1*ecc472a0Sbeck /* $OpenBSD: bss_bio.c,v 1.29 2024/07/09 06:14:59 beck Exp $ */
2cdc51833Smarkus /* ====================================================================
3cdc51833Smarkus * Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved.
4cdc51833Smarkus *
5cdc51833Smarkus * Redistribution and use in source and binary forms, with or without
6cdc51833Smarkus * modification, are permitted provided that the following conditions
7cdc51833Smarkus * are met:
8cdc51833Smarkus *
9cdc51833Smarkus * 1. Redistributions of source code must retain the above copyright
10cdc51833Smarkus * notice, this list of conditions and the following disclaimer.
11cdc51833Smarkus *
12cdc51833Smarkus * 2. Redistributions in binary form must reproduce the above copyright
13cdc51833Smarkus * notice, this list of conditions and the following disclaimer in
14cdc51833Smarkus * the documentation and/or other materials provided with the
15cdc51833Smarkus * distribution.
16cdc51833Smarkus *
17cdc51833Smarkus * 3. All advertising materials mentioning features or use of this
18cdc51833Smarkus * software must display the following acknowledgment:
19cdc51833Smarkus * "This product includes software developed by the OpenSSL Project
20cdc51833Smarkus * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
21cdc51833Smarkus *
22cdc51833Smarkus * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
23cdc51833Smarkus * endorse or promote products derived from this software without
24cdc51833Smarkus * prior written permission. For written permission, please contact
25cdc51833Smarkus * openssl-core@openssl.org.
26cdc51833Smarkus *
27cdc51833Smarkus * 5. Products derived from this software may not be called "OpenSSL"
28cdc51833Smarkus * nor may "OpenSSL" appear in their names without prior written
29cdc51833Smarkus * permission of the OpenSSL Project.
30cdc51833Smarkus *
31cdc51833Smarkus * 6. Redistributions of any form whatsoever must retain the following
32cdc51833Smarkus * acknowledgment:
33cdc51833Smarkus * "This product includes software developed by the OpenSSL Project
34cdc51833Smarkus * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
35cdc51833Smarkus *
36cdc51833Smarkus * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
37cdc51833Smarkus * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
38cdc51833Smarkus * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
39cdc51833Smarkus * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
40cdc51833Smarkus * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
41cdc51833Smarkus * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
42cdc51833Smarkus * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
43cdc51833Smarkus * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
44cdc51833Smarkus * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
45cdc51833Smarkus * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
46cdc51833Smarkus * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
47cdc51833Smarkus * OF THE POSSIBILITY OF SUCH DAMAGE.
48cdc51833Smarkus * ====================================================================
49cdc51833Smarkus *
50cdc51833Smarkus * This product includes cryptographic software written by Eric Young
51cdc51833Smarkus * (eay@cryptsoft.com). This product includes software written by Tim
52cdc51833Smarkus * Hudson (tjh@cryptsoft.com).
53cdc51833Smarkus *
54cdc51833Smarkus */
55913ec974Sbeck
56913ec974Sbeck /* Special method for a BIO where the other endpoint is also a BIO
57913ec974Sbeck * of this kind, handled by the same thread (i.e. the "peer" is actually
58913ec974Sbeck * ourselves, wearing a different hat).
59913ec974Sbeck * Such "BIO pairs" are mainly for using the SSL library with I/O interfaces
60913ec974Sbeck * for which no specific BIO method is available.
61913ec974Sbeck * See ssl/ssltest.c for some hints on how this can be used. */
62913ec974Sbeck
636355d6d8Sbeck /* BIO_DEBUG implies BIO_PAIR_DEBUG */
646355d6d8Sbeck #ifdef BIO_DEBUG
65913ec974Sbeck # ifndef BIO_PAIR_DEBUG
666355d6d8Sbeck # define BIO_PAIR_DEBUG
676355d6d8Sbeck # endif
686355d6d8Sbeck #endif
696355d6d8Sbeck
706355d6d8Sbeck /* disable assert() unless BIO_PAIR_DEBUG has been defined */
716355d6d8Sbeck #ifndef BIO_PAIR_DEBUG
726355d6d8Sbeck # ifndef NDEBUG
73913ec974Sbeck # define NDEBUG
74913ec974Sbeck # endif
756355d6d8Sbeck #endif
76913ec974Sbeck
77913ec974Sbeck #include <assert.h>
78ba5406e9Sbeck #include <limits.h>
79913ec974Sbeck #include <stdlib.h>
80913ec974Sbeck #include <string.h>
817df9a849Smiod #include <sys/types.h>
82913ec974Sbeck
83913ec974Sbeck #include <openssl/bio.h>
84913ec974Sbeck #include <openssl/err.h>
85913ec974Sbeck #include <openssl/crypto.h>
86913ec974Sbeck
8794b1984eStb #include "bio_local.h"
8894b1984eStb
89913ec974Sbeck static int bio_new(BIO *bio);
90913ec974Sbeck static int bio_free(BIO *bio);
91913ec974Sbeck static int bio_read(BIO *bio, char *buf, int size);
92c109e398Sbeck static int bio_write(BIO *bio, const char *buf, int num);
93913ec974Sbeck static long bio_ctrl(BIO *bio, int cmd, long num, void *ptr);
94c109e398Sbeck static int bio_puts(BIO *bio, const char *str);
95913ec974Sbeck
96913ec974Sbeck static int bio_make_pair(BIO *bio1, BIO *bio2);
97913ec974Sbeck static void bio_destroy_pair(BIO *bio);
98913ec974Sbeck
996dc76777Stb static const BIO_METHOD methods_biop = {
100e402ce74Smiod .type = BIO_TYPE_BIO,
101e402ce74Smiod .name = "BIO pair",
102e402ce74Smiod .bwrite = bio_write,
103e402ce74Smiod .bread = bio_read,
104e402ce74Smiod .bputs = bio_puts,
105e402ce74Smiod .ctrl = bio_ctrl,
106e402ce74Smiod .create = bio_new,
107e402ce74Smiod .destroy = bio_free
108913ec974Sbeck };
109913ec974Sbeck
1106dc76777Stb const BIO_METHOD *
BIO_s_bio(void)111ae7f143bSderaadt BIO_s_bio(void)
112913ec974Sbeck {
113913ec974Sbeck return &methods_biop;
114913ec974Sbeck }
115acf64401Sbeck LCRYPTO_ALIAS(BIO_s_bio);
116913ec974Sbeck
117c3d505beSjsing struct bio_bio_st {
118913ec974Sbeck BIO *peer; /* NULL if buf == NULL.
119913ec974Sbeck * If peer != NULL, then peer->ptr is also a bio_bio_st,
120913ec974Sbeck * and its "peer" member points back to us.
121913ec974Sbeck * peer != NULL iff init != 0 in the BIO. */
122913ec974Sbeck
123913ec974Sbeck /* This is for what we write (i.e. reading uses peer's struct): */
124913ec974Sbeck int closed; /* valid iff peer != NULL */
125913ec974Sbeck size_t len; /* valid iff buf != NULL; 0 if peer == NULL */
126913ec974Sbeck size_t offset; /* valid iff buf != NULL; 0 if len == 0 */
127913ec974Sbeck size_t size;
128913ec974Sbeck char *buf; /* "size" elements (if != NULL) */
129913ec974Sbeck
130913ec974Sbeck size_t request; /* valid iff peer != NULL; 0 if len != 0,
131913ec974Sbeck * otherwise set by peer to number of bytes
132ba5406e9Sbeck * it (unsuccessfully) tried to read,
133913ec974Sbeck * never more than buffer space (size-len) warrants. */
134913ec974Sbeck };
135913ec974Sbeck
136c3d505beSjsing static int
bio_new(BIO * bio)137c3d505beSjsing bio_new(BIO *bio)
138913ec974Sbeck {
139913ec974Sbeck struct bio_bio_st *b;
140913ec974Sbeck
1416f3a6cb1Sbeck b = malloc(sizeof *b);
142913ec974Sbeck if (b == NULL)
143913ec974Sbeck return 0;
144913ec974Sbeck
145913ec974Sbeck b->peer = NULL;
146913ec974Sbeck b->size = 17 * 1024; /* enough for one TLS record (just a default) */
147913ec974Sbeck b->buf = NULL;
148913ec974Sbeck
149913ec974Sbeck bio->ptr = b;
150913ec974Sbeck return 1;
151913ec974Sbeck }
152913ec974Sbeck
153c3d505beSjsing static int
bio_free(BIO * bio)154c3d505beSjsing bio_free(BIO *bio)
155913ec974Sbeck {
156913ec974Sbeck struct bio_bio_st *b;
157913ec974Sbeck
158913ec974Sbeck if (bio == NULL)
159913ec974Sbeck return 0;
160913ec974Sbeck b = bio->ptr;
161913ec974Sbeck
162913ec974Sbeck assert(b != NULL);
163913ec974Sbeck
164913ec974Sbeck if (b->peer)
165913ec974Sbeck bio_destroy_pair(bio);
166913ec974Sbeck
1676f3a6cb1Sbeck free(b->buf);
1686f3a6cb1Sbeck free(b);
169913ec974Sbeck return 1;
170913ec974Sbeck }
171913ec974Sbeck
172913ec974Sbeck
173913ec974Sbeck
174c3d505beSjsing static int
bio_read(BIO * bio,char * buf,int size_)175c3d505beSjsing bio_read(BIO *bio, char *buf, int size_)
176913ec974Sbeck {
177913ec974Sbeck size_t size = size_;
178913ec974Sbeck size_t rest;
179913ec974Sbeck struct bio_bio_st *b, *peer_b;
180913ec974Sbeck
181913ec974Sbeck BIO_clear_retry_flags(bio);
182913ec974Sbeck
183913ec974Sbeck if (!bio->init)
184913ec974Sbeck return 0;
185913ec974Sbeck
186913ec974Sbeck b = bio->ptr;
187913ec974Sbeck assert(b != NULL);
188913ec974Sbeck assert(b->peer != NULL);
189913ec974Sbeck peer_b = b->peer->ptr;
190913ec974Sbeck assert(peer_b != NULL);
191913ec974Sbeck assert(peer_b->buf != NULL);
192913ec974Sbeck
193913ec974Sbeck peer_b->request = 0; /* will be set in "retry_read" situation */
194913ec974Sbeck
195913ec974Sbeck if (buf == NULL || size == 0)
196913ec974Sbeck return 0;
197913ec974Sbeck
198c3d505beSjsing if (peer_b->len == 0) {
199913ec974Sbeck if (peer_b->closed)
200913ec974Sbeck return 0; /* writer has closed, and no data is left */
201c3d505beSjsing else {
202913ec974Sbeck BIO_set_retry_read(bio); /* buffer is empty */
203913ec974Sbeck if (size <= peer_b->size)
204913ec974Sbeck peer_b->request = size;
205913ec974Sbeck else
206913ec974Sbeck /* don't ask for more than the peer can
207913ec974Sbeck * deliver in one write */
208913ec974Sbeck peer_b->request = peer_b->size;
209913ec974Sbeck return -1;
210913ec974Sbeck }
211913ec974Sbeck }
212913ec974Sbeck
213913ec974Sbeck /* we can read */
214913ec974Sbeck if (peer_b->len < size)
215913ec974Sbeck size = peer_b->len;
216913ec974Sbeck
217913ec974Sbeck /* now read "size" bytes */
218913ec974Sbeck
219913ec974Sbeck rest = size;
220913ec974Sbeck
221913ec974Sbeck assert(rest > 0);
222913ec974Sbeck do /* one or two iterations */
223913ec974Sbeck {
224913ec974Sbeck size_t chunk;
225913ec974Sbeck
226913ec974Sbeck assert(rest <= peer_b->len);
227913ec974Sbeck if (peer_b->offset + rest <= peer_b->size)
228913ec974Sbeck chunk = rest;
229913ec974Sbeck else
230913ec974Sbeck /* wrap around ring buffer */
231913ec974Sbeck chunk = peer_b->size - peer_b->offset;
232913ec974Sbeck assert(peer_b->offset + chunk <= peer_b->size);
233913ec974Sbeck
234913ec974Sbeck memcpy(buf, peer_b->buf + peer_b->offset, chunk);
235913ec974Sbeck
236913ec974Sbeck peer_b->len -= chunk;
237c3d505beSjsing if (peer_b->len) {
238913ec974Sbeck peer_b->offset += chunk;
239913ec974Sbeck assert(peer_b->offset <= peer_b->size);
240913ec974Sbeck if (peer_b->offset == peer_b->size)
241913ec974Sbeck peer_b->offset = 0;
242913ec974Sbeck buf += chunk;
243c3d505beSjsing } else {
244913ec974Sbeck /* buffer now empty, no need to advance "buf" */
245913ec974Sbeck assert(chunk == rest);
246913ec974Sbeck peer_b->offset = 0;
247913ec974Sbeck }
248913ec974Sbeck rest -= chunk;
249c3d505beSjsing } while (rest);
250913ec974Sbeck
251913ec974Sbeck return size;
252913ec974Sbeck }
253913ec974Sbeck
254c3d505beSjsing static int
bio_write(BIO * bio,const char * buf,int num_)255c3d505beSjsing bio_write(BIO *bio, const char *buf, int num_)
256913ec974Sbeck {
257913ec974Sbeck size_t num = num_;
258913ec974Sbeck size_t rest;
259913ec974Sbeck struct bio_bio_st *b;
260913ec974Sbeck
261913ec974Sbeck BIO_clear_retry_flags(bio);
262913ec974Sbeck
263913ec974Sbeck if (!bio->init || buf == NULL || num == 0)
264913ec974Sbeck return 0;
265913ec974Sbeck
266913ec974Sbeck b = bio->ptr;
267c3d505beSjsing
268913ec974Sbeck assert(b != NULL);
269913ec974Sbeck assert(b->peer != NULL);
270913ec974Sbeck assert(b->buf != NULL);
271913ec974Sbeck
272913ec974Sbeck b->request = 0;
273c3d505beSjsing if (b->closed) {
274913ec974Sbeck /* we already closed */
2755067ae9fSbeck BIOerror(BIO_R_BROKEN_PIPE);
276913ec974Sbeck return -1;
277913ec974Sbeck }
278913ec974Sbeck
279913ec974Sbeck assert(b->len <= b->size);
280913ec974Sbeck
281c3d505beSjsing if (b->len == b->size) {
282913ec974Sbeck BIO_set_retry_write(bio); /* buffer is full */
283913ec974Sbeck return -1;
284913ec974Sbeck }
285913ec974Sbeck
286913ec974Sbeck /* we can write */
287913ec974Sbeck if (num > b->size - b->len)
288913ec974Sbeck num = b->size - b->len;
289913ec974Sbeck
290913ec974Sbeck /* now write "num" bytes */
291913ec974Sbeck
292913ec974Sbeck rest = num;
293913ec974Sbeck
294913ec974Sbeck assert(rest > 0);
295913ec974Sbeck do /* one or two iterations */
296913ec974Sbeck {
297913ec974Sbeck size_t write_offset;
298913ec974Sbeck size_t chunk;
299913ec974Sbeck
300913ec974Sbeck assert(b->len + rest <= b->size);
301913ec974Sbeck
302913ec974Sbeck write_offset = b->offset + b->len;
303913ec974Sbeck if (write_offset >= b->size)
304913ec974Sbeck write_offset -= b->size;
305913ec974Sbeck /* b->buf[write_offset] is the first byte we can write to. */
306913ec974Sbeck
307913ec974Sbeck if (write_offset + rest <= b->size)
308913ec974Sbeck chunk = rest;
309913ec974Sbeck else
310913ec974Sbeck /* wrap around ring buffer */
311913ec974Sbeck chunk = b->size - write_offset;
312913ec974Sbeck
313913ec974Sbeck memcpy(b->buf + write_offset, buf, chunk);
314913ec974Sbeck
315913ec974Sbeck b->len += chunk;
316913ec974Sbeck
317913ec974Sbeck assert(b->len <= b->size);
318913ec974Sbeck
319913ec974Sbeck rest -= chunk;
320913ec974Sbeck buf += chunk;
321c3d505beSjsing } while (rest);
322913ec974Sbeck
323913ec974Sbeck return num;
324913ec974Sbeck }
325913ec974Sbeck
326c3d505beSjsing static long
bio_ctrl(BIO * bio,int cmd,long num,void * ptr)327c3d505beSjsing bio_ctrl(BIO *bio, int cmd, long num, void *ptr)
328913ec974Sbeck {
329913ec974Sbeck long ret;
330913ec974Sbeck struct bio_bio_st *b = bio->ptr;
331913ec974Sbeck
332913ec974Sbeck assert(b != NULL);
333913ec974Sbeck
334c3d505beSjsing switch (cmd) {
335913ec974Sbeck /* specific CTRL codes */
336913ec974Sbeck
337913ec974Sbeck case BIO_C_SET_WRITE_BUF_SIZE:
338c3d505beSjsing if (b->peer) {
3395067ae9fSbeck BIOerror(BIO_R_IN_USE);
340913ec974Sbeck ret = 0;
341c3d505beSjsing } else if (num == 0) {
3425067ae9fSbeck BIOerror(BIO_R_INVALID_ARGUMENT);
343913ec974Sbeck ret = 0;
344c3d505beSjsing } else {
345913ec974Sbeck size_t new_size = num;
346913ec974Sbeck
347c3d505beSjsing if (b->size != new_size) {
3486f3a6cb1Sbeck free(b->buf);
349913ec974Sbeck b->buf = NULL;
350913ec974Sbeck b->size = new_size;
351913ec974Sbeck }
352913ec974Sbeck ret = 1;
353913ec974Sbeck }
354913ec974Sbeck break;
355913ec974Sbeck
356913ec974Sbeck case BIO_C_GET_WRITE_BUF_SIZE:
357da347917Sbeck ret = (long) b->size;
358da347917Sbeck break;
359913ec974Sbeck
360913ec974Sbeck case BIO_C_MAKE_BIO_PAIR:
361913ec974Sbeck {
362913ec974Sbeck BIO *other_bio = ptr;
363913ec974Sbeck
364913ec974Sbeck if (bio_make_pair(bio, other_bio))
365913ec974Sbeck ret = 1;
366913ec974Sbeck else
367913ec974Sbeck ret = 0;
368913ec974Sbeck }
369913ec974Sbeck break;
370913ec974Sbeck
371913ec974Sbeck case BIO_C_DESTROY_BIO_PAIR:
372cdc51833Smarkus /* Affects both BIOs in the pair -- call just once!
373913ec974Sbeck * Or let BIO_free(bio1); BIO_free(bio2); do the job. */
374913ec974Sbeck bio_destroy_pair(bio);
375913ec974Sbeck ret = 1;
376913ec974Sbeck break;
377913ec974Sbeck
378913ec974Sbeck case BIO_C_GET_WRITE_GUARANTEE:
379913ec974Sbeck /* How many bytes can the caller feed to the next write
380ba5406e9Sbeck * without having to keep any? */
381913ec974Sbeck if (b->peer == NULL || b->closed)
382913ec974Sbeck ret = 0;
383913ec974Sbeck else
384913ec974Sbeck ret = (long) b->size - b->len;
385913ec974Sbeck break;
386913ec974Sbeck
387913ec974Sbeck case BIO_C_GET_READ_REQUEST:
388ba5406e9Sbeck /* If the peer unsuccessfully tried to read, how many bytes
389913ec974Sbeck * were requested? (As with BIO_CTRL_PENDING, that number
390913ec974Sbeck * can usually be treated as boolean.) */
391913ec974Sbeck ret = (long) b->request;
392913ec974Sbeck break;
393913ec974Sbeck
394ba5406e9Sbeck case BIO_C_RESET_READ_REQUEST:
395ba5406e9Sbeck /* Reset request. (Can be useful after read attempts
396ba5406e9Sbeck * at the other side that are meant to be non-blocking,
397ba5406e9Sbeck * e.g. when probing SSL_read to see if any data is
398ba5406e9Sbeck * available.) */
399ba5406e9Sbeck b->request = 0;
400ba5406e9Sbeck ret = 1;
401ba5406e9Sbeck break;
402ba5406e9Sbeck
403913ec974Sbeck case BIO_C_SHUTDOWN_WR:
404913ec974Sbeck /* similar to shutdown(..., SHUT_WR) */
405913ec974Sbeck b->closed = 1;
406913ec974Sbeck ret = 1;
407913ec974Sbeck break;
408913ec974Sbeck
409913ec974Sbeck /* standard CTRL codes follow */
410913ec974Sbeck
411913ec974Sbeck case BIO_CTRL_RESET:
412c3d505beSjsing if (b->buf != NULL) {
413913ec974Sbeck b->len = 0;
414913ec974Sbeck b->offset = 0;
415913ec974Sbeck }
416913ec974Sbeck ret = 0;
417913ec974Sbeck break;
418913ec974Sbeck
419c3d505beSjsing
420913ec974Sbeck case BIO_CTRL_GET_CLOSE:
421913ec974Sbeck ret = bio->shutdown;
422913ec974Sbeck break;
423913ec974Sbeck
424913ec974Sbeck case BIO_CTRL_SET_CLOSE:
425913ec974Sbeck bio->shutdown = (int) num;
426913ec974Sbeck ret = 1;
427913ec974Sbeck break;
428913ec974Sbeck
429913ec974Sbeck case BIO_CTRL_PENDING:
430c3d505beSjsing if (b->peer != NULL) {
431913ec974Sbeck struct bio_bio_st *peer_b = b->peer->ptr;
432913ec974Sbeck
433913ec974Sbeck ret = (long) peer_b->len;
434c3d505beSjsing } else
435913ec974Sbeck ret = 0;
436913ec974Sbeck break;
437913ec974Sbeck
438913ec974Sbeck case BIO_CTRL_WPENDING:
439913ec974Sbeck if (b->buf != NULL)
440913ec974Sbeck ret = (long) b->len;
441913ec974Sbeck else
442913ec974Sbeck ret = 0;
443913ec974Sbeck break;
444913ec974Sbeck
445913ec974Sbeck case BIO_CTRL_DUP:
446913ec974Sbeck /* See BIO_dup_chain for circumstances we have to expect. */
447913ec974Sbeck {
448913ec974Sbeck BIO *other_bio = ptr;
449913ec974Sbeck struct bio_bio_st *other_b;
450913ec974Sbeck
451913ec974Sbeck assert(other_bio != NULL);
452913ec974Sbeck other_b = other_bio->ptr;
453913ec974Sbeck assert(other_b != NULL);
454913ec974Sbeck
455913ec974Sbeck assert(other_b->buf == NULL); /* other_bio is always fresh */
456913ec974Sbeck
457913ec974Sbeck other_b->size = b->size;
458913ec974Sbeck }
459913ec974Sbeck
460913ec974Sbeck ret = 1;
461913ec974Sbeck break;
462913ec974Sbeck
463913ec974Sbeck case BIO_CTRL_FLUSH:
464913ec974Sbeck ret = 1;
465913ec974Sbeck break;
466913ec974Sbeck
467913ec974Sbeck case BIO_CTRL_EOF:
468913ec974Sbeck {
469913ec974Sbeck BIO *other_bio = ptr;
470913ec974Sbeck
471c3d505beSjsing if (other_bio) {
472913ec974Sbeck struct bio_bio_st *other_b = other_bio->ptr;
473913ec974Sbeck
474913ec974Sbeck assert(other_b != NULL);
475913ec974Sbeck ret = other_b->len == 0 && other_b->closed;
476c3d505beSjsing } else
477913ec974Sbeck ret = 1;
478913ec974Sbeck }
479913ec974Sbeck break;
480913ec974Sbeck
481913ec974Sbeck default:
482913ec974Sbeck ret = 0;
483913ec974Sbeck }
484913ec974Sbeck return ret;
485913ec974Sbeck }
486913ec974Sbeck
487c3d505beSjsing static int
bio_puts(BIO * bio,const char * str)488c3d505beSjsing bio_puts(BIO *bio, const char *str)
489913ec974Sbeck {
490913ec974Sbeck return bio_write(bio, str, strlen(str));
491913ec974Sbeck }
492913ec974Sbeck
493913ec974Sbeck
494c3d505beSjsing static int
bio_make_pair(BIO * bio1,BIO * bio2)495c3d505beSjsing bio_make_pair(BIO *bio1, BIO *bio2)
496913ec974Sbeck {
497913ec974Sbeck struct bio_bio_st *b1, *b2;
498913ec974Sbeck
499913ec974Sbeck assert(bio1 != NULL);
500913ec974Sbeck assert(bio2 != NULL);
501913ec974Sbeck
502913ec974Sbeck b1 = bio1->ptr;
503913ec974Sbeck b2 = bio2->ptr;
504913ec974Sbeck
505c3d505beSjsing if (b1->peer != NULL || b2->peer != NULL) {
5065067ae9fSbeck BIOerror(BIO_R_IN_USE);
507913ec974Sbeck return 0;
508913ec974Sbeck }
509913ec974Sbeck
510c3d505beSjsing if (b1->buf == NULL) {
5116f3a6cb1Sbeck b1->buf = malloc(b1->size);
512c3d505beSjsing if (b1->buf == NULL) {
5135067ae9fSbeck BIOerror(ERR_R_MALLOC_FAILURE);
514913ec974Sbeck return 0;
515913ec974Sbeck }
516913ec974Sbeck b1->len = 0;
517913ec974Sbeck b1->offset = 0;
518913ec974Sbeck }
519913ec974Sbeck
520c3d505beSjsing if (b2->buf == NULL) {
5216f3a6cb1Sbeck b2->buf = malloc(b2->size);
522c3d505beSjsing if (b2->buf == NULL) {
5235067ae9fSbeck BIOerror(ERR_R_MALLOC_FAILURE);
524913ec974Sbeck return 0;
525913ec974Sbeck }
526913ec974Sbeck b2->len = 0;
527913ec974Sbeck b2->offset = 0;
528913ec974Sbeck }
529913ec974Sbeck
530913ec974Sbeck b1->peer = bio2;
531913ec974Sbeck b1->closed = 0;
532913ec974Sbeck b1->request = 0;
533913ec974Sbeck b2->peer = bio1;
534913ec974Sbeck b2->closed = 0;
535913ec974Sbeck b2->request = 0;
536913ec974Sbeck
537913ec974Sbeck bio1->init = 1;
538913ec974Sbeck bio2->init = 1;
539913ec974Sbeck
540913ec974Sbeck return 1;
541913ec974Sbeck }
542913ec974Sbeck
543c3d505beSjsing static void
bio_destroy_pair(BIO * bio)544c3d505beSjsing bio_destroy_pair(BIO *bio)
545913ec974Sbeck {
546913ec974Sbeck struct bio_bio_st *b = bio->ptr;
547913ec974Sbeck
548c3d505beSjsing if (b != NULL) {
549913ec974Sbeck BIO *peer_bio = b->peer;
550913ec974Sbeck
551c3d505beSjsing if (peer_bio != NULL) {
552913ec974Sbeck struct bio_bio_st *peer_b = peer_bio->ptr;
553913ec974Sbeck
554913ec974Sbeck assert(peer_b != NULL);
555913ec974Sbeck assert(peer_b->peer == bio);
556913ec974Sbeck
557913ec974Sbeck peer_b->peer = NULL;
558913ec974Sbeck peer_bio->init = 0;
559913ec974Sbeck assert(peer_b->buf != NULL);
560913ec974Sbeck peer_b->len = 0;
561913ec974Sbeck peer_b->offset = 0;
562913ec974Sbeck
563913ec974Sbeck b->peer = NULL;
564913ec974Sbeck bio->init = 0;
565913ec974Sbeck assert(b->buf != NULL);
566913ec974Sbeck b->len = 0;
567913ec974Sbeck b->offset = 0;
568913ec974Sbeck }
569913ec974Sbeck }
570913ec974Sbeck }
571913ec974Sbeck
572913ec974Sbeck
573913ec974Sbeck /* Exported convenience functions */
574c3d505beSjsing int
BIO_new_bio_pair(BIO ** bio1_p,size_t writebuf1,BIO ** bio2_p,size_t writebuf2)575c3d505beSjsing BIO_new_bio_pair(BIO **bio1_p, size_t writebuf1, BIO **bio2_p, size_t writebuf2)
576913ec974Sbeck {
577913ec974Sbeck BIO *bio1 = NULL, *bio2 = NULL;
578913ec974Sbeck long r;
579913ec974Sbeck int ret = 0;
580913ec974Sbeck
581913ec974Sbeck bio1 = BIO_new(BIO_s_bio());
582913ec974Sbeck if (bio1 == NULL)
583913ec974Sbeck goto err;
584913ec974Sbeck bio2 = BIO_new(BIO_s_bio());
585913ec974Sbeck if (bio2 == NULL)
586913ec974Sbeck goto err;
587913ec974Sbeck
588c3d505beSjsing if (writebuf1) {
589913ec974Sbeck r = BIO_set_write_buf_size(bio1, writebuf1);
590913ec974Sbeck if (!r)
591913ec974Sbeck goto err;
592913ec974Sbeck }
593c3d505beSjsing if (writebuf2) {
594913ec974Sbeck r = BIO_set_write_buf_size(bio2, writebuf2);
595913ec974Sbeck if (!r)
596913ec974Sbeck goto err;
597913ec974Sbeck }
598913ec974Sbeck
599913ec974Sbeck r = BIO_make_bio_pair(bio1, bio2);
600913ec974Sbeck if (!r)
601913ec974Sbeck goto err;
602913ec974Sbeck ret = 1;
603913ec974Sbeck
604913ec974Sbeck err:
605c3d505beSjsing if (ret == 0) {
606c3d505beSjsing if (bio1) {
607913ec974Sbeck BIO_free(bio1);
608913ec974Sbeck bio1 = NULL;
609913ec974Sbeck }
610c3d505beSjsing if (bio2) {
611913ec974Sbeck BIO_free(bio2);
612913ec974Sbeck bio2 = NULL;
613913ec974Sbeck }
614913ec974Sbeck }
615913ec974Sbeck
616913ec974Sbeck *bio1_p = bio1;
617913ec974Sbeck *bio2_p = bio2;
618913ec974Sbeck return ret;
619913ec974Sbeck }
620*ecc472a0Sbeck LCRYPTO_ALIAS(BIO_new_bio_pair);
621913ec974Sbeck
622c3d505beSjsing size_t
BIO_ctrl_get_write_guarantee(BIO * bio)623c3d505beSjsing BIO_ctrl_get_write_guarantee(BIO *bio)
624913ec974Sbeck {
625913ec974Sbeck return BIO_ctrl(bio, BIO_C_GET_WRITE_GUARANTEE, 0, NULL);
626913ec974Sbeck }
627acf64401Sbeck LCRYPTO_ALIAS(BIO_ctrl_get_write_guarantee);
628913ec974Sbeck
629c3d505beSjsing size_t
BIO_ctrl_get_read_request(BIO * bio)630c3d505beSjsing BIO_ctrl_get_read_request(BIO *bio)
631913ec974Sbeck {
632913ec974Sbeck return BIO_ctrl(bio, BIO_C_GET_READ_REQUEST, 0, NULL);
633913ec974Sbeck }
634acf64401Sbeck LCRYPTO_ALIAS(BIO_ctrl_get_read_request);
635ba5406e9Sbeck
636c3d505beSjsing int
BIO_ctrl_reset_read_request(BIO * bio)637c3d505beSjsing BIO_ctrl_reset_read_request(BIO *bio)
638ba5406e9Sbeck {
639ba5406e9Sbeck return (BIO_ctrl(bio, BIO_C_RESET_READ_REQUEST, 0, NULL) != 0);
640ba5406e9Sbeck }
641acf64401Sbeck LCRYPTO_ALIAS(BIO_ctrl_reset_read_request);
642