2 * Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
13 #include "bio_local.h"
14 #include "internal/ktls.h"
16 #ifndef OPENSSL_NO_SOCK
18 typedef struct bio_connect_st {
24 # ifndef OPENSSL_NO_KTLS
25 unsigned char record_type;
28 BIO_ADDRINFO *addr_first;
29 const BIO_ADDRINFO *addr_iter;
31 * int socket; this will be kept in bio->num so that it is compatible
32 * with the bss_sock bio
35 * called when the connection is initially made callback(BIO,state,ret);
36 * The callback should return 'ret'. state is for compatibility with the
39 BIO_info_cb *info_callback;
42 static int conn_write(BIO *h, const char *buf, int num);
43 static int conn_read(BIO *h, char *buf, int size);
44 static int conn_puts(BIO *h, const char *str);
45 static long conn_ctrl(BIO *h, int cmd, long arg1, void *arg2);
46 static int conn_new(BIO *h);
47 static int conn_free(BIO *data);
48 static long conn_callback_ctrl(BIO *h, int cmd, BIO_info_cb *);
50 static int conn_state(BIO *b, BIO_CONNECT *c);
51 static void conn_close_socket(BIO *data);
52 BIO_CONNECT *BIO_CONNECT_new(void);
53 void BIO_CONNECT_free(BIO_CONNECT *a);
55 #define BIO_CONN_S_BEFORE 1
56 #define BIO_CONN_S_GET_ADDR 2
57 #define BIO_CONN_S_CREATE_SOCKET 3
58 #define BIO_CONN_S_CONNECT 4
59 #define BIO_CONN_S_OK 5
60 #define BIO_CONN_S_BLOCKED_CONNECT 6
61 #define BIO_CONN_S_CONNECT_ERROR 7
63 static const BIO_METHOD methods_connectp = {
66 /* TODO: Convert to new style write function */
69 /* TODO: Convert to new style read function */
73 NULL, /* conn_gets, */
80 static int conn_state(BIO *b, BIO_CONNECT *c)
83 BIO_info_cb *cb = NULL;
85 if (c->info_callback != NULL)
86 cb = c->info_callback;
90 case BIO_CONN_S_BEFORE:
91 if (c->param_hostname == NULL && c->param_service == NULL) {
92 BIOerr(BIO_F_CONN_STATE, BIO_R_NO_HOSTNAME_OR_SERVICE_SPECIFIED);
94 "hostname=", c->param_hostname,
95 " service=", c->param_service);
98 c->state = BIO_CONN_S_GET_ADDR;
101 case BIO_CONN_S_GET_ADDR:
103 int family = AF_UNSPEC;
104 switch (c->connect_family) {
105 case BIO_FAMILY_IPV6:
106 if (1) { /* This is a trick we use to avoid bit rot.
107 * at least the "else" part will always be
114 BIOerr(BIO_F_CONN_STATE, BIO_R_UNAVAILABLE_IP_FAMILY);
118 case BIO_FAMILY_IPV4:
121 case BIO_FAMILY_IPANY:
125 BIOerr(BIO_F_CONN_STATE, BIO_R_UNSUPPORTED_IP_FAMILY);
128 if (BIO_lookup(c->param_hostname, c->param_service,
130 family, SOCK_STREAM, &c->addr_first) == 0)
133 if (c->addr_first == NULL) {
134 BIOerr(BIO_F_CONN_STATE, BIO_R_LOOKUP_RETURNED_NOTHING);
137 c->addr_iter = c->addr_first;
138 c->state = BIO_CONN_S_CREATE_SOCKET;
141 case BIO_CONN_S_CREATE_SOCKET:
142 ret = BIO_socket(BIO_ADDRINFO_family(c->addr_iter),
143 BIO_ADDRINFO_socktype(c->addr_iter),
144 BIO_ADDRINFO_protocol(c->addr_iter), 0);
145 if (ret == (int)INVALID_SOCKET) {
146 ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(),
147 "calling socket(%s, %s)",
148 c->param_hostname, c->param_service);
149 BIOerr(BIO_F_CONN_STATE, BIO_R_UNABLE_TO_CREATE_SOCKET);
153 c->state = BIO_CONN_S_CONNECT;
156 case BIO_CONN_S_CONNECT:
157 BIO_clear_retry_flags(b);
158 ret = BIO_connect(b->num, BIO_ADDRINFO_address(c->addr_iter),
159 BIO_SOCK_KEEPALIVE | c->connect_mode);
162 if (BIO_sock_should_retry(ret)) {
163 BIO_set_retry_special(b);
164 c->state = BIO_CONN_S_BLOCKED_CONNECT;
165 b->retry_reason = BIO_RR_CONNECT;
167 } else if ((c->addr_iter = BIO_ADDRINFO_next(c->addr_iter))
170 * if there are more addresses to try, do that first
172 BIO_closesocket(b->num);
173 c->state = BIO_CONN_S_CREATE_SOCKET;
177 ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(),
178 "calling connect(%s, %s)",
179 c->param_hostname, c->param_service);
180 c->state = BIO_CONN_S_CONNECT_ERROR;
185 c->state = BIO_CONN_S_OK;
189 case BIO_CONN_S_BLOCKED_CONNECT:
190 i = BIO_sock_error(b->num);
192 BIO_clear_retry_flags(b);
193 ERR_raise_data(ERR_LIB_SYS, i,
194 "calling connect(%s, %s)",
195 c->param_hostname, c->param_service);
196 BIOerr(BIO_F_CONN_STATE, BIO_R_NBIO_CONNECT_ERROR);
200 c->state = BIO_CONN_S_OK;
203 case BIO_CONN_S_CONNECT_ERROR:
204 BIOerr(BIO_F_CONN_STATE, BIO_R_CONNECT_ERROR);
217 if ((ret = cb((BIO *)b, c->state, ret)) == 0)
222 /* Loop does not exit */
225 ret = cb((BIO *)b, c->state, ret);
230 BIO_CONNECT *BIO_CONNECT_new(void)
234 if ((ret = OPENSSL_zalloc(sizeof(*ret))) == NULL) {
235 BIOerr(BIO_F_BIO_CONNECT_NEW, ERR_R_MALLOC_FAILURE);
238 ret->state = BIO_CONN_S_BEFORE;
239 ret->connect_family = BIO_FAMILY_IPANY;
243 void BIO_CONNECT_free(BIO_CONNECT *a)
247 OPENSSL_free(a->param_hostname);
248 OPENSSL_free(a->param_service);
249 BIO_ADDRINFO_free(a->addr_first);
253 const BIO_METHOD *BIO_s_connect(void)
255 return &methods_connectp;
258 static int conn_new(BIO *bi)
261 bi->num = (int)INVALID_SOCKET;
263 if ((bi->ptr = (char *)BIO_CONNECT_new()) == NULL)
269 static void conn_close_socket(BIO *bio)
273 c = (BIO_CONNECT *)bio->ptr;
274 if (bio->num != (int)INVALID_SOCKET) {
275 /* Only do a shutdown if things were established */
276 if (c->state == BIO_CONN_S_OK)
277 shutdown(bio->num, 2);
278 BIO_closesocket(bio->num);
279 bio->num = (int)INVALID_SOCKET;
283 static int conn_free(BIO *a)
289 data = (BIO_CONNECT *)a->ptr;
292 conn_close_socket(a);
293 BIO_CONNECT_free(data);
301 static int conn_read(BIO *b, char *out, int outl)
306 data = (BIO_CONNECT *)b->ptr;
307 if (data->state != BIO_CONN_S_OK) {
308 ret = conn_state(b, data);
314 clear_socket_error();
315 # ifndef OPENSSL_NO_KTLS
316 if (BIO_get_ktls_recv(b))
317 ret = ktls_read_record(b->num, out, outl);
320 ret = readsocket(b->num, out, outl);
321 BIO_clear_retry_flags(b);
323 if (BIO_sock_should_retry(ret))
324 BIO_set_retry_read(b);
326 b->flags |= BIO_FLAGS_IN_EOF;
332 static int conn_write(BIO *b, const char *in, int inl)
337 data = (BIO_CONNECT *)b->ptr;
338 if (data->state != BIO_CONN_S_OK) {
339 ret = conn_state(b, data);
344 clear_socket_error();
345 # ifndef OPENSSL_NO_KTLS
346 if (BIO_should_ktls_ctrl_msg_flag(b)) {
347 ret = ktls_send_ctrl_message(b->num, data->record_type, in, inl);
350 BIO_clear_ktls_ctrl_msg_flag(b);
354 ret = writesocket(b->num, in, inl);
355 BIO_clear_retry_flags(b);
357 if (BIO_sock_should_retry(ret))
358 BIO_set_retry_write(b);
363 static long conn_ctrl(BIO *b, int cmd, long num, void *ptr)
367 const char **pptr = NULL;
370 # ifndef OPENSSL_NO_KTLS
372 struct tls_enable *crypto_info;
374 struct tls12_crypto_info_aes_gcm_128 *crypto_info;
378 data = (BIO_CONNECT *)b->ptr;
383 data->state = BIO_CONN_S_BEFORE;
384 conn_close_socket(b);
385 BIO_ADDRINFO_free(data->addr_first);
386 data->addr_first = NULL;
389 case BIO_C_DO_STATE_MACHINE:
390 /* use this one to start the connection */
391 if (data->state != BIO_CONN_S_OK)
392 ret = (long)conn_state(b, data);
396 case BIO_C_GET_CONNECT:
398 pptr = (const char **)ptr;
400 *pptr = data->param_hostname;
401 } else if (num == 1) {
402 *pptr = data->param_service;
403 } else if (num == 2) {
404 *pptr = (const char *)BIO_ADDRINFO_address(data->addr_iter);
405 } else if (num == 3) {
406 switch (BIO_ADDRINFO_family(data->addr_iter)) {
409 ret = BIO_FAMILY_IPV6;
413 ret = BIO_FAMILY_IPV4;
416 ret = data->connect_family;
429 case BIO_C_SET_CONNECT:
433 char *hold_service = data->param_service;
434 /* We affect the hostname regardless. However, the input
435 * string might contain a host:service spec, so we must
436 * parse it, which might or might not affect the service
438 OPENSSL_free(data->param_hostname);
439 data->param_hostname = NULL;
440 ret = BIO_parse_hostserv(ptr,
441 &data->param_hostname,
442 &data->param_service,
443 BIO_PARSE_PRIO_HOST);
444 if (hold_service != data->param_service)
445 OPENSSL_free(hold_service);
446 } else if (num == 1) {
447 OPENSSL_free(data->param_service);
448 data->param_service = OPENSSL_strdup(ptr);
449 } else if (num == 2) {
450 const BIO_ADDR *addr = (const BIO_ADDR *)ptr;
452 data->param_hostname = BIO_ADDR_hostname_string(addr, 1);
453 data->param_service = BIO_ADDR_service_string(addr, 1);
454 BIO_ADDRINFO_free(data->addr_first);
455 data->addr_first = NULL;
456 data->addr_iter = NULL;
458 } else if (num == 3) {
459 data->connect_family = *(int *)ptr;
467 data->connect_mode |= BIO_SOCK_NONBLOCK;
469 data->connect_mode &= ~BIO_SOCK_NONBLOCK;
471 case BIO_C_SET_CONNECT_MODE:
472 data->connect_mode = (int)num;
483 case BIO_CTRL_GET_CLOSE:
486 case BIO_CTRL_SET_CLOSE:
487 b->shutdown = (int)num;
489 case BIO_CTRL_PENDING:
490 case BIO_CTRL_WPENDING:
498 if (data->param_hostname)
499 BIO_set_conn_hostname(dbio, data->param_hostname);
500 if (data->param_service)
501 BIO_set_conn_port(dbio, data->param_service);
502 BIO_set_conn_ip_family(dbio, data->connect_family);
503 BIO_set_conn_mode(dbio, data->connect_mode);
505 * FIXME: the cast of the function seems unlikely to be a good
508 (void)BIO_set_info_callback(dbio, data->info_callback);
511 case BIO_CTRL_SET_CALLBACK:
512 ret = 0; /* use callback ctrl */
514 case BIO_CTRL_GET_CALLBACK:
518 fptr = (BIO_info_cb **)ptr;
519 *fptr = data->info_callback;
523 ret = (b->flags & BIO_FLAGS_IN_EOF) != 0 ? 1 : 0;
525 # ifndef OPENSSL_NO_KTLS
526 case BIO_CTRL_SET_KTLS:
528 crypto_info = (struct tls_enable *)ptr;
530 crypto_info = (struct tls12_crypto_info_aes_gcm_128 *)ptr;
532 ret = ktls_start(b->num, crypto_info, sizeof(*crypto_info), num);
534 BIO_set_ktls_flag(b, num);
536 case BIO_CTRL_GET_KTLS_SEND:
537 return BIO_should_ktls_flag(b, 1);
538 case BIO_CTRL_GET_KTLS_RECV:
539 return BIO_should_ktls_flag(b, 0);
540 case BIO_CTRL_SET_KTLS_TX_SEND_CTRL_MSG:
541 BIO_set_ktls_ctrl_msg_flag(b);
542 data->record_type = num;
545 case BIO_CTRL_CLEAR_KTLS_TX_CTRL_MSG:
546 BIO_clear_ktls_ctrl_msg_flag(b);
557 static long conn_callback_ctrl(BIO *b, int cmd, BIO_info_cb *fp)
562 data = (BIO_CONNECT *)b->ptr;
565 case BIO_CTRL_SET_CALLBACK:
567 data->info_callback = fp;
577 static int conn_puts(BIO *bp, const char *str)
582 ret = conn_write(bp, str, n);
586 BIO *BIO_new_connect(const char *str)
590 ret = BIO_new(BIO_s_connect());
593 if (BIO_set_conn_hostname(ret, str))