xref: /openbsd-src/lib/libcrypto/bio/bss_bio.c (revision ecc472a0b43d2d6e76cb007be9690b7a3a5cfa46)
1*ecc472a0Sbeck /* $OpenBSD: bss_bio.c,v 1.29 2024/07/09 06:14:59 beck Exp $ */
2cdc51833Smarkus /* ====================================================================
3cdc51833Smarkus  * Copyright (c) 1998-2003 The OpenSSL Project.  All rights reserved.
4cdc51833Smarkus  *
5cdc51833Smarkus  * Redistribution and use in source and binary forms, with or without
6cdc51833Smarkus  * modification, are permitted provided that the following conditions
7cdc51833Smarkus  * are met:
8cdc51833Smarkus  *
9cdc51833Smarkus  * 1. Redistributions of source code must retain the above copyright
10cdc51833Smarkus  *    notice, this list of conditions and the following disclaimer.
11cdc51833Smarkus  *
12cdc51833Smarkus  * 2. Redistributions in binary form must reproduce the above copyright
13cdc51833Smarkus  *    notice, this list of conditions and the following disclaimer in
14cdc51833Smarkus  *    the documentation and/or other materials provided with the
15cdc51833Smarkus  *    distribution.
16cdc51833Smarkus  *
17cdc51833Smarkus  * 3. All advertising materials mentioning features or use of this
18cdc51833Smarkus  *    software must display the following acknowledgment:
19cdc51833Smarkus  *    "This product includes software developed by the OpenSSL Project
20cdc51833Smarkus  *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
21cdc51833Smarkus  *
22cdc51833Smarkus  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
23cdc51833Smarkus  *    endorse or promote products derived from this software without
24cdc51833Smarkus  *    prior written permission. For written permission, please contact
25cdc51833Smarkus  *    openssl-core@openssl.org.
26cdc51833Smarkus  *
27cdc51833Smarkus  * 5. Products derived from this software may not be called "OpenSSL"
28cdc51833Smarkus  *    nor may "OpenSSL" appear in their names without prior written
29cdc51833Smarkus  *    permission of the OpenSSL Project.
30cdc51833Smarkus  *
31cdc51833Smarkus  * 6. Redistributions of any form whatsoever must retain the following
32cdc51833Smarkus  *    acknowledgment:
33cdc51833Smarkus  *    "This product includes software developed by the OpenSSL Project
34cdc51833Smarkus  *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
35cdc51833Smarkus  *
36cdc51833Smarkus  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
37cdc51833Smarkus  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
38cdc51833Smarkus  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
39cdc51833Smarkus  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
40cdc51833Smarkus  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
41cdc51833Smarkus  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
42cdc51833Smarkus  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
43cdc51833Smarkus  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
44cdc51833Smarkus  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
45cdc51833Smarkus  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
46cdc51833Smarkus  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
47cdc51833Smarkus  * OF THE POSSIBILITY OF SUCH DAMAGE.
48cdc51833Smarkus  * ====================================================================
49cdc51833Smarkus  *
50cdc51833Smarkus  * This product includes cryptographic software written by Eric Young
51cdc51833Smarkus  * (eay@cryptsoft.com).  This product includes software written by Tim
52cdc51833Smarkus  * Hudson (tjh@cryptsoft.com).
53cdc51833Smarkus  *
54cdc51833Smarkus  */
55913ec974Sbeck 
56913ec974Sbeck /* Special method for a BIO where the other endpoint is also a BIO
57913ec974Sbeck  * of this kind, handled by the same thread (i.e. the "peer" is actually
58913ec974Sbeck  * ourselves, wearing a different hat).
59913ec974Sbeck  * Such "BIO pairs" are mainly for using the SSL library with I/O interfaces
60913ec974Sbeck  * for which no specific BIO method is available.
61913ec974Sbeck  * See ssl/ssltest.c for some hints on how this can be used. */
62913ec974Sbeck 
636355d6d8Sbeck /* BIO_DEBUG implies BIO_PAIR_DEBUG */
646355d6d8Sbeck #ifdef BIO_DEBUG
65913ec974Sbeck # ifndef BIO_PAIR_DEBUG
666355d6d8Sbeck #  define BIO_PAIR_DEBUG
676355d6d8Sbeck # endif
686355d6d8Sbeck #endif
696355d6d8Sbeck 
706355d6d8Sbeck /* disable assert() unless BIO_PAIR_DEBUG has been defined */
716355d6d8Sbeck #ifndef BIO_PAIR_DEBUG
726355d6d8Sbeck # ifndef NDEBUG
73913ec974Sbeck #  define NDEBUG
74913ec974Sbeck # endif
756355d6d8Sbeck #endif
76913ec974Sbeck 
77913ec974Sbeck #include <assert.h>
78ba5406e9Sbeck #include <limits.h>
79913ec974Sbeck #include <stdlib.h>
80913ec974Sbeck #include <string.h>
817df9a849Smiod #include <sys/types.h>
82913ec974Sbeck 
83913ec974Sbeck #include <openssl/bio.h>
84913ec974Sbeck #include <openssl/err.h>
85913ec974Sbeck #include <openssl/crypto.h>
86913ec974Sbeck 
8794b1984eStb #include "bio_local.h"
8894b1984eStb 
89913ec974Sbeck static int bio_new(BIO *bio);
90913ec974Sbeck static int bio_free(BIO *bio);
91913ec974Sbeck static int bio_read(BIO *bio, char *buf, int size);
92c109e398Sbeck static int bio_write(BIO *bio, const char *buf, int num);
93913ec974Sbeck static long bio_ctrl(BIO *bio, int cmd, long num, void *ptr);
94c109e398Sbeck static int bio_puts(BIO *bio, const char *str);
95913ec974Sbeck 
96913ec974Sbeck static int bio_make_pair(BIO *bio1, BIO *bio2);
97913ec974Sbeck static void bio_destroy_pair(BIO *bio);
98913ec974Sbeck 
996dc76777Stb static const BIO_METHOD methods_biop = {
100e402ce74Smiod 	.type = BIO_TYPE_BIO,
101e402ce74Smiod 	.name = "BIO pair",
102e402ce74Smiod 	.bwrite = bio_write,
103e402ce74Smiod 	.bread = bio_read,
104e402ce74Smiod 	.bputs = bio_puts,
105e402ce74Smiod 	.ctrl = bio_ctrl,
106e402ce74Smiod 	.create = bio_new,
107e402ce74Smiod 	.destroy = bio_free
108913ec974Sbeck };
109913ec974Sbeck 
1106dc76777Stb const BIO_METHOD *
BIO_s_bio(void)111ae7f143bSderaadt BIO_s_bio(void)
112913ec974Sbeck {
113913ec974Sbeck 	return &methods_biop;
114913ec974Sbeck }
115acf64401Sbeck LCRYPTO_ALIAS(BIO_s_bio);
116913ec974Sbeck 
117c3d505beSjsing struct bio_bio_st {
118913ec974Sbeck 	BIO *peer;	/* NULL if buf == NULL.
119913ec974Sbeck 			 * If peer != NULL, then peer->ptr is also a bio_bio_st,
120913ec974Sbeck 			 * and its "peer" member points back to us.
121913ec974Sbeck 			 * peer != NULL iff init != 0 in the BIO. */
122913ec974Sbeck 
123913ec974Sbeck 	/* This is for what we write (i.e. reading uses peer's struct): */
124913ec974Sbeck 	int closed;	/* valid iff peer != NULL */
125913ec974Sbeck 	size_t len;	/* valid iff buf != NULL; 0 if peer == NULL */
126913ec974Sbeck 	size_t offset;	/* valid iff buf != NULL; 0 if len == 0 */
127913ec974Sbeck 	size_t size;
128913ec974Sbeck 	char *buf;      /* "size" elements (if != NULL) */
129913ec974Sbeck 
130913ec974Sbeck 	size_t request; /* valid iff peer != NULL; 0 if len != 0,
131913ec974Sbeck 			 * otherwise set by peer to number of bytes
132ba5406e9Sbeck 			 * it (unsuccessfully) tried to read,
133913ec974Sbeck 	                 * never more than buffer space (size-len) warrants. */
134913ec974Sbeck };
135913ec974Sbeck 
136c3d505beSjsing static int
bio_new(BIO * bio)137c3d505beSjsing bio_new(BIO *bio)
138913ec974Sbeck {
139913ec974Sbeck 	struct bio_bio_st *b;
140913ec974Sbeck 
1416f3a6cb1Sbeck 	b = malloc(sizeof *b);
142913ec974Sbeck 	if (b == NULL)
143913ec974Sbeck 		return 0;
144913ec974Sbeck 
145913ec974Sbeck 	b->peer = NULL;
146913ec974Sbeck 	b->size = 17 * 1024; /* enough for one TLS record (just a default) */
147913ec974Sbeck 	b->buf = NULL;
148913ec974Sbeck 
149913ec974Sbeck 	bio->ptr = b;
150913ec974Sbeck 	return 1;
151913ec974Sbeck }
152913ec974Sbeck 
153c3d505beSjsing static int
bio_free(BIO * bio)154c3d505beSjsing bio_free(BIO *bio)
155913ec974Sbeck {
156913ec974Sbeck 	struct bio_bio_st *b;
157913ec974Sbeck 
158913ec974Sbeck 	if (bio == NULL)
159913ec974Sbeck 		return 0;
160913ec974Sbeck 	b = bio->ptr;
161913ec974Sbeck 
162913ec974Sbeck 	assert(b != NULL);
163913ec974Sbeck 
164913ec974Sbeck 	if (b->peer)
165913ec974Sbeck 		bio_destroy_pair(bio);
166913ec974Sbeck 
1676f3a6cb1Sbeck 	free(b->buf);
1686f3a6cb1Sbeck 	free(b);
169913ec974Sbeck 	return 1;
170913ec974Sbeck }
171913ec974Sbeck 
172913ec974Sbeck 
173913ec974Sbeck 
174c3d505beSjsing static int
bio_read(BIO * bio,char * buf,int size_)175c3d505beSjsing bio_read(BIO *bio, char *buf, int size_)
176913ec974Sbeck {
177913ec974Sbeck 	size_t size = size_;
178913ec974Sbeck 	size_t rest;
179913ec974Sbeck 	struct bio_bio_st *b, *peer_b;
180913ec974Sbeck 
181913ec974Sbeck 	BIO_clear_retry_flags(bio);
182913ec974Sbeck 
183913ec974Sbeck 	if (!bio->init)
184913ec974Sbeck 		return 0;
185913ec974Sbeck 
186913ec974Sbeck 	b = bio->ptr;
187913ec974Sbeck 	assert(b != NULL);
188913ec974Sbeck 	assert(b->peer != NULL);
189913ec974Sbeck 	peer_b = b->peer->ptr;
190913ec974Sbeck 	assert(peer_b != NULL);
191913ec974Sbeck 	assert(peer_b->buf != NULL);
192913ec974Sbeck 
193913ec974Sbeck 	peer_b->request = 0; /* will be set in "retry_read" situation */
194913ec974Sbeck 
195913ec974Sbeck 	if (buf == NULL || size == 0)
196913ec974Sbeck 		return 0;
197913ec974Sbeck 
198c3d505beSjsing 	if (peer_b->len == 0) {
199913ec974Sbeck 		if (peer_b->closed)
200913ec974Sbeck 			return 0; /* writer has closed, and no data is left */
201c3d505beSjsing 		else {
202913ec974Sbeck 			BIO_set_retry_read(bio); /* buffer is empty */
203913ec974Sbeck 			if (size <= peer_b->size)
204913ec974Sbeck 				peer_b->request = size;
205913ec974Sbeck 			else
206913ec974Sbeck 				/* don't ask for more than the peer can
207913ec974Sbeck 				 * deliver in one write */
208913ec974Sbeck 				peer_b->request = peer_b->size;
209913ec974Sbeck 			return -1;
210913ec974Sbeck 		}
211913ec974Sbeck 	}
212913ec974Sbeck 
213913ec974Sbeck 	/* we can read */
214913ec974Sbeck 	if (peer_b->len < size)
215913ec974Sbeck 		size = peer_b->len;
216913ec974Sbeck 
217913ec974Sbeck 	/* now read "size" bytes */
218913ec974Sbeck 
219913ec974Sbeck 	rest = size;
220913ec974Sbeck 
221913ec974Sbeck 	assert(rest > 0);
222913ec974Sbeck 	do /* one or two iterations */
223913ec974Sbeck 	{
224913ec974Sbeck 		size_t chunk;
225913ec974Sbeck 
226913ec974Sbeck 		assert(rest <= peer_b->len);
227913ec974Sbeck 		if (peer_b->offset + rest <= peer_b->size)
228913ec974Sbeck 			chunk = rest;
229913ec974Sbeck 		else
230913ec974Sbeck 			/* wrap around ring buffer */
231913ec974Sbeck 			chunk = peer_b->size - peer_b->offset;
232913ec974Sbeck 		assert(peer_b->offset + chunk <= peer_b->size);
233913ec974Sbeck 
234913ec974Sbeck 		memcpy(buf, peer_b->buf + peer_b->offset, chunk);
235913ec974Sbeck 
236913ec974Sbeck 		peer_b->len -= chunk;
237c3d505beSjsing 		if (peer_b->len) {
238913ec974Sbeck 			peer_b->offset += chunk;
239913ec974Sbeck 			assert(peer_b->offset <= peer_b->size);
240913ec974Sbeck 			if (peer_b->offset == peer_b->size)
241913ec974Sbeck 				peer_b->offset = 0;
242913ec974Sbeck 			buf += chunk;
243c3d505beSjsing 		} else {
244913ec974Sbeck 			/* buffer now empty, no need to advance "buf" */
245913ec974Sbeck 			assert(chunk == rest);
246913ec974Sbeck 			peer_b->offset = 0;
247913ec974Sbeck 		}
248913ec974Sbeck 		rest -= chunk;
249c3d505beSjsing 	} while (rest);
250913ec974Sbeck 
251913ec974Sbeck 	return size;
252913ec974Sbeck }
253913ec974Sbeck 
254c3d505beSjsing static int
bio_write(BIO * bio,const char * buf,int num_)255c3d505beSjsing bio_write(BIO *bio, const char *buf, int num_)
256913ec974Sbeck {
257913ec974Sbeck 	size_t num = num_;
258913ec974Sbeck 	size_t rest;
259913ec974Sbeck 	struct bio_bio_st *b;
260913ec974Sbeck 
261913ec974Sbeck 	BIO_clear_retry_flags(bio);
262913ec974Sbeck 
263913ec974Sbeck 	if (!bio->init || buf == NULL || num == 0)
264913ec974Sbeck 		return 0;
265913ec974Sbeck 
266913ec974Sbeck 	b = bio->ptr;
267c3d505beSjsing 
268913ec974Sbeck 	assert(b != NULL);
269913ec974Sbeck 	assert(b->peer != NULL);
270913ec974Sbeck 	assert(b->buf != NULL);
271913ec974Sbeck 
272913ec974Sbeck 	b->request = 0;
273c3d505beSjsing 	if (b->closed) {
274913ec974Sbeck 		/* we already closed */
2755067ae9fSbeck 		BIOerror(BIO_R_BROKEN_PIPE);
276913ec974Sbeck 		return -1;
277913ec974Sbeck 	}
278913ec974Sbeck 
279913ec974Sbeck 	assert(b->len <= b->size);
280913ec974Sbeck 
281c3d505beSjsing 	if (b->len == b->size) {
282913ec974Sbeck 		BIO_set_retry_write(bio); /* buffer is full */
283913ec974Sbeck 		return -1;
284913ec974Sbeck 	}
285913ec974Sbeck 
286913ec974Sbeck 	/* we can write */
287913ec974Sbeck 	if (num > b->size - b->len)
288913ec974Sbeck 		num = b->size - b->len;
289913ec974Sbeck 
290913ec974Sbeck 	/* now write "num" bytes */
291913ec974Sbeck 
292913ec974Sbeck 	rest = num;
293913ec974Sbeck 
294913ec974Sbeck 	assert(rest > 0);
295913ec974Sbeck 	do /* one or two iterations */
296913ec974Sbeck 	{
297913ec974Sbeck 		size_t write_offset;
298913ec974Sbeck 		size_t chunk;
299913ec974Sbeck 
300913ec974Sbeck 		assert(b->len + rest <= b->size);
301913ec974Sbeck 
302913ec974Sbeck 		write_offset = b->offset + b->len;
303913ec974Sbeck 		if (write_offset >= b->size)
304913ec974Sbeck 			write_offset -= b->size;
305913ec974Sbeck 		/* b->buf[write_offset] is the first byte we can write to. */
306913ec974Sbeck 
307913ec974Sbeck 		if (write_offset + rest <= b->size)
308913ec974Sbeck 			chunk = rest;
309913ec974Sbeck 		else
310913ec974Sbeck 			/* wrap around ring buffer */
311913ec974Sbeck 			chunk = b->size - write_offset;
312913ec974Sbeck 
313913ec974Sbeck 		memcpy(b->buf + write_offset, buf, chunk);
314913ec974Sbeck 
315913ec974Sbeck 		b->len += chunk;
316913ec974Sbeck 
317913ec974Sbeck 		assert(b->len <= b->size);
318913ec974Sbeck 
319913ec974Sbeck 		rest -= chunk;
320913ec974Sbeck 		buf += chunk;
321c3d505beSjsing 	} while (rest);
322913ec974Sbeck 
323913ec974Sbeck 	return num;
324913ec974Sbeck }
325913ec974Sbeck 
326c3d505beSjsing static long
bio_ctrl(BIO * bio,int cmd,long num,void * ptr)327c3d505beSjsing bio_ctrl(BIO *bio, int cmd, long num, void *ptr)
328913ec974Sbeck {
329913ec974Sbeck 	long ret;
330913ec974Sbeck 	struct bio_bio_st *b = bio->ptr;
331913ec974Sbeck 
332913ec974Sbeck 	assert(b != NULL);
333913ec974Sbeck 
334c3d505beSjsing 	switch (cmd) {
335913ec974Sbeck 		/* specific CTRL codes */
336913ec974Sbeck 
337913ec974Sbeck 	case BIO_C_SET_WRITE_BUF_SIZE:
338c3d505beSjsing 		if (b->peer) {
3395067ae9fSbeck 			BIOerror(BIO_R_IN_USE);
340913ec974Sbeck 			ret = 0;
341c3d505beSjsing 		} else if (num == 0) {
3425067ae9fSbeck 			BIOerror(BIO_R_INVALID_ARGUMENT);
343913ec974Sbeck 			ret = 0;
344c3d505beSjsing 		} else {
345913ec974Sbeck 			size_t new_size = num;
346913ec974Sbeck 
347c3d505beSjsing 			if (b->size != new_size) {
3486f3a6cb1Sbeck 				free(b->buf);
349913ec974Sbeck 				b->buf = NULL;
350913ec974Sbeck 				b->size = new_size;
351913ec974Sbeck 			}
352913ec974Sbeck 			ret = 1;
353913ec974Sbeck 		}
354913ec974Sbeck 		break;
355913ec974Sbeck 
356913ec974Sbeck 	case BIO_C_GET_WRITE_BUF_SIZE:
357da347917Sbeck 		ret = (long) b->size;
358da347917Sbeck 		break;
359913ec974Sbeck 
360913ec974Sbeck 	case BIO_C_MAKE_BIO_PAIR:
361913ec974Sbeck 		{
362913ec974Sbeck 			BIO *other_bio = ptr;
363913ec974Sbeck 
364913ec974Sbeck 			if (bio_make_pair(bio, other_bio))
365913ec974Sbeck 				ret = 1;
366913ec974Sbeck 			else
367913ec974Sbeck 				ret = 0;
368913ec974Sbeck 		}
369913ec974Sbeck 		break;
370913ec974Sbeck 
371913ec974Sbeck 	case BIO_C_DESTROY_BIO_PAIR:
372cdc51833Smarkus 		/* Affects both BIOs in the pair -- call just once!
373913ec974Sbeck 		 * Or let BIO_free(bio1); BIO_free(bio2); do the job. */
374913ec974Sbeck 		bio_destroy_pair(bio);
375913ec974Sbeck 		ret = 1;
376913ec974Sbeck 		break;
377913ec974Sbeck 
378913ec974Sbeck 	case BIO_C_GET_WRITE_GUARANTEE:
379913ec974Sbeck 		/* How many bytes can the caller feed to the next write
380ba5406e9Sbeck 		 * without having to keep any? */
381913ec974Sbeck 		if (b->peer == NULL || b->closed)
382913ec974Sbeck 			ret = 0;
383913ec974Sbeck 		else
384913ec974Sbeck 			ret = (long) b->size - b->len;
385913ec974Sbeck 		break;
386913ec974Sbeck 
387913ec974Sbeck 	case BIO_C_GET_READ_REQUEST:
388ba5406e9Sbeck 		/* If the peer unsuccessfully tried to read, how many bytes
389913ec974Sbeck 		 * were requested?  (As with BIO_CTRL_PENDING, that number
390913ec974Sbeck 		 * can usually be treated as boolean.) */
391913ec974Sbeck 		ret = (long) b->request;
392913ec974Sbeck 		break;
393913ec974Sbeck 
394ba5406e9Sbeck 	case BIO_C_RESET_READ_REQUEST:
395ba5406e9Sbeck 		/* Reset request.  (Can be useful after read attempts
396ba5406e9Sbeck 		 * at the other side that are meant to be non-blocking,
397ba5406e9Sbeck 		 * e.g. when probing SSL_read to see if any data is
398ba5406e9Sbeck 		 * available.) */
399ba5406e9Sbeck 		b->request = 0;
400ba5406e9Sbeck 		ret = 1;
401ba5406e9Sbeck 		break;
402ba5406e9Sbeck 
403913ec974Sbeck 	case BIO_C_SHUTDOWN_WR:
404913ec974Sbeck 		/* similar to shutdown(..., SHUT_WR) */
405913ec974Sbeck 		b->closed = 1;
406913ec974Sbeck 		ret = 1;
407913ec974Sbeck 		break;
408913ec974Sbeck 
409913ec974Sbeck 	/* standard CTRL codes follow */
410913ec974Sbeck 
411913ec974Sbeck 	case BIO_CTRL_RESET:
412c3d505beSjsing 		if (b->buf != NULL) {
413913ec974Sbeck 			b->len = 0;
414913ec974Sbeck 			b->offset = 0;
415913ec974Sbeck 		}
416913ec974Sbeck 		ret = 0;
417913ec974Sbeck 		break;
418913ec974Sbeck 
419c3d505beSjsing 
420913ec974Sbeck 	case BIO_CTRL_GET_CLOSE:
421913ec974Sbeck 		ret = bio->shutdown;
422913ec974Sbeck 		break;
423913ec974Sbeck 
424913ec974Sbeck 	case BIO_CTRL_SET_CLOSE:
425913ec974Sbeck 		bio->shutdown = (int) num;
426913ec974Sbeck 		ret = 1;
427913ec974Sbeck 		break;
428913ec974Sbeck 
429913ec974Sbeck 	case BIO_CTRL_PENDING:
430c3d505beSjsing 		if (b->peer != NULL) {
431913ec974Sbeck 			struct bio_bio_st *peer_b = b->peer->ptr;
432913ec974Sbeck 
433913ec974Sbeck 			ret = (long) peer_b->len;
434c3d505beSjsing 		} else
435913ec974Sbeck 			ret = 0;
436913ec974Sbeck 		break;
437913ec974Sbeck 
438913ec974Sbeck 	case BIO_CTRL_WPENDING:
439913ec974Sbeck 		if (b->buf != NULL)
440913ec974Sbeck 			ret = (long) b->len;
441913ec974Sbeck 		else
442913ec974Sbeck 			ret = 0;
443913ec974Sbeck 		break;
444913ec974Sbeck 
445913ec974Sbeck 	case BIO_CTRL_DUP:
446913ec974Sbeck 		/* See BIO_dup_chain for circumstances we have to expect. */
447913ec974Sbeck 		{
448913ec974Sbeck 			BIO *other_bio = ptr;
449913ec974Sbeck 			struct bio_bio_st *other_b;
450913ec974Sbeck 
451913ec974Sbeck 			assert(other_bio != NULL);
452913ec974Sbeck 			other_b = other_bio->ptr;
453913ec974Sbeck 			assert(other_b != NULL);
454913ec974Sbeck 
455913ec974Sbeck 			assert(other_b->buf == NULL); /* other_bio is always fresh */
456913ec974Sbeck 
457913ec974Sbeck 			other_b->size = b->size;
458913ec974Sbeck 		}
459913ec974Sbeck 
460913ec974Sbeck 		ret = 1;
461913ec974Sbeck 		break;
462913ec974Sbeck 
463913ec974Sbeck 	case BIO_CTRL_FLUSH:
464913ec974Sbeck 		ret = 1;
465913ec974Sbeck 		break;
466913ec974Sbeck 
467913ec974Sbeck 	case BIO_CTRL_EOF:
468913ec974Sbeck 		{
469913ec974Sbeck 			BIO *other_bio = ptr;
470913ec974Sbeck 
471c3d505beSjsing 			if (other_bio) {
472913ec974Sbeck 				struct bio_bio_st *other_b = other_bio->ptr;
473913ec974Sbeck 
474913ec974Sbeck 				assert(other_b != NULL);
475913ec974Sbeck 				ret = other_b->len == 0 && other_b->closed;
476c3d505beSjsing 			} else
477913ec974Sbeck 				ret = 1;
478913ec974Sbeck 		}
479913ec974Sbeck 		break;
480913ec974Sbeck 
481913ec974Sbeck 	default:
482913ec974Sbeck 		ret = 0;
483913ec974Sbeck 	}
484913ec974Sbeck 	return ret;
485913ec974Sbeck }
486913ec974Sbeck 
487c3d505beSjsing static int
bio_puts(BIO * bio,const char * str)488c3d505beSjsing bio_puts(BIO *bio, const char *str)
489913ec974Sbeck {
490913ec974Sbeck 	return bio_write(bio, str, strlen(str));
491913ec974Sbeck }
492913ec974Sbeck 
493913ec974Sbeck 
494c3d505beSjsing static int
bio_make_pair(BIO * bio1,BIO * bio2)495c3d505beSjsing bio_make_pair(BIO *bio1, BIO *bio2)
496913ec974Sbeck {
497913ec974Sbeck 	struct bio_bio_st *b1, *b2;
498913ec974Sbeck 
499913ec974Sbeck 	assert(bio1 != NULL);
500913ec974Sbeck 	assert(bio2 != NULL);
501913ec974Sbeck 
502913ec974Sbeck 	b1 = bio1->ptr;
503913ec974Sbeck 	b2 = bio2->ptr;
504913ec974Sbeck 
505c3d505beSjsing 	if (b1->peer != NULL || b2->peer != NULL) {
5065067ae9fSbeck 		BIOerror(BIO_R_IN_USE);
507913ec974Sbeck 		return 0;
508913ec974Sbeck 	}
509913ec974Sbeck 
510c3d505beSjsing 	if (b1->buf == NULL) {
5116f3a6cb1Sbeck 		b1->buf = malloc(b1->size);
512c3d505beSjsing 		if (b1->buf == NULL) {
5135067ae9fSbeck 			BIOerror(ERR_R_MALLOC_FAILURE);
514913ec974Sbeck 			return 0;
515913ec974Sbeck 		}
516913ec974Sbeck 		b1->len = 0;
517913ec974Sbeck 		b1->offset = 0;
518913ec974Sbeck 	}
519913ec974Sbeck 
520c3d505beSjsing 	if (b2->buf == NULL) {
5216f3a6cb1Sbeck 		b2->buf = malloc(b2->size);
522c3d505beSjsing 		if (b2->buf == NULL) {
5235067ae9fSbeck 			BIOerror(ERR_R_MALLOC_FAILURE);
524913ec974Sbeck 			return 0;
525913ec974Sbeck 		}
526913ec974Sbeck 		b2->len = 0;
527913ec974Sbeck 		b2->offset = 0;
528913ec974Sbeck 	}
529913ec974Sbeck 
530913ec974Sbeck 	b1->peer = bio2;
531913ec974Sbeck 	b1->closed = 0;
532913ec974Sbeck 	b1->request = 0;
533913ec974Sbeck 	b2->peer = bio1;
534913ec974Sbeck 	b2->closed = 0;
535913ec974Sbeck 	b2->request = 0;
536913ec974Sbeck 
537913ec974Sbeck 	bio1->init = 1;
538913ec974Sbeck 	bio2->init = 1;
539913ec974Sbeck 
540913ec974Sbeck 	return 1;
541913ec974Sbeck }
542913ec974Sbeck 
543c3d505beSjsing static void
bio_destroy_pair(BIO * bio)544c3d505beSjsing bio_destroy_pair(BIO *bio)
545913ec974Sbeck {
546913ec974Sbeck 	struct bio_bio_st *b = bio->ptr;
547913ec974Sbeck 
548c3d505beSjsing 	if (b != NULL) {
549913ec974Sbeck 		BIO *peer_bio = b->peer;
550913ec974Sbeck 
551c3d505beSjsing 		if (peer_bio != NULL) {
552913ec974Sbeck 			struct bio_bio_st *peer_b = peer_bio->ptr;
553913ec974Sbeck 
554913ec974Sbeck 			assert(peer_b != NULL);
555913ec974Sbeck 			assert(peer_b->peer == bio);
556913ec974Sbeck 
557913ec974Sbeck 			peer_b->peer = NULL;
558913ec974Sbeck 			peer_bio->init = 0;
559913ec974Sbeck 			assert(peer_b->buf != NULL);
560913ec974Sbeck 			peer_b->len = 0;
561913ec974Sbeck 			peer_b->offset = 0;
562913ec974Sbeck 
563913ec974Sbeck 			b->peer = NULL;
564913ec974Sbeck 			bio->init = 0;
565913ec974Sbeck 			assert(b->buf != NULL);
566913ec974Sbeck 			b->len = 0;
567913ec974Sbeck 			b->offset = 0;
568913ec974Sbeck 		}
569913ec974Sbeck 	}
570913ec974Sbeck }
571913ec974Sbeck 
572913ec974Sbeck 
573913ec974Sbeck /* Exported convenience functions */
574c3d505beSjsing int
BIO_new_bio_pair(BIO ** bio1_p,size_t writebuf1,BIO ** bio2_p,size_t writebuf2)575c3d505beSjsing BIO_new_bio_pair(BIO **bio1_p, size_t writebuf1, BIO **bio2_p, size_t writebuf2)
576913ec974Sbeck {
577913ec974Sbeck 	BIO *bio1 = NULL, *bio2 = NULL;
578913ec974Sbeck 	long r;
579913ec974Sbeck 	int ret = 0;
580913ec974Sbeck 
581913ec974Sbeck 	bio1 = BIO_new(BIO_s_bio());
582913ec974Sbeck 	if (bio1 == NULL)
583913ec974Sbeck 		goto err;
584913ec974Sbeck 	bio2 = BIO_new(BIO_s_bio());
585913ec974Sbeck 	if (bio2 == NULL)
586913ec974Sbeck 		goto err;
587913ec974Sbeck 
588c3d505beSjsing 	if (writebuf1) {
589913ec974Sbeck 		r = BIO_set_write_buf_size(bio1, writebuf1);
590913ec974Sbeck 		if (!r)
591913ec974Sbeck 			goto err;
592913ec974Sbeck 	}
593c3d505beSjsing 	if (writebuf2) {
594913ec974Sbeck 		r = BIO_set_write_buf_size(bio2, writebuf2);
595913ec974Sbeck 		if (!r)
596913ec974Sbeck 			goto err;
597913ec974Sbeck 	}
598913ec974Sbeck 
599913ec974Sbeck 	r = BIO_make_bio_pair(bio1, bio2);
600913ec974Sbeck 	if (!r)
601913ec974Sbeck 		goto err;
602913ec974Sbeck 	ret = 1;
603913ec974Sbeck 
604913ec974Sbeck 	err:
605c3d505beSjsing 	if (ret == 0) {
606c3d505beSjsing 		if (bio1) {
607913ec974Sbeck 			BIO_free(bio1);
608913ec974Sbeck 			bio1 = NULL;
609913ec974Sbeck 		}
610c3d505beSjsing 		if (bio2) {
611913ec974Sbeck 			BIO_free(bio2);
612913ec974Sbeck 			bio2 = NULL;
613913ec974Sbeck 		}
614913ec974Sbeck 	}
615913ec974Sbeck 
616913ec974Sbeck 	*bio1_p = bio1;
617913ec974Sbeck 	*bio2_p = bio2;
618913ec974Sbeck 	return ret;
619913ec974Sbeck }
620*ecc472a0Sbeck LCRYPTO_ALIAS(BIO_new_bio_pair);
621913ec974Sbeck 
622c3d505beSjsing size_t
BIO_ctrl_get_write_guarantee(BIO * bio)623c3d505beSjsing BIO_ctrl_get_write_guarantee(BIO *bio)
624913ec974Sbeck {
625913ec974Sbeck 	return BIO_ctrl(bio, BIO_C_GET_WRITE_GUARANTEE, 0, NULL);
626913ec974Sbeck }
627acf64401Sbeck LCRYPTO_ALIAS(BIO_ctrl_get_write_guarantee);
628913ec974Sbeck 
629c3d505beSjsing size_t
BIO_ctrl_get_read_request(BIO * bio)630c3d505beSjsing BIO_ctrl_get_read_request(BIO *bio)
631913ec974Sbeck {
632913ec974Sbeck 	return BIO_ctrl(bio, BIO_C_GET_READ_REQUEST, 0, NULL);
633913ec974Sbeck }
634acf64401Sbeck LCRYPTO_ALIAS(BIO_ctrl_get_read_request);
635ba5406e9Sbeck 
636c3d505beSjsing int
BIO_ctrl_reset_read_request(BIO * bio)637c3d505beSjsing BIO_ctrl_reset_read_request(BIO *bio)
638ba5406e9Sbeck {
639ba5406e9Sbeck 	return (BIO_ctrl(bio, BIO_C_RESET_READ_REQUEST, 0, NULL) != 0);
640ba5406e9Sbeck }
641acf64401Sbeck LCRYPTO_ALIAS(BIO_ctrl_reset_read_request);
642