-static int wsa_init_done=0;
-
-#ifdef WIN16
-static HWND topWnd=0;
-static FARPROC lpTopWndProc=NULL;
-static FARPROC lpTopHookProc=NULL;
-extern HINSTANCE _hInstance; /* nice global CRT provides */
-
-static LONG FAR PASCAL topHookProc(hwnd,message,wParam,lParam)
-HWND hwnd;
-UINT message;
-WPARAM wParam;
-LPARAM lParam;
- {
- if (hwnd == topWnd)
- {
- switch(message)
- {
- case WM_DESTROY:
- case WM_CLOSE:
- SetWindowLong(topWnd,GWL_WNDPROC,(LONG)lpTopWndProc);
- sock_cleanup();
- break;
- }
- }
- return CallWindowProc(lpTopWndProc,hwnd,message,wParam,lParam);
- }
-
-static BOOL CALLBACK enumproc(HWND hwnd,LPARAM lParam)
- {
- topWnd=hwnd;
- return(FALSE);
- }
-
-#endif /* WIN32 */
-#endif /* WINDOWS */
-
-void sock_cleanup()
- {
-#ifdef WINDOWS
- if (wsa_init_done)
- {
- wsa_init_done=0;
- WSACancelBlockingCall();
- WSACleanup();
- }
-#endif
- }
-
-int sock_init()
- {
-#ifdef WINDOWS
- if (!wsa_init_done)
- {
- int err;
-
-#ifdef SIGINT
- signal(SIGINT,(void (*)(int))sock_cleanup);
-#endif
- wsa_init_done=1;
- memset(&wsa_state,0,sizeof(wsa_state));
- if (WSAStartup(0x0101,&wsa_state)!=0)
- {
- err=WSAGetLastError();
- BIO_printf(bio_err,"unable to start WINSOCK, error code=%d\n",err);
- return(0);
- }
-
-#ifdef WIN16
- EnumTaskWindows(GetCurrentTask(),enumproc,0L);
- lpTopWndProc=(FARPROC)GetWindowLong(topWnd,GWL_WNDPROC);
- lpTopHookProc=MakeProcInstance((FARPROC)topHookProc,_hInstance);
-
- SetWindowLong(topWnd,GWL_WNDPROC,(LONG)lpTopHookProc);
-#endif /* WIN16 */
- }
-#endif /* WINDOWS */
- return(1);
- }
-
-int init_client(sock, host, port)
-int *sock;
-char *host;
-int port;
- {
- unsigned char ip[4];
- short p=0;
-
- if (!host_ip(host,&(ip[0])))
- {
- return(0);
- }
- if (p != 0) port=p;
- return(init_client_ip(sock,ip,port));
- }
-
-int init_client_ip(sock, ip, port)
-int *sock;
-unsigned char ip[4];
-int port;
- {
- unsigned long addr;
- struct sockaddr_in them;
- int s,i;
-
- if (!sock_init()) return(0);
-
- memset((char *)&them,0,sizeof(them));
- them.sin_family=AF_INET;
- them.sin_port=htons((unsigned short)port);
- addr=(unsigned long)
- ((unsigned long)ip[0]<<24L)|
- ((unsigned long)ip[1]<<16L)|
- ((unsigned long)ip[2]<< 8L)|
- ((unsigned long)ip[3]);
- them.sin_addr.s_addr=htonl(addr);
-
- s=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL);
- if (s == INVALID_SOCKET) { perror("socket"); return(0); }
-
- i=0;
- i=setsockopt(s,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,sizeof(i));
- if (i < 0) { perror("keepalive"); return(0); }
-
- if (connect(s,(struct sockaddr *)&them,sizeof(them)) == -1)
- { close(s); perror("connect"); return(0); }
- *sock=s;
- return(1);
- }
-
-int nbio_sock_error(sock)
-int sock;
- {
- int j,i,size;
-
- size=sizeof(int);
- i=getsockopt(sock,SOL_SOCKET,SO_ERROR,(char *)&j,&size);
- if (i < 0)
- return(1);
- else
- return(j);
- }
-
-int nbio_init_client_ip(sock, ip, port)
-int *sock;
-unsigned char ip[4];
-int port;
- {
- unsigned long addr;
- struct sockaddr_in them;
- int s,i;
-
- if (!sock_init()) return(0);
-
- memset((char *)&them,0,sizeof(them));
- them.sin_family=AF_INET;
- them.sin_port=htons((unsigned short)port);
- addr= (unsigned long)
- ((unsigned long)ip[0]<<24L)|
- ((unsigned long)ip[1]<<16L)|
- ((unsigned long)ip[2]<< 8L)|
- ((unsigned long)ip[3]);
- them.sin_addr.s_addr=htonl(addr);
-
- if (*sock <= 0)
- {
- unsigned long l=1;
-
- s=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL);
- if (s == INVALID_SOCKET) { perror("socket"); return(0); }
-
- i=0;
- i=setsockopt(s,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,sizeof(i));
- if (i < 0) { perror("keepalive"); return(0); }
- *sock=s;
-
-#ifdef FIONBIO
- socket_ioctl(s,FIONBIO,&l);
-#endif
- }
- else
- s= *sock;
-
- i=connect(s,(struct sockaddr *)&them,sizeof(them));
- if (i == INVALID_SOCKET)
- {
- if (BIO_sock_should_retry(i))
- return(-1);
- else
- return(0);
- }
- else
- return(1);
- }
-
-int do_server(port, ret, cb)
-int port;
-int *ret;
-int (*cb)();
- {
- int sock;
- char *name;
- int accept_socket;
- int i;
-
- if (!init_server(&accept_socket,port)) return(0);
-
- if (ret != NULL)
- {
- *ret=accept_socket;
- /* return(1);*/
- }
- for (;;)
- {
- if (do_accept(accept_socket,&sock,&name) == 0)
- {
- SHUTDOWN(accept_socket);
- return(0);
- }
- i=(*cb)(name,sock);
- if (name != NULL) Free(name);
- SHUTDOWN(sock);
- if (i < 0)
- {
- SHUTDOWN(accept_socket);
- return(i);
- }
- }
- }
-
-int init_server(sock, port)
-int *sock;
-int port;
- {
- int ret=0;
- struct sockaddr_in server;
- int s= -1,i;
-
- if (!sock_init()) return(0);
-
- memset((char *)&server,0,sizeof(server));
- server.sin_family=AF_INET;
- server.sin_port=htons((unsigned short)port);
- server.sin_addr.s_addr=INADDR_ANY;
- s=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL);
-
- if (s == INVALID_SOCKET) goto err;
- if (bind(s,(struct sockaddr *)&server,sizeof(server)) == -1)
- {
-#ifndef WINDOWS
- perror("bind");
-#endif
- goto err;
- }
- if (listen(s,5) == -1) goto err;
- i=0;
- *sock=s;
- ret=1;
-err:
- if ((ret == 0) && (s != -1))
- {
- SHUTDOWN(s);
- }
- return(ret);
- }
-
-int do_accept(acc_sock, sock, host)
-int acc_sock;
-int *sock;
-char **host;
- {
- int ret,i;
- struct hostent *h1,*h2;
- static struct sockaddr_in from;
- int len;
-/* struct linger ling; */
-
- if (!sock_init()) return(0);
-
-#ifndef WINDOWS
-redoit:
-#endif
+static int wsa_init_done = 0;
+
+# endif /* OPENSSL_SYS_WINDOWS */
+
+# ifdef OPENSSL_SYS_WINDOWS
+static void ssl_sock_cleanup(void)
+{
+ if (wsa_init_done) {
+ wsa_init_done = 0;
+# ifndef OPENSSL_SYS_WINCE
+ WSACancelBlockingCall();
+# endif
+ WSACleanup();
+ }
+}
+# elif defined(OPENSSL_SYS_NETWARE) && !defined(NETWARE_BSDSOCK)
+static void sock_cleanup(void)
+{
+ if (wsa_init_done) {
+ wsa_init_done = 0;
+ WSACleanup();
+ }
+}
+# endif
+
+static int ssl_sock_init(void)
+{
+# ifdef WATT32
+ extern int _watt_do_exit;
+ _watt_do_exit = 0;
+ if (sock_init())
+ return (0);
+# elif defined(OPENSSL_SYS_WINDOWS)
+ if (!wsa_init_done) {
+ int err;
+
+# ifdef SIGINT
+ signal(SIGINT, (void (*)(int))ssl_sock_cleanup);
+# endif
+ wsa_init_done = 1;
+ memset(&wsa_state, 0, sizeof(wsa_state));
+ if (WSAStartup(0x0101, &wsa_state) != 0) {
+ err = WSAGetLastError();
+ BIO_printf(bio_err, "unable to start WINSOCK, error code=%d\n",
+ err);
+ return (0);
+ }
+ }
+# elif defined(OPENSSL_SYS_NETWARE) && !defined(NETWARE_BSDSOCK)
+ WORD wVerReq;
+ WSADATA wsaData;
+ int err;
+
+ if (!wsa_init_done) {
+
+# ifdef SIGINT
+ signal(SIGINT, (void (*)(int))sock_cleanup);
+# endif
+
+ wsa_init_done = 1;
+ wVerReq = MAKEWORD(2, 0);
+ err = WSAStartup(wVerReq, &wsaData);
+ if (err != 0) {
+ BIO_printf(bio_err, "unable to start WINSOCK2, error code=%d\n",
+ err);
+ return (0);
+ }
+ }
+# endif
+ return (1);
+}
+
+int init_client(int *sock, const char *host, int port, int type)
+{
+ unsigned char ip[4];
+
+ ip[0] = ip[1] = ip[2] = ip[3] = 0;
+ if (!host_ip(host, &(ip[0])))
+ return 0;
+ return init_client_ip(sock, ip, port, type);
+}
+
+static int init_client_ip(int *sock, const unsigned char ip[4], int port,
+ int type)
+{
+ unsigned long addr;
+ struct sockaddr_in them;
+ int s, i;
+
+ if (!ssl_sock_init())
+ return (0);
+
+ memset(&them, 0, sizeof(them));
+ them.sin_family = AF_INET;
+ them.sin_port = htons((unsigned short)port);
+ addr = (unsigned long)
+ ((unsigned long)ip[0] << 24L) |
+ ((unsigned long)ip[1] << 16L) |
+ ((unsigned long)ip[2] << 8L) | ((unsigned long)ip[3]);
+ them.sin_addr.s_addr = htonl(addr);
+
+ if (type == SOCK_STREAM)
+ s = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
+ else /* ( type == SOCK_DGRAM) */
+ s = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
+
+ if (s == (int)INVALID_SOCKET) {
+ perror("socket");
+ return (0);
+ }
+# if defined(SO_KEEPALIVE)
+ if (type == SOCK_STREAM) {
+ i = 0;
+ i = setsockopt(s, SOL_SOCKET, SO_KEEPALIVE, (char *)&i, sizeof(i));
+ if (i < 0) {
+ closesocket(s);
+ perror("keepalive");
+ return (0);
+ }
+ }
+# endif
+
+ if (connect(s, (struct sockaddr *)&them, sizeof(them)) == -1) {
+ closesocket(s);
+ perror("connect");
+ return (0);
+ }
+ *sock = s;
+ return (1);
+}
+
+# ifndef NO_SYS_UN_H
+int init_client_unix(int *sock, const char *server)
+{
+ struct sockaddr_un them;
+ int s;
+
+ if (strlen(server) > (UNIX_PATH_MAX + 1))
+ return (0);
+ if (!ssl_sock_init())
+ return (0);
+
+ s = socket(AF_UNIX, SOCK_STREAM, 0);
+ if (s == (int)INVALID_SOCKET) {
+ perror("socket");
+ return (0);
+ }
+
+ memset(&them, 0, sizeof(them));
+ them.sun_family = AF_UNIX;
+ strcpy(them.sun_path, server);
+
+ if (connect(s, (struct sockaddr *)&them, sizeof(them)) == -1) {
+ closesocket(s);
+ perror("connect");
+ return (0);
+ }
+ *sock = s;
+ return (1);
+}
+# endif
+
+int do_server(int port, int type, int *ret,
+ int (*cb) (char *hostname, int s, int stype,
+ unsigned char *context), unsigned char *context,
+ int naccept)
+{
+ int sock;
+ char *name = NULL;
+ int accept_socket = 0;
+ int i;
+
+ if (!init_server(&accept_socket, port, type))
+ return (0);
+
+ if (ret != NULL) {
+ *ret = accept_socket;
+ /* return(1); */
+ }
+ for (;;) {
+ if (type == SOCK_STREAM) {
+# ifdef OPENSSL_SSL_DEBUG_BROKEN_PROTOCOL
+ if (do_accept(accept_socket, &sock, NULL) == 0)
+# else
+ if (do_accept(accept_socket, &sock, &name) == 0)
+# endif
+ {
+ SHUTDOWN(accept_socket);
+ return (0);
+ }
+ } else
+ sock = accept_socket;
+ i = (*cb) (name, sock, type, context);
+ OPENSSL_free(name);
+ if (type == SOCK_STREAM)
+ SHUTDOWN2(sock);
+ if (naccept != -1)
+ naccept--;
+ if (i < 0 || naccept == 0) {
+ SHUTDOWN2(accept_socket);
+ return (i);
+ }
+ }
+}
+
+# ifndef NO_SYS_UN_H
+int do_server_unix(const char *path, int *ret,
+ int (*cb) (char *hostname, int s, int stype,
+ unsigned char *context), unsigned char *context,
+ int naccept)
+{
+ int sock;
+ int accept_socket = 0;
+ int i;
+
+ if (!init_server_unix(&accept_socket, path))
+ return (0);
+
+ if (ret != NULL)
+ *ret = accept_socket;
+ for (;;) {
+ if (do_accept_unix(accept_socket, &sock) == 0) {
+ SHUTDOWN(accept_socket);
+ i = 0;
+ goto out;
+ }
+ i = (*cb) (NULL, sock, 0, context);
+ SHUTDOWN2(sock);
+ if (naccept != -1)
+ naccept--;
+ if (i < 0 || naccept == 0) {
+ SHUTDOWN2(accept_socket);
+ goto out;
+ }
+ }
+ out:
+ unlink(path);
+ return (i);
+}
+# endif
+
+static int init_server_long(int *sock, int port, char *ip, int type)
+{
+ int ret = 0;
+ struct sockaddr_in server;
+ int s = -1;
+
+ if (!ssl_sock_init())
+ return (0);
+
+ memset(&server, 0, sizeof(server));
+ server.sin_family = AF_INET;
+ server.sin_port = htons((unsigned short)port);
+ if (ip == NULL)
+ server.sin_addr.s_addr = INADDR_ANY;
+ else
+/* Added for T3E, address-of fails on bit field (beckman@acl.lanl.gov) */
+# ifndef BIT_FIELD_LIMITS
+ memcpy(&server.sin_addr.s_addr, ip, 4);
+# else
+ memcpy(&server.sin_addr, ip, 4);
+# endif
+
+ if (type == SOCK_STREAM)
+ s = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
+ else /* type == SOCK_DGRAM */
+ s = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
+
+ if (s == (int)INVALID_SOCKET)
+ goto err;
+# if defined SOL_SOCKET && defined SO_REUSEADDR
+ {
+ int j = 1;
+ setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (void *)&j, sizeof j);
+ }
+# endif
+ if (bind(s, (struct sockaddr *)&server, sizeof(server)) == -1) {
+# ifndef OPENSSL_SYS_WINDOWS
+ perror("bind");
+# endif
+ goto err;
+ }
+ /* Make it 128 for linux */
+ if (type == SOCK_STREAM && listen(s, 128) == -1)
+ goto err;
+ *sock = s;
+ ret = 1;
+ err:
+ if ((ret == 0) && (s != -1)) {
+ SHUTDOWN(s);
+ }
+ return (ret);
+}
+
+static int init_server(int *sock, int port, int type)
+{
+ return (init_server_long(sock, port, NULL, type));
+}
+
+# ifndef NO_SYS_UN_H
+static int init_server_unix(int *sock, const char *path)
+{
+ int ret = 0;
+ struct sockaddr_un server;
+ int s = -1;
+
+ if (strlen(path) > (UNIX_PATH_MAX + 1))
+ return (0);
+ if (!ssl_sock_init())
+ return (0);
+
+ s = socket(AF_UNIX, SOCK_STREAM, 0);
+ if (s == (int)INVALID_SOCKET)
+ goto err;
+
+ memset(&server, 0, sizeof(server));
+ server.sun_family = AF_UNIX;
+ strcpy(server.sun_path, path);
+
+ if (bind(s, (struct sockaddr *)&server, sizeof(server)) == -1) {
+# ifndef OPENSSL_SYS_WINDOWS
+ perror("bind");
+# endif
+ goto err;
+ }
+ /* Make it 128 for linux */
+ if (listen(s, 128) == -1) {
+# ifndef OPENSSL_SYS_WINDOWS
+ perror("listen");
+# endif
+ unlink(path);
+ goto err;
+ }
+ *sock = s;
+ ret = 1;
+ err:
+ if ((ret == 0) && (s != -1)) {
+ SHUTDOWN(s);
+ }
+ return (ret);
+}
+# endif
+
+static int do_accept(int acc_sock, int *sock, char **host)
+{
+ int ret;
+ struct hostent *h1, *h2;
+ static struct sockaddr_in from;
+ int len;
+/* struct linger ling; */
+
+ if (!ssl_sock_init())
+ return (0);
+
+# ifndef OPENSSL_SYS_WINDOWS
+ redoit:
+# endif
+
+ memset(&from, 0, sizeof(from));
+ len = sizeof(from);
+ /*
+ * Note: under VMS with SOCKETSHR the fourth parameter is currently of
+ * type (int *) whereas under other systems it is (void *) if you don't
+ * have a cast it will choke the compiler: if you do have a cast then you
+ * can either go for (int *) or (void *).
+ */
+ ret = accept(acc_sock, (struct sockaddr *)&from, (void *)&len);
+ if (ret == (int)INVALID_SOCKET) {
+# if defined(OPENSSL_SYS_WINDOWS) || (defined(OPENSSL_SYS_NETWARE) && !defined(NETWARE_BSDSOCK))
+ int i;
+ i = WSAGetLastError();
+ BIO_printf(bio_err, "accept error %d\n", i);
+# else
+ if (errno == EINTR) {
+ /*
+ * check_timeout();
+ */
+ goto redoit;
+ }
+ BIO_printf(bio_err, "accept errno=%d, %s\n", errno, strerror(errno));
+# endif
+ return (0);
+ }
+
+ if (host == NULL)
+ goto end;
+# ifndef BIT_FIELD_LIMITS
+ /* I should use WSAAsyncGetHostByName() under windows */
+ h1 = gethostbyaddr((char *)&from.sin_addr.s_addr,
+ sizeof(from.sin_addr.s_addr), AF_INET);
+# else
+ h1 = gethostbyaddr((char *)&from.sin_addr,
+ sizeof(struct in_addr), AF_INET);
+# endif
+ if (h1 == NULL) {
+ BIO_printf(bio_err, "bad gethostbyaddr\n");
+ *host = NULL;
+ /* return(0); */
+ } else {
+ *host = app_malloc(strlen(h1->h_name) + 1, "copy hostname");
+ BUF_strlcpy(*host, h1->h_name, strlen(h1->h_name) + 1);
+
+ h2 = gethostbyname(*host);
+ if (h2 == NULL) {
+ BIO_printf(bio_err, "gethostbyname failure\n");
+ closesocket(ret);
+ return (0);
+ }
+ if (h2->h_addrtype != AF_INET) {
+ BIO_printf(bio_err, "gethostbyname addr is not AF_INET\n");
+ closesocket(ret);
+ return (0);
+ }
+ }
+ end:
+ *sock = ret;
+ return (1);
+}
+
+# ifndef NO_SYS_UN_H
+static int do_accept_unix(int acc_sock, int *sock)
+{
+ int ret;
+
+ if (!ssl_sock_init())
+ return (0);
+
+ redoit:
+ ret = accept(acc_sock, NULL, NULL);
+ if (ret == (int)INVALID_SOCKET) {
+ if (errno == EINTR) {
+ /*
+ * check_timeout();
+ */
+ goto redoit;
+ }
+ BIO_printf(bio_err, "accept errno=%d, %s\n", errno, strerror(errno));
+ return (0);
+ }
+
+ *sock = ret;
+ return (1);
+}
+# endif
+
+int extract_host_port(char *str, char **host_ptr, unsigned char *ip,
+ unsigned short *port_ptr)
+{
+ char *h, *p;
+
+ h = str;
+ p = strchr(str, ':');
+ if (p == NULL) {
+ BIO_printf(bio_err, "no port defined\n");
+ return (0);
+ }
+ *(p++) = '\0';
+
+ if ((ip != NULL) && !host_ip(str, ip))
+ goto err;
+ if (host_ptr != NULL)
+ *host_ptr = h;
+
+ if (!extract_port(p, port_ptr))
+ goto err;
+ return (1);
+ err:
+ return (0);
+}
+
+static int host_ip(const char *str, unsigned char ip[4])
+{
+ unsigned int in[4];
+ int i;
+
+ if (sscanf(str, "%u.%u.%u.%u", &(in[0]), &(in[1]), &(in[2]), &(in[3])) ==
+ 4) {
+ for (i = 0; i < 4; i++)
+ if (in[i] > 255) {
+ BIO_printf(bio_err, "invalid IP address\n");
+ goto err;
+ }
+ ip[0] = in[0];
+ ip[1] = in[1];
+ ip[2] = in[2];
+ ip[3] = in[3];
+ } else { /* do a gethostbyname */
+ struct hostent *he;
+
+ if (!ssl_sock_init())
+ return (0);
+
+ he = gethostbyname(str);
+ if (he == NULL) {
+ BIO_printf(bio_err, "gethostbyname failure\n");
+ goto err;
+ }
+ if (he->h_addrtype != AF_INET) {
+ BIO_printf(bio_err, "gethostbyname addr is not AF_INET\n");
+ return (0);
+ }
+ ip[0] = he->h_addr_list[0][0];
+ ip[1] = he->h_addr_list[0][1];
+ ip[2] = he->h_addr_list[0][2];
+ ip[3] = he->h_addr_list[0][3];
+ }
+ return (1);
+ err:
+ return (0);
+}
+
+int extract_port(const char *str, unsigned short *port_ptr)
+{
+ int i;
+ struct servent *s;
+
+ i = atoi(str);
+ if (i != 0)
+ *port_ptr = (unsigned short)i;
+ else {
+ s = getservbyname(str, "tcp");
+ if (s == NULL) {
+ BIO_printf(bio_err, "getservbyname failure for %s\n", str);
+ return (0);
+ }
+ *port_ptr = ntohs((unsigned short)s->s_port);
+ }
+ return (1);
+}