xref: /aosp_15_r20/external/boringssl/src/crypto/bio/connect.c (revision 8fb009dc861624b67b6cdb62ea21f0f22d0c584b)
1 /* Copyright (C) 1995-1998 Eric Young ([email protected])
2  * All rights reserved.
3  *
4  * This package is an SSL implementation written
5  * by Eric Young ([email protected]).
6  * The implementation was written so as to conform with Netscapes SSL.
7  *
8  * This library is free for commercial and non-commercial use as long as
9  * the following conditions are aheared to.  The following conditions
10  * apply to all code found in this distribution, be it the RC4, RSA,
11  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
12  * included with this distribution is covered by the same copyright terms
13  * except that the holder is Tim Hudson ([email protected]).
14  *
15  * Copyright remains Eric Young's, and as such any Copyright notices in
16  * the code are not to be removed.
17  * If this package is used in a product, Eric Young should be given attribution
18  * as the author of the parts of the library used.
19  * This can be in the form of a textual message at program startup or
20  * in documentation (online or textual) provided with the package.
21  *
22  * Redistribution and use in source and binary forms, with or without
23  * modification, are permitted provided that the following conditions
24  * are met:
25  * 1. Redistributions of source code must retain the copyright
26  *    notice, this list of conditions and the following disclaimer.
27  * 2. Redistributions in binary form must reproduce the above copyright
28  *    notice, this list of conditions and the following disclaimer in the
29  *    documentation and/or other materials provided with the distribution.
30  * 3. All advertising materials mentioning features or use of this software
31  *    must display the following acknowledgement:
32  *    "This product includes cryptographic software written by
33  *     Eric Young ([email protected])"
34  *    The word 'cryptographic' can be left out if the rouines from the library
35  *    being used are not cryptographic related :-).
36  * 4. If you include any Windows specific code (or a derivative thereof) from
37  *    the apps directory (application code) you must include an acknowledgement:
38  *    "This product includes software written by Tim Hudson ([email protected])"
39  *
40  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
41  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
43  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
44  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
45  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
46  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
49  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
50  * SUCH DAMAGE.
51  *
52  * The licence and distribution terms for any publically available version or
53  * derivative of this code cannot be changed.  i.e. this code cannot simply be
54  * copied and put under another distribution licence
55  * [including the GNU Public Licence.] */
56 
57 #include <openssl/bio.h>
58 
59 #if !defined(OPENSSL_NO_SOCK)
60 
61 #include <assert.h>
62 #include <errno.h>
63 #include <string.h>
64 
65 #if !defined(OPENSSL_WINDOWS)
66 #include <sys/socket.h>
67 #include <netinet/in.h>
68 #include <arpa/inet.h>
69 #include <unistd.h>
70 #else
71 OPENSSL_MSVC_PRAGMA(warning(push, 3))
72 #include <winsock2.h>
73 #include <ws2tcpip.h>
74 OPENSSL_MSVC_PRAGMA(warning(pop))
75 #endif
76 
77 #include <openssl/err.h>
78 #include <openssl/mem.h>
79 
80 #include "internal.h"
81 #include "../internal.h"
82 
83 
84 enum {
85   BIO_CONN_S_BEFORE,
86   BIO_CONN_S_BLOCKED_CONNECT,
87   BIO_CONN_S_OK,
88 };
89 
90 typedef struct bio_connect_st {
91   int state;
92 
93   char *param_hostname;
94   char *param_port;
95   int nbio;
96 
97   unsigned short port;
98 
99   struct sockaddr_storage them;
100   socklen_t them_length;
101 
102   // the file descriptor is kept in bio->num in order to match the socket
103   // BIO.
104 
105   // info_callback is called when the connection is initially made
106   // callback(BIO,state,ret);  The callback should return 'ret', state is for
107   // compatibility with the SSL info_callback.
108   int (*info_callback)(const BIO *bio, int state, int ret);
109 } BIO_CONNECT;
110 
111 #if !defined(OPENSSL_WINDOWS)
closesocket(int sock)112 static int closesocket(int sock) {
113   return close(sock);
114 }
115 #endif
116 
117 // split_host_and_port sets |*out_host| and |*out_port| to the host and port
118 // parsed from |name|. It returns one on success or zero on error. Even when
119 // successful, |*out_port| may be NULL on return if no port was specified.
split_host_and_port(char ** out_host,char ** out_port,const char * name)120 static int split_host_and_port(char **out_host, char **out_port,
121                                const char *name) {
122   const char *host, *port = NULL;
123   size_t host_len = 0;
124 
125   *out_host = NULL;
126   *out_port = NULL;
127 
128   if (name[0] == '[') {  // bracketed IPv6 address
129     const char *close = strchr(name, ']');
130     if (close == NULL) {
131       return 0;
132     }
133     host = name + 1;
134     host_len = close - host;
135     if (close[1] == ':') {  // [IP]:port
136       port = close + 2;
137     } else if (close[1] != 0) {
138       return 0;
139     }
140   } else {
141     const char *colon = strchr(name, ':');
142     if (colon == NULL || strchr(colon + 1, ':') != NULL) {  // IPv6 address
143       host = name;
144       host_len = strlen(name);
145     } else {  // host:port
146       host = name;
147       host_len = colon - name;
148       port = colon + 1;
149     }
150   }
151 
152   *out_host = OPENSSL_strndup(host, host_len);
153   if (*out_host == NULL) {
154     return 0;
155   }
156   if (port == NULL) {
157     *out_port = NULL;
158     return 1;
159   }
160   *out_port = OPENSSL_strdup(port);
161   if (*out_port == NULL) {
162     OPENSSL_free(*out_host);
163     *out_host = NULL;
164     return 0;
165   }
166   return 1;
167 }
168 
conn_state(BIO * bio,BIO_CONNECT * c)169 static int conn_state(BIO *bio, BIO_CONNECT *c) {
170   int ret = -1, i;
171   int (*cb)(const BIO *, int, int) = NULL;
172 
173   if (c->info_callback != NULL) {
174     cb = c->info_callback;
175   }
176 
177   for (;;) {
178     switch (c->state) {
179       case BIO_CONN_S_BEFORE:
180         // If there's a hostname and a port, assume that both are
181         // exactly what they say. If there is only a hostname, try
182         // (just once) to split it into a hostname and port.
183 
184         if (c->param_hostname == NULL) {
185           OPENSSL_PUT_ERROR(BIO, BIO_R_NO_HOSTNAME_SPECIFIED);
186           goto exit_loop;
187         }
188 
189         if (c->param_port == NULL) {
190           char *host, *port;
191           if (!split_host_and_port(&host, &port, c->param_hostname) ||
192               port == NULL) {
193             OPENSSL_free(host);
194             OPENSSL_free(port);
195             OPENSSL_PUT_ERROR(BIO, BIO_R_NO_PORT_SPECIFIED);
196             ERR_add_error_data(2, "host=", c->param_hostname);
197             goto exit_loop;
198           }
199 
200           OPENSSL_free(c->param_port);
201           c->param_port = port;
202           OPENSSL_free(c->param_hostname);
203           c->param_hostname = host;
204         }
205 
206         if (!bio_ip_and_port_to_socket_and_addr(
207                 &bio->num, &c->them, &c->them_length, c->param_hostname,
208                 c->param_port)) {
209           OPENSSL_PUT_ERROR(BIO, BIO_R_UNABLE_TO_CREATE_SOCKET);
210           ERR_add_error_data(4, "host=", c->param_hostname, ":", c->param_port);
211           goto exit_loop;
212         }
213 
214         if (c->nbio) {
215           if (!bio_socket_nbio(bio->num, 1)) {
216             OPENSSL_PUT_ERROR(BIO, BIO_R_ERROR_SETTING_NBIO);
217             ERR_add_error_data(4, "host=", c->param_hostname, ":",
218                                c->param_port);
219             goto exit_loop;
220           }
221         }
222 
223         i = 1;
224         ret = setsockopt(bio->num, SOL_SOCKET, SO_KEEPALIVE, (char *)&i,
225                          sizeof(i));
226         if (ret < 0) {
227           OPENSSL_PUT_SYSTEM_ERROR();
228           OPENSSL_PUT_ERROR(BIO, BIO_R_KEEPALIVE);
229           ERR_add_error_data(4, "host=", c->param_hostname, ":", c->param_port);
230           goto exit_loop;
231         }
232 
233         BIO_clear_retry_flags(bio);
234         ret = connect(bio->num, (struct sockaddr*) &c->them, c->them_length);
235         if (ret < 0) {
236           if (bio_socket_should_retry(ret)) {
237             BIO_set_flags(bio, (BIO_FLAGS_IO_SPECIAL | BIO_FLAGS_SHOULD_RETRY));
238             c->state = BIO_CONN_S_BLOCKED_CONNECT;
239             bio->retry_reason = BIO_RR_CONNECT;
240           } else {
241             OPENSSL_PUT_SYSTEM_ERROR();
242             OPENSSL_PUT_ERROR(BIO, BIO_R_CONNECT_ERROR);
243             ERR_add_error_data(4, "host=", c->param_hostname, ":",
244                                c->param_port);
245           }
246           goto exit_loop;
247         } else {
248           c->state = BIO_CONN_S_OK;
249         }
250         break;
251 
252       case BIO_CONN_S_BLOCKED_CONNECT:
253         i = bio_sock_error(bio->num);
254         if (i) {
255           if (bio_socket_should_retry(ret)) {
256             BIO_set_flags(bio, (BIO_FLAGS_IO_SPECIAL | BIO_FLAGS_SHOULD_RETRY));
257             c->state = BIO_CONN_S_BLOCKED_CONNECT;
258             bio->retry_reason = BIO_RR_CONNECT;
259             ret = -1;
260           } else {
261             BIO_clear_retry_flags(bio);
262             OPENSSL_PUT_SYSTEM_ERROR();
263             OPENSSL_PUT_ERROR(BIO, BIO_R_NBIO_CONNECT_ERROR);
264             ERR_add_error_data(4, "host=", c->param_hostname, ":", c->param_port);
265             ret = 0;
266           }
267           goto exit_loop;
268         } else {
269           c->state = BIO_CONN_S_OK;
270         }
271         break;
272 
273       case BIO_CONN_S_OK:
274         ret = 1;
275         goto exit_loop;
276       default:
277         assert(0);
278         goto exit_loop;
279     }
280 
281     if (cb != NULL) {
282       ret = cb((BIO *)bio, c->state, ret);
283       if (ret == 0) {
284         goto end;
285       }
286     }
287   }
288 
289 exit_loop:
290   if (cb != NULL) {
291     ret = cb((BIO *)bio, c->state, ret);
292   }
293 
294 end:
295   return ret;
296 }
297 
BIO_CONNECT_new(void)298 static BIO_CONNECT *BIO_CONNECT_new(void) {
299   BIO_CONNECT *ret = OPENSSL_zalloc(sizeof(BIO_CONNECT));
300   if (ret == NULL) {
301     return NULL;
302   }
303   ret->state = BIO_CONN_S_BEFORE;
304   return ret;
305 }
306 
BIO_CONNECT_free(BIO_CONNECT * c)307 static void BIO_CONNECT_free(BIO_CONNECT *c) {
308   if (c == NULL) {
309     return;
310   }
311 
312   OPENSSL_free(c->param_hostname);
313   OPENSSL_free(c->param_port);
314   OPENSSL_free(c);
315 }
316 
conn_new(BIO * bio)317 static int conn_new(BIO *bio) {
318   bio->init = 0;
319   bio->num = -1;
320   bio->flags = 0;
321   bio->ptr = BIO_CONNECT_new();
322   return bio->ptr != NULL;
323 }
324 
conn_close_socket(BIO * bio)325 static void conn_close_socket(BIO *bio) {
326   BIO_CONNECT *c = (BIO_CONNECT *) bio->ptr;
327 
328   if (bio->num == -1) {
329     return;
330   }
331 
332   // Only do a shutdown if things were established
333   if (c->state == BIO_CONN_S_OK) {
334     shutdown(bio->num, 2);
335   }
336   closesocket(bio->num);
337   bio->num = -1;
338 }
339 
conn_free(BIO * bio)340 static int conn_free(BIO *bio) {
341   if (bio->shutdown) {
342     conn_close_socket(bio);
343   }
344 
345   BIO_CONNECT_free((BIO_CONNECT*) bio->ptr);
346 
347   return 1;
348 }
349 
conn_read(BIO * bio,char * out,int out_len)350 static int conn_read(BIO *bio, char *out, int out_len) {
351   int ret = 0;
352   BIO_CONNECT *data;
353 
354   data = (BIO_CONNECT *)bio->ptr;
355   if (data->state != BIO_CONN_S_OK) {
356     ret = conn_state(bio, data);
357     if (ret <= 0) {
358       return ret;
359     }
360   }
361 
362   bio_clear_socket_error();
363   ret = (int)recv(bio->num, out, out_len, 0);
364   BIO_clear_retry_flags(bio);
365   if (ret <= 0) {
366     if (bio_socket_should_retry(ret)) {
367       BIO_set_retry_read(bio);
368     }
369   }
370 
371   return ret;
372 }
373 
conn_write(BIO * bio,const char * in,int in_len)374 static int conn_write(BIO *bio, const char *in, int in_len) {
375   int ret;
376   BIO_CONNECT *data;
377 
378   data = (BIO_CONNECT *)bio->ptr;
379   if (data->state != BIO_CONN_S_OK) {
380     ret = conn_state(bio, data);
381     if (ret <= 0) {
382       return ret;
383     }
384   }
385 
386   bio_clear_socket_error();
387   ret = (int)send(bio->num, in, in_len, 0);
388   BIO_clear_retry_flags(bio);
389   if (ret <= 0) {
390     if (bio_socket_should_retry(ret)) {
391       BIO_set_retry_write(bio);
392     }
393   }
394 
395   return ret;
396 }
397 
conn_ctrl(BIO * bio,int cmd,long num,void * ptr)398 static long conn_ctrl(BIO *bio, int cmd, long num, void *ptr) {
399   int *ip;
400   long ret = 1;
401   BIO_CONNECT *data;
402 
403   data = (BIO_CONNECT *)bio->ptr;
404 
405   switch (cmd) {
406     case BIO_CTRL_RESET:
407       ret = 0;
408       data->state = BIO_CONN_S_BEFORE;
409       conn_close_socket(bio);
410       bio->flags = 0;
411       break;
412     case BIO_C_DO_STATE_MACHINE:
413       // use this one to start the connection
414       if (data->state != BIO_CONN_S_OK) {
415         ret = (long)conn_state(bio, data);
416       } else {
417         ret = 1;
418       }
419       break;
420     case BIO_C_SET_CONNECT:
421       if (ptr != NULL) {
422         bio->init = 1;
423         if (num == 0) {
424           OPENSSL_free(data->param_hostname);
425           data->param_hostname = OPENSSL_strdup(ptr);
426           if (data->param_hostname == NULL) {
427             ret = 0;
428           }
429         } else if (num == 1) {
430           OPENSSL_free(data->param_port);
431           data->param_port = OPENSSL_strdup(ptr);
432           if (data->param_port == NULL) {
433             ret = 0;
434           }
435         } else {
436           ret = 0;
437         }
438       }
439       break;
440     case BIO_C_SET_NBIO:
441       data->nbio = (int)num;
442       break;
443     case BIO_C_GET_FD:
444       if (bio->init) {
445         ip = (int *)ptr;
446         if (ip != NULL) {
447           *ip = bio->num;
448         }
449         ret = bio->num;
450       } else {
451         ret = -1;
452       }
453       break;
454     case BIO_CTRL_GET_CLOSE:
455       ret = bio->shutdown;
456       break;
457     case BIO_CTRL_SET_CLOSE:
458       bio->shutdown = (int)num;
459       break;
460     case BIO_CTRL_PENDING:
461     case BIO_CTRL_WPENDING:
462       ret = 0;
463       break;
464     case BIO_CTRL_FLUSH:
465       break;
466     case BIO_CTRL_GET_CALLBACK: {
467       int (**fptr)(const BIO *bio, int state, int xret) = ptr;
468       *fptr = data->info_callback;
469     } break;
470     default:
471       ret = 0;
472       break;
473   }
474   return ret;
475 }
476 
conn_callback_ctrl(BIO * bio,int cmd,bio_info_cb fp)477 static long conn_callback_ctrl(BIO *bio, int cmd, bio_info_cb fp) {
478   long ret = 1;
479   BIO_CONNECT *data;
480 
481   data = (BIO_CONNECT *)bio->ptr;
482 
483   switch (cmd) {
484     case BIO_CTRL_SET_CALLBACK:
485       // This is the actual type signature of |fp|. The caller is expected to
486       // cast it to |bio_info_cb| due to the |BIO_callback_ctrl| calling
487       // convention.
488       OPENSSL_MSVC_PRAGMA(warning(push))
489       OPENSSL_MSVC_PRAGMA(warning(disable : 4191))
490       OPENSSL_CLANG_PRAGMA("clang diagnostic push")
491       OPENSSL_CLANG_PRAGMA("clang diagnostic ignored \"-Wunknown-warning-option\"")
492       OPENSSL_CLANG_PRAGMA("clang diagnostic ignored \"-Wcast-function-type\"")
493       data->info_callback = (int (*)(const struct bio_st *, int, int))fp;
494       OPENSSL_CLANG_PRAGMA("clang diagnostic pop")
495       OPENSSL_MSVC_PRAGMA(warning(pop))
496       break;
497     default:
498       ret = 0;
499       break;
500   }
501   return ret;
502 }
503 
BIO_new_connect(const char * hostname)504 BIO *BIO_new_connect(const char *hostname) {
505   BIO *ret;
506 
507   ret = BIO_new(BIO_s_connect());
508   if (ret == NULL) {
509     return NULL;
510   }
511   if (!BIO_set_conn_hostname(ret, hostname)) {
512     BIO_free(ret);
513     return NULL;
514   }
515   return ret;
516 }
517 
518 static const BIO_METHOD methods_connectp = {
519     BIO_TYPE_CONNECT, "socket connect",   conn_write, conn_read,
520     NULL /* puts */,  NULL /* gets */,    conn_ctrl,  conn_new,
521     conn_free,        conn_callback_ctrl,
522 };
523 
BIO_s_connect(void)524 const BIO_METHOD *BIO_s_connect(void) { return &methods_connectp; }
525 
BIO_set_conn_hostname(BIO * bio,const char * name)526 int BIO_set_conn_hostname(BIO *bio, const char *name) {
527   return (int)BIO_ctrl(bio, BIO_C_SET_CONNECT, 0, (void*) name);
528 }
529 
BIO_set_conn_port(BIO * bio,const char * port_str)530 int BIO_set_conn_port(BIO *bio, const char *port_str) {
531   return (int)BIO_ctrl(bio, BIO_C_SET_CONNECT, 1, (void*) port_str);
532 }
533 
BIO_set_conn_int_port(BIO * bio,const int * port)534 int BIO_set_conn_int_port(BIO *bio, const int *port) {
535   char buf[DECIMAL_SIZE(int) + 1];
536   snprintf(buf, sizeof(buf), "%d", *port);
537   return BIO_set_conn_port(bio, buf);
538 }
539 
BIO_set_nbio(BIO * bio,int on)540 int BIO_set_nbio(BIO *bio, int on) {
541   return (int)BIO_ctrl(bio, BIO_C_SET_NBIO, on, NULL);
542 }
543 
BIO_do_connect(BIO * bio)544 int BIO_do_connect(BIO *bio) {
545   return (int)BIO_ctrl(bio, BIO_C_DO_STATE_MACHINE, 0, NULL);
546 }
547 
548 #endif  // OPENSSL_NO_SOCK
549