GCC Code Coverage Report
Directory: ./ Exec Total Coverage
File: lib/libssl/bio_ssl.c Lines: 69 247 27.9 %
Date: 2017-11-07 Branches: 27 144 18.8 %

Line Branch Exec Source
1
/* $OpenBSD: bio_ssl.c,v 1.27 2017/02/07 02:08:38 beck Exp $ */
2
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3
 * All rights reserved.
4
 *
5
 * This package is an SSL implementation written
6
 * by Eric Young (eay@cryptsoft.com).
7
 * The implementation was written so as to conform with Netscapes SSL.
8
 *
9
 * This library is free for commercial and non-commercial use as long as
10
 * the following conditions are aheared to.  The following conditions
11
 * apply to all code found in this distribution, be it the RC4, RSA,
12
 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13
 * included with this distribution is covered by the same copyright terms
14
 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15
 *
16
 * Copyright remains Eric Young's, and as such any Copyright notices in
17
 * the code are not to be removed.
18
 * If this package is used in a product, Eric Young should be given attribution
19
 * as the author of the parts of the library used.
20
 * This can be in the form of a textual message at program startup or
21
 * in documentation (online or textual) provided with the package.
22
 *
23
 * Redistribution and use in source and binary forms, with or without
24
 * modification, are permitted provided that the following conditions
25
 * are met:
26
 * 1. Redistributions of source code must retain the copyright
27
 *    notice, this list of conditions and the following disclaimer.
28
 * 2. Redistributions in binary form must reproduce the above copyright
29
 *    notice, this list of conditions and the following disclaimer in the
30
 *    documentation and/or other materials provided with the distribution.
31
 * 3. All advertising materials mentioning features or use of this software
32
 *    must display the following acknowledgement:
33
 *    "This product includes cryptographic software written by
34
 *     Eric Young (eay@cryptsoft.com)"
35
 *    The word 'cryptographic' can be left out if the rouines from the library
36
 *    being used are not cryptographic related :-).
37
 * 4. If you include any Windows specific code (or a derivative thereof) from
38
 *    the apps directory (application code) you must include an acknowledgement:
39
 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40
 *
41
 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51
 * SUCH DAMAGE.
52
 *
53
 * The licence and distribution terms for any publically available version or
54
 * derivative of this code cannot be changed.  i.e. this code cannot simply be
55
 * copied and put under another distribution licence
56
 * [including the GNU Public Licence.]
57
 */
58
59
#include <errno.h>
60
#include <stdio.h>
61
#include <stdlib.h>
62
#include <string.h>
63
64
#include <openssl/bio.h>
65
#include <openssl/crypto.h>
66
#include <openssl/err.h>
67
#include <openssl/ssl.h>
68
69
#include "ssl_locl.h"
70
71
static int ssl_write(BIO *h, const char *buf, int num);
72
static int ssl_read(BIO *h, char *buf, int size);
73
static int ssl_puts(BIO *h, const char *str);
74
static long ssl_ctrl(BIO *h, int cmd, long arg1, void *arg2);
75
static int ssl_new(BIO *h);
76
static int ssl_free(BIO *data);
77
static long ssl_callback_ctrl(BIO *h, int cmd, bio_info_cb *fp);
78
typedef struct bio_ssl_st {
79
	SSL *ssl; /* The ssl handle :-) */
80
	/* re-negotiate every time the total number of bytes is this size */
81
	int num_renegotiates;
82
	unsigned long renegotiate_count;
83
	unsigned long byte_count;
84
	unsigned long renegotiate_timeout;
85
	time_t last_time;
86
} BIO_SSL;
87
88
static BIO_METHOD methods_sslp = {
89
	.type = BIO_TYPE_SSL,
90
	.name = "ssl",
91
	.bwrite = ssl_write,
92
	.bread = ssl_read,
93
	.bputs = ssl_puts,
94
	.ctrl = ssl_ctrl,
95
	.create = ssl_new,
96
	.destroy = ssl_free,
97
	.callback_ctrl = ssl_callback_ctrl,
98
};
99
100
BIO_METHOD *
101
BIO_f_ssl(void)
102
{
103
960
	return (&methods_sslp);
104
}
105
106
static int
107
ssl_new(BIO *bi)
108
{
109
	BIO_SSL *bs;
110
111
960
	bs = calloc(1, sizeof(BIO_SSL));
112
480
	if (bs == NULL) {
113
		SSLerrorx(ERR_R_MALLOC_FAILURE);
114
		return (0);
115
	}
116
480
	bi->init = 0;
117
480
	bi->ptr = (char *)bs;
118
480
	bi->flags = 0;
119
480
	return (1);
120
480
}
121
122
static int
123
ssl_free(BIO *a)
124
{
125
	BIO_SSL *bs;
126
127
960
	if (a == NULL)
128
		return (0);
129
480
	bs = (BIO_SSL *)a->ptr;
130
480
	if (bs->ssl != NULL)
131
480
		SSL_shutdown(bs->ssl);
132
480
	if (a->shutdown) {
133
		if (a->init && (bs->ssl != NULL))
134
			SSL_free(bs->ssl);
135
		a->init = 0;
136
		a->flags = 0;
137
	}
138
480
	free(a->ptr);
139
480
	return (1);
140
480
}
141
142
static int
143
ssl_read(BIO *b, char *out, int outl)
144
{
145
	int ret = 1;
146
	BIO_SSL *sb;
147
	SSL *ssl;
148
	int retry_reason = 0;
149
	int r = 0;
150
151
12816
	if (out == NULL)
152
		return (0);
153
12816
	sb = (BIO_SSL *)b->ptr;
154
12816
	ssl = sb->ssl;
155
156
12816
	BIO_clear_retry_flags(b);
157
158
12816
	ret = SSL_read(ssl, out, outl);
159
160

12816
	switch (SSL_get_error(ssl, ret)) {
161
	case SSL_ERROR_NONE:
162
480
		if (ret <= 0)
163
			break;
164
480
		if (sb->renegotiate_count > 0) {
165
			sb->byte_count += ret;
166
			if (sb->byte_count > sb->renegotiate_count) {
167
				sb->byte_count = 0;
168
				sb->num_renegotiates++;
169
				SSL_renegotiate(ssl);
170
				r = 1;
171
			}
172
		}
173
480
		if ((sb->renegotiate_timeout > 0) && (!r)) {
174
			time_t tm;
175
176
			tm = time(NULL);
177
			if (tm > sb->last_time + sb->renegotiate_timeout) {
178
				sb->last_time = tm;
179
				sb->num_renegotiates++;
180
				SSL_renegotiate(ssl);
181
			}
182
		}
183
184
		break;
185
	case SSL_ERROR_WANT_READ:
186
5184
		BIO_set_retry_read(b);
187
5184
		break;
188
	case SSL_ERROR_WANT_WRITE:
189
744
		BIO_set_retry_write(b);
190
744
		break;
191
	case SSL_ERROR_WANT_X509_LOOKUP:
192
		BIO_set_retry_special(b);
193
		retry_reason = BIO_RR_SSL_X509_LOOKUP;
194
		break;
195
	case SSL_ERROR_WANT_ACCEPT:
196
		BIO_set_retry_special(b);
197
		retry_reason = BIO_RR_ACCEPT;
198
		break;
199
	case SSL_ERROR_WANT_CONNECT:
200
		BIO_set_retry_special(b);
201
		retry_reason = BIO_RR_CONNECT;
202
		break;
203
	case SSL_ERROR_SYSCALL:
204
	case SSL_ERROR_SSL:
205
	case SSL_ERROR_ZERO_RETURN:
206
	default:
207
		break;
208
	}
209
210
6408
	b->retry_reason = retry_reason;
211
6408
	return (ret);
212
6408
}
213
214
static int
215
ssl_write(BIO *b, const char *out, int outl)
216
{
217
	int ret, r = 0;
218
	int retry_reason = 0;
219
	SSL *ssl;
220
	BIO_SSL *bs;
221
222
12240
	if (out == NULL)
223
		return (0);
224
12240
	bs = (BIO_SSL *)b->ptr;
225
12240
	ssl = bs->ssl;
226
227
12240
	BIO_clear_retry_flags(b);
228
229
/*	ret=SSL_do_handshake(ssl);
230
	if (ret > 0) */
231
12240
		ret = SSL_write(ssl, out, outl);
232
233

12240
	switch (SSL_get_error(ssl, ret)) {
234
	case SSL_ERROR_NONE:
235
480
		if (ret <= 0)
236
			break;
237
480
		if (bs->renegotiate_count > 0) {
238
			bs->byte_count += ret;
239
			if (bs->byte_count > bs->renegotiate_count) {
240
				bs->byte_count = 0;
241
				bs->num_renegotiates++;
242
				SSL_renegotiate(ssl);
243
				r = 1;
244
			}
245
		}
246
480
		if ((bs->renegotiate_timeout > 0) && (!r)) {
247
			time_t tm;
248
249
			tm = time(NULL);
250
			if (tm > bs->last_time + bs->renegotiate_timeout) {
251
				bs->last_time = tm;
252
				bs->num_renegotiates++;
253
				SSL_renegotiate(ssl);
254
			}
255
		}
256
		break;
257
	case SSL_ERROR_WANT_WRITE:
258
1488
		BIO_set_retry_write(b);
259
1488
		break;
260
	case SSL_ERROR_WANT_READ:
261
4152
		BIO_set_retry_read(b);
262
4152
		break;
263
	case SSL_ERROR_WANT_X509_LOOKUP:
264
		BIO_set_retry_special(b);
265
		retry_reason = BIO_RR_SSL_X509_LOOKUP;
266
		break;
267
	case SSL_ERROR_WANT_CONNECT:
268
		BIO_set_retry_special(b);
269
		retry_reason = BIO_RR_CONNECT;
270
	case SSL_ERROR_SYSCALL:
271
	case SSL_ERROR_SSL:
272
	default:
273
		break;
274
	}
275
276
6120
	b->retry_reason = retry_reason;
277
6120
	return (ret);
278
6120
}
279
280
static long
281
ssl_ctrl(BIO *b, int cmd, long num, void *ptr)
282
{
283
	SSL **sslp, *ssl;
284
	BIO_SSL *bs;
285
	BIO *dbio, *bio;
286
	long ret = 1;
287
288
5568
	bs = (BIO_SSL *)b->ptr;
289
2784
	ssl = bs->ssl;
290
2784
	if ((ssl == NULL)  && (cmd != BIO_C_SET_SSL))
291
		return (0);
292





2784
	switch (cmd) {
293
	case BIO_CTRL_RESET:
294
		SSL_shutdown(ssl);
295
296
		if (ssl->internal->handshake_func ==
297
		    ssl->method->internal->ssl_connect)
298
			SSL_set_connect_state(ssl);
299
		else if (ssl->internal->handshake_func ==
300
		    ssl->method->internal->ssl_accept)
301
			SSL_set_accept_state(ssl);
302
303
		SSL_clear(ssl);
304
305
		if (b->next_bio != NULL)
306
			ret = BIO_ctrl(b->next_bio, cmd, num, ptr);
307
		else if (ssl->rbio != NULL)
308
			ret = BIO_ctrl(ssl->rbio, cmd, num, ptr);
309
		else
310
			ret = 1;
311
		break;
312
	case BIO_CTRL_INFO:
313
		ret = 0;
314
		break;
315
	case BIO_C_SSL_MODE:
316
		if (num) /* client mode */
317
			SSL_set_connect_state(ssl);
318
		else
319
			SSL_set_accept_state(ssl);
320
		break;
321
	case BIO_C_SET_SSL_RENEGOTIATE_TIMEOUT:
322
		ret = bs->renegotiate_timeout;
323
		if (num < 60)
324
			num = 5;
325
		bs->renegotiate_timeout = (unsigned long)num;
326
		bs->last_time = time(NULL);
327
		break;
328
	case BIO_C_SET_SSL_RENEGOTIATE_BYTES:
329
		ret = bs->renegotiate_count;
330
		if ((long)num >=512)
331
			bs->renegotiate_count = (unsigned long)num;
332
		break;
333
	case BIO_C_GET_SSL_NUM_RENEGOTIATES:
334
		ret = bs->num_renegotiates;
335
		break;
336
	case BIO_C_SET_SSL:
337
480
		if (ssl != NULL) {
338
			ssl_free(b);
339
			if (!ssl_new(b))
340
				return 0;
341
		}
342
480
		b->shutdown = (int)num;
343
480
		ssl = (SSL *)ptr;
344
480
		((BIO_SSL *)b->ptr)->ssl = ssl;
345
480
		bio = SSL_get_rbio(ssl);
346
480
		if (bio != NULL) {
347
480
			if (b->next_bio != NULL)
348
				BIO_push(bio, b->next_bio);
349
480
			b->next_bio = bio;
350
480
			CRYPTO_add(&bio->references, 1, CRYPTO_LOCK_BIO);
351
480
		}
352
480
		b->init = 1;
353
480
		break;
354
	case BIO_C_GET_SSL:
355
		if (ptr != NULL) {
356
			sslp = (SSL **)ptr;
357
			*sslp = ssl;
358
		} else
359
			ret = 0;
360
		break;
361
	case BIO_CTRL_GET_CLOSE:
362
		ret = b->shutdown;
363
		break;
364
	case BIO_CTRL_SET_CLOSE:
365
		b->shutdown = (int)num;
366
		break;
367
	case BIO_CTRL_WPENDING:
368
		ret = BIO_ctrl(ssl->wbio, cmd, num, ptr);
369
		break;
370
	case BIO_CTRL_PENDING:
371
2304
		ret = SSL_pending(ssl);
372
2304
		if (ret == 0)
373
2304
			ret = BIO_pending(ssl->rbio);
374
		break;
375
	case BIO_CTRL_FLUSH:
376
		BIO_clear_retry_flags(b);
377
		ret = BIO_ctrl(ssl->wbio, cmd, num, ptr);
378
		BIO_copy_next_retry(b);
379
		break;
380
	case BIO_CTRL_PUSH:
381
		if ((b->next_bio != NULL) && (b->next_bio != ssl->rbio)) {
382
			SSL_set_bio(ssl, b->next_bio, b->next_bio);
383
			CRYPTO_add(&b->next_bio->references, 1,
384
			    CRYPTO_LOCK_BIO);
385
		}
386
		break;
387
	case BIO_CTRL_POP:
388
		/* Only detach if we are the BIO explicitly being popped */
389
		if (b == ptr) {
390
			/* Shouldn't happen in practice because the
391
			 * rbio and wbio are the same when pushed.
392
			 */
393
			if (ssl->rbio != ssl->wbio)
394
				BIO_free_all(ssl->wbio);
395
			if (b->next_bio != NULL)
396
				CRYPTO_add(&b->next_bio->references, -1, CRYPTO_LOCK_BIO);
397
			ssl->wbio = NULL;
398
			ssl->rbio = NULL;
399
		}
400
		break;
401
	case BIO_C_DO_STATE_MACHINE:
402
		BIO_clear_retry_flags(b);
403
404
		b->retry_reason = 0;
405
		ret = (int)SSL_do_handshake(ssl);
406
407
		switch (SSL_get_error(ssl, (int)ret)) {
408
		case SSL_ERROR_WANT_READ:
409
			BIO_set_flags(b,
410
			    BIO_FLAGS_READ|BIO_FLAGS_SHOULD_RETRY);
411
			break;
412
		case SSL_ERROR_WANT_WRITE:
413
			BIO_set_flags(b,
414
			    BIO_FLAGS_WRITE|BIO_FLAGS_SHOULD_RETRY);
415
			break;
416
		case SSL_ERROR_WANT_CONNECT:
417
			BIO_set_flags(b,
418
			    BIO_FLAGS_IO_SPECIAL|BIO_FLAGS_SHOULD_RETRY);
419
			b->retry_reason = b->next_bio->retry_reason;
420
			break;
421
		default:
422
			break;
423
		}
424
		break;
425
	case BIO_CTRL_DUP:
426
		dbio = (BIO *)ptr;
427
		if (((BIO_SSL *)dbio->ptr)->ssl != NULL)
428
			SSL_free(((BIO_SSL *)dbio->ptr)->ssl);
429
		((BIO_SSL *)dbio->ptr)->ssl = SSL_dup(ssl);
430
		((BIO_SSL *)dbio->ptr)->renegotiate_count =
431
		    ((BIO_SSL *)b->ptr)->renegotiate_count;
432
		((BIO_SSL *)dbio->ptr)->byte_count =
433
		    ((BIO_SSL *)b->ptr)->byte_count;
434
		((BIO_SSL *)dbio->ptr)->renegotiate_timeout =
435
		    ((BIO_SSL *)b->ptr)->renegotiate_timeout;
436
		((BIO_SSL *)dbio->ptr)->last_time =
437
		    ((BIO_SSL *)b->ptr)->last_time;
438
		ret = (((BIO_SSL *)dbio->ptr)->ssl != NULL);
439
		break;
440
	case BIO_C_GET_FD:
441
		ret = BIO_ctrl(ssl->rbio, cmd, num, ptr);
442
		break;
443
	case BIO_CTRL_SET_CALLBACK:
444
		{
445
			ret = 0;
446
		}
447
		break;
448
	case BIO_CTRL_GET_CALLBACK:
449
		{
450
			void (**fptr)(const SSL *xssl, int type, int val);
451
452
			fptr = (void (**)(const SSL *xssl, int type, int val))
453
			    ptr;
454
			*fptr = SSL_get_info_callback(ssl);
455
		}
456
		break;
457
	default:
458
		ret = BIO_ctrl(ssl->rbio, cmd, num, ptr);
459
		break;
460
	}
461
2784
	return (ret);
462
2784
}
463
464
static long
465
ssl_callback_ctrl(BIO *b, int cmd, bio_info_cb *fp)
466
{
467
	SSL *ssl;
468
	BIO_SSL *bs;
469
	long ret = 1;
470
471
	bs = (BIO_SSL *)b->ptr;
472
	ssl = bs->ssl;
473
	switch (cmd) {
474
	case BIO_CTRL_SET_CALLBACK:
475
		{
476
		/* FIXME: setting this via a completely different prototype
477
		   seems like a crap idea */
478
			SSL_set_info_callback(ssl,
479
			    (void (*)(const SSL *, int, int))fp);
480
		}
481
		break;
482
	default:
483
		ret = BIO_callback_ctrl(ssl->rbio, cmd, fp);
484
		break;
485
	}
486
	return (ret);
487
}
488
489
static int
490
ssl_puts(BIO *bp, const char *str)
491
{
492
	int n, ret;
493
494
	n = strlen(str);
495
	ret = BIO_write(bp, str, n);
496
	return (ret);
497
}
498
499
BIO *
500
BIO_new_buffer_ssl_connect(SSL_CTX *ctx)
501
{
502
	BIO *ret = NULL, *buf = NULL, *ssl = NULL;
503
504
	if ((buf = BIO_new(BIO_f_buffer())) == NULL)
505
		goto err;
506
	if ((ssl = BIO_new_ssl_connect(ctx)) == NULL)
507
		goto err;
508
	if ((ret = BIO_push(buf, ssl)) == NULL)
509
		goto err;
510
	return (ret);
511
512
err:
513
	BIO_free(buf);
514
	BIO_free(ssl);
515
	return (NULL);
516
}
517
518
BIO *
519
BIO_new_ssl_connect(SSL_CTX *ctx)
520
{
521
	BIO *ret = NULL, *con = NULL, *ssl = NULL;
522
523
	if ((con = BIO_new(BIO_s_connect())) == NULL)
524
		goto err;
525
	if ((ssl = BIO_new_ssl(ctx, 1)) == NULL)
526
		goto err;
527
	if ((ret = BIO_push(ssl, con)) == NULL)
528
		goto err;
529
	return (ret);
530
531
err:
532
	BIO_free(con);
533
	BIO_free(ssl);
534
	return (NULL);
535
}
536
537
BIO *
538
BIO_new_ssl(SSL_CTX *ctx, int client)
539
{
540
	BIO *ret;
541
	SSL *ssl;
542
543
	if ((ret = BIO_new(BIO_f_ssl())) == NULL)
544
		goto err;
545
	if ((ssl = SSL_new(ctx)) == NULL)
546
		goto err;
547
548
	if (client)
549
		SSL_set_connect_state(ssl);
550
	else
551
		SSL_set_accept_state(ssl);
552
553
	BIO_set_ssl(ret, ssl, BIO_CLOSE);
554
	return (ret);
555
556
err:
557
	BIO_free(ret);
558
	return (NULL);
559
}
560
561
int
562
BIO_ssl_copy_session_id(BIO *t, BIO *f)
563
{
564
	t = BIO_find_type(t, BIO_TYPE_SSL);
565
	f = BIO_find_type(f, BIO_TYPE_SSL);
566
	if ((t == NULL) || (f == NULL))
567
		return (0);
568
	if ((((BIO_SSL *)t->ptr)->ssl == NULL) ||
569
	    (((BIO_SSL *)f->ptr)->ssl == NULL))
570
		return (0);
571
	SSL_copy_session_id(((BIO_SSL *)t->ptr)->ssl, ((BIO_SSL *)f->ptr)->ssl);
572
	return (1);
573
}
574
575
void
576
BIO_ssl_shutdown(BIO *b)
577
{
578
	SSL *s;
579
580
	while (b != NULL) {
581
		if (b->method->type == BIO_TYPE_SSL) {
582
			s = ((BIO_SSL *)b->ptr)->ssl;
583
			SSL_shutdown(s);
584
			break;
585
		}
586
		b = b->next_bio;
587
	}
588
}