern int _watt_do_exit; |
|
482 _watt_do_exit = 0; /* don't make sock_init() call exit() */ |
|
483 if (sock_init()) |
|
484 return (-1); |
|
485 #endif |
|
486 |
|
487 #if defined(OPENSSL_SYS_NETWARE) && !defined(NETWARE_BSDSOCK) |
|
488 WORD wVerReq; |
|
489 WSADATA wsaData; |
|
490 int err; |
|
491 |
|
492 if (!wsa_init_done) |
|
493 { |
|
494 |
|
495 |
|
496 wsa_init_done=1; |
|
497 wVerReq = MAKEWORD( 2, 0 ); |
|
498 err = WSAStartup(wVerReq,&wsaData); |
|
499 if (err != 0) |
|
500 { |
|
501 SYSerr(SYS_F_WSASTARTUP,err); |
|
502 BIOerr(BIO_F_BIO_SOCK_INIT,BIO_R_WSASTARTUP); |
|
503 return(-1); |
|
504 } |
|
505 } |
|
506 #endif |
|
507 |
|
508 return(1); |
|
509 } |
|
510 |
|
511 EXPORT_C void BIO_sock_cleanup(void) |
|
512 { |
|
513 #ifdef OPENSSL_SYS_WINDOWS |
|
514 if (wsa_init_done) |
|
515 { |
|
516 wsa_init_done=0; |
|
517 #ifndef OPENSSL_SYS_WINCE |
|
518 WSACancelBlockingCall(); |
|
519 #endif |
|
520 WSACleanup(); |
|
521 } |
|
522 #elif defined(OPENSSL_SYS_NETWARE) && !defined(NETWARE_BSDSOCK) |
|
523 if (wsa_init_done) |
|
524 { |
|
525 wsa_init_done=0; |
|
526 WSACleanup(); |
|
527 } |
|
528 #endif |
|
529 } |
|
530 |
|
531 #if !defined(OPENSSL_SYS_VMS) || __VMS_VER >= 70000000 |
|
532 |
|
533 EXPORT_C int BIO_socket_ioctl(int fd, long type, void *arg) |
|
534 { |
|
535 int i; |
|
536 |
|
537 #ifdef __DJGPP__ |
|
538 i=ioctlsocket(fd,type,(char *)arg); |
|
539 #else |
|
540 i=ioctlsocket(fd,type,arg); |
|
541 #endif /* __DJGPP__ */ |
|
542 if (i < 0) |
|
543 SYSerr(SYS_F_IOCTLSOCKET,get_last_socket_error()); |
|
544 return(i); |
|
545 } |
|
546 #endif /* __VMS_VER */ |
|
547 |
|
548 /* The reason I have implemented this instead of using sscanf is because |
|
549 * Visual C 1.52c gives an unresolved external when linking a DLL :-( */ |
|
550 static int get_ip(const char *str, unsigned char ip[4]) |
|
551 { |
|
552 unsigned int tmp[4]; |
|
553 int num=0,c,ok=0; |
|
554 |
|
555 tmp[0]=tmp[1]=tmp[2]=tmp[3]=0; |
|
556 |
|
557 for (;;) |
|
558 { |
|
559 c= *(str++); |
|
560 if ((c >= '0') && (c <= '9')) |
|
561 { |
|
562 ok=1; |
|
563 tmp[num]=tmp[num]*10+c-'0'; |
|
564 if (tmp[num] > 255) return(0); |
|
565 } |
|
566 else if (c == '.') |
|
567 { |
|
568 if (!ok) return(-1); |
|
569 if (num == 3) return(0); |
|
570 num++; |
|
571 ok=0; |
|
572 } |
|
573 else if (c == '\0' && (num == 3) && ok) |
|
574 break; |
|
575 else |
|
576 return(0); |
|
577 } |
|
578 ip[0]=tmp[0]; |
|
579 ip[1]=tmp[1]; |
|
580 ip[2]=tmp[2]; |
|
581 ip[3]=tmp[3]; |
|
582 return(1); |
|
583 } |
|
584 |
|
585 EXPORT_C int BIO_get_accept_socket(char *host, int bind_mode) |
|
586 { |
|
587 int ret=0; |
|
588 struct sockaddr_in server,client; |
|
589 int s=INVALID_SOCKET,cs; |
|
590 unsigned char ip[4]; |
|
591 unsigned short port; |
|
592 char *str=NULL,*e; |
|
593 const char *h,*p; |
|
594 unsigned long l; |
|
595 int err_num; |
|
596 |
|
597 if (BIO_sock_init() != 1) return(INVALID_SOCKET); |
|
598 |
|
599 if ((str=BUF_strdup(host)) == NULL) return(INVALID_SOCKET); |
|
600 |
|
601 h=p=NULL; |
|
602 h=str; |
|
603 for (e=str; *e; e++) |
|
604 { |
|
605 if (*e == ':') |
|
606 { |
|
607 p= &(e[1]); |
|
608 *e='\0'; |
|
609 } |
|
610 else if (*e == '/') |
|
611 { |
|
612 *e='\0'; |
|
613 break; |
|
614 } |
|
615 } |
|
616 |
|
617 if (p == NULL) |
|
618 { |
|
619 p=h; |
|
620 h="*"; |
|
621 } |
|
622 |
|
623 if (!BIO_get_port(p,&port)) goto err; |
|
624 |
|
625 memset((char *)&server,0,sizeof(server)); |
|
626 server.sin_family=AF_INET; |
|
627 server.sin_port=htons(port); |
|
628 |
|
629 if (strcmp(h,"*") == 0) |
|
630 server.sin_addr.s_addr=INADDR_ANY; |
|
631 else |
|
632 { |
|
633 if (!BIO_get_host_ip(h,&(ip[0]))) goto err; |
|
634 l=(unsigned long) |
|
635 ((unsigned long)ip[0]<<24L)| |
|
636 ((unsigned long)ip[1]<<16L)| |
|
637 ((unsigned long)ip[2]<< 8L)| |
|
638 ((unsigned long)ip[3]); |
|
639 server.sin_addr.s_addr=htonl(l); |
|
640 } |
|
641 |
|
642 again: |
|
643 s=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL); |
|
644 if (s == INVALID_SOCKET) |
|
645 { |
|
646 SYSerr(SYS_F_SOCKET,get_last_socket_error()); |
|
647 ERR_add_error_data(3,"port='",host,"'"); |
|
648 BIOerr(BIO_F_BIO_GET_ACCEPT_SOCKET,BIO_R_UNABLE_TO_CREATE_SOCKET); |
|
649 goto err; |
|
650 } |
|
651 |
|
652 #ifdef SO_REUSEADDR |
|
653 if (bind_mode == BIO_BIND_REUSEADDR) |
|
654 { |
|
655 int i=1; |
|
656 |
|
657 ret=setsockopt(s,SOL_SOCKET,SO_REUSEADDR,(char *)&i,sizeof(i)); |
|
658 bind_mode=BIO_BIND_NORMAL; |
|
659 } |
|
660 #endif |
|
661 if (bind(s,(struct sockaddr *)&server,sizeof(server)) == -1) |
|
662 { |
|
663 #ifdef SO_REUSEADDR |
|
664 err_num=get_last_socket_error(); |
|
665 if ((bind_mode == BIO_BIND_REUSEADDR_IF_UNUSED) && |
|
666 (err_num == EADDRINUSE)) |
|
667 { |
|
668 memcpy((char *)&client,(char *)&server,sizeof(server)); |
|
669 if (strcmp(h,"*") == 0) |
|
670 client.sin_addr.s_addr=htonl(0x7F000001); |
|
671 cs=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL); |
|
672 if (cs != INVALID_SOCKET) |
|
673 { |
|
674 int ii; |
|
675 ii=connect(cs,(struct sockaddr *)&client, |
|
676 sizeof(client)); |
|
677 closesocket(cs); |
|
678 if (ii == INVALID_SOCKET) |
|
679 { |
|
680 bind_mode=BIO_BIND_REUSEADDR; |
|
681 closesocket(s); |
|
682 goto again; |
|
683 } |
|
684 /* else error */ |
|
685 } |
|
686 /* else error */ |
|
687 } |
|
688 #endif |
|
689 SYSerr(SYS_F_BIND,err_num); |
|
690 ERR_add_error_data(3,"port='",host,"'"); |
|
691 BIOerr(BIO_F_BIO_GET_ACCEPT_SOCKET,BIO_R_UNABLE_TO_BIND_SOCKET); |
|
692 goto err; |
|
693 } |
|
694 if (listen(s,MAX_LISTEN) == -1) |
|
695 { |
|
696 SYSerr(SYS_F_BIND,get_last_socket_error()); |
|
697 ERR_add_error_data(3,"port='",host,"'"); |
|
698 BIOerr(BIO_F_BIO_GET_ACCEPT_SOCKET,BIO_R_UNABLE_TO_LISTEN_SOCKET); |
|
699 goto err; |
|
700 } |
|
701 ret=1; |
|
702 err: |
|
703 if (str != NULL) OPENSSL_free(str); |
|
704 if ((ret == 0) && (s != INVALID_SOCKET)) |
|
705 { |
|
706 closesocket(s); |
|
707 s= INVALID_SOCKET; |
|
708 } |
|
709 return(s); |
|
710 } |
|
711 #ifdef EMULATOR |
|
712 GET_STATIC_VAR_FROM_TLS(from,b_sock,struct sockaddr_in) |
|
713 #define from (*GET_WSD_VAR_NAME(from,b_sock, s)()) |
|
714 #endif |
|
715 |
|
716 EXPORT_C int BIO_accept(int sock, char **addr) |
|
717 { |
|
718 int ret=INVALID_SOCKET; |
|
719 #ifndef EMULATOR |
|
720 static struct sockaddr_in from; |
|
721 #endif |
|
722 unsigned long l; |
|
723 unsigned short port; |
|
724 int len; |
|
725 char *p; |
|
726 |
|
727 memset((char *)&from,0,sizeof(from)); |
|
728 len=sizeof(from); |
|
729 /* Note: under VMS with SOCKETSHR the fourth parameter is currently |
|
730 * of type (int *) whereas under other systems it is (void *) if |
|
731 * you don't have a cast it will choke the compiler: if you do |
|
732 * have a cast then you can either go for (int *) or (void *). |
|
733 */ |
|
734 ret=accept(sock,(struct sockaddr *)&from,(void *)&len); |
|
735 if (ret == INVALID_SOCKET) |
|
736 { |
|
737 if(BIO_sock_should_retry(ret)) return -2; |
|
738 SYSerr(SYS_F_ACCEPT,get_last_socket_error()); |
|
739 BIOerr(BIO_F_BIO_ACCEPT,BIO_R_ACCEPT_ERROR); |
|
740 goto end; |
|
741 } |
|
742 |
|
743 if (addr == NULL) goto end; |
|
744 |
|
745 l=ntohl(from.sin_addr.s_addr); |
|
746 port=ntohs(from.sin_port); |
|
747 if (*addr == NULL) |
|
748 { |
|
749 if ((p=OPENSSL_malloc(24)) == NULL) |
|
750 { |
|
751 BIOerr(BIO_F_BIO_ACCEPT,ERR_R_MALLOC_FAILURE); |
|
752 goto end; |
|
753 } |
|
754 *addr=p; |
|
755 } |
|
756 BIO_snprintf(*addr,24,"%d.%d.%d.%d:%d", |
|
757 (unsigned char)(l>>24L)&0xff, |
|
758 (unsigned char)(l>>16L)&0xff, |
|
759 (unsigned char)(l>> 8L)&0xff, |
|
760 (unsigned char)(l )&0xff, |
|
761 port); |
|
762 end: |
|
763 return(ret); |
|
764 } |
|
765 |
|
766 EXPORT_C int BIO_set_tcp_ndelay(int s, int on) |
|
767 { |
|
768 int ret=0; |
|
769 #if defined(TCP_NODELAY) && (defined(IPPROTO_TCP) || defined(SOL_TCP)) |
|
770 int opt; |
|
771 |
|
772 #ifdef SOL_TCP |
|
773 opt=SOL_TCP; |
|
774 #else |
|
775 #ifdef IPPROTO_TCP |
|
776 opt=IPPROTO_TCP; |
|
777 #endif |
|
778 #endif |
|
779 |
|
780 ret=setsockopt(s,opt,TCP_NODELAY,(char *)&on,sizeof(on)); |
|
781 #endif |
|
782 return(ret == 0); |
|
783 } |
|
784 #endif |
|
785 |
|
786 EXPORT_C int BIO_socket_nbio(int s, int mode) |
|
787 { |
|
788 int ret= -1; |
|
789 int l; |
|
790 |
|
791 l=mode; |
|
792 #ifdef FIONBIO |
|
793 ret=BIO_socket_ioctl(s,FIONBIO,&l); |
|
794 #endif |
|
795 return(ret == 0); |
|
796 } |