2011-08-25 23:41:19 +04:00
|
|
|
/* io.c
|
2011-02-05 22:14:47 +03:00
|
|
|
*
|
2013-02-06 00:44:17 +04:00
|
|
|
* Copyright (C) 2006-2013 wolfSSL Inc.
|
2011-02-05 22:14:47 +03:00
|
|
|
*
|
|
|
|
* This file is part of CyaSSL.
|
|
|
|
*
|
|
|
|
* CyaSSL is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* CyaSSL is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
|
|
|
|
*/
|
|
|
|
|
2011-08-25 03:37:16 +04:00
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include <config.h>
|
|
|
|
#endif
|
2011-02-05 22:14:47 +03:00
|
|
|
|
2013-04-10 22:04:29 +04:00
|
|
|
#include <cyassl/ctaocrypt/settings.h>
|
|
|
|
|
2011-02-05 22:14:47 +03:00
|
|
|
#ifdef _WIN32_WCE
|
|
|
|
/* On WinCE winsock2.h must be included before windows.h for socket stuff */
|
|
|
|
#include <winsock2.h>
|
|
|
|
#endif
|
|
|
|
|
2011-08-25 23:41:19 +04:00
|
|
|
#include <cyassl/internal.h>
|
2013-02-20 00:53:58 +04:00
|
|
|
#include <cyassl/error.h>
|
2011-02-05 22:14:47 +03:00
|
|
|
|
|
|
|
/* if user writes own I/O callbacks they can define CYASSL_USER_IO to remove
|
|
|
|
automatic setting of default I/O functions EmbedSend() and EmbedReceive()
|
2011-03-22 17:35:18 +03:00
|
|
|
but they'll still need SetCallback xxx() at end of file
|
2011-02-05 22:14:47 +03:00
|
|
|
*/
|
|
|
|
#ifndef CYASSL_USER_IO
|
|
|
|
|
|
|
|
#ifdef HAVE_LIBZ
|
|
|
|
#include "zlib.h"
|
|
|
|
#endif
|
|
|
|
|
2011-05-17 03:20:32 +04:00
|
|
|
#ifndef USE_WINDOWS_API
|
2011-05-26 20:55:59 +04:00
|
|
|
#ifdef CYASSL_LWIP
|
|
|
|
/* lwIP needs to be configured to use sockets API in this mode */
|
2012-08-16 04:00:11 +04:00
|
|
|
/* LWIP_SOCKET 1 in lwip/opt.h or in build */
|
|
|
|
#include "lwip/sockets.h"
|
2012-12-27 21:16:08 +04:00
|
|
|
#include <errno.h>
|
2012-08-16 04:00:11 +04:00
|
|
|
#ifndef LWIP_PROVIDE_ERRNO
|
|
|
|
#define LWIP_PROVIDE_ERRNO 1
|
|
|
|
#endif
|
2012-11-01 21:23:42 +04:00
|
|
|
#elif defined(FREESCALE_MQX)
|
2012-11-13 01:25:59 +04:00
|
|
|
#include <posix.h>
|
2012-11-01 21:23:42 +04:00
|
|
|
#include <rtcs.h>
|
2013-05-21 04:56:27 +04:00
|
|
|
#elif defined(CYASSL_MDK_ARM)
|
|
|
|
#include <rtl.h>
|
|
|
|
#undef RNG
|
|
|
|
#include "CYASSL_MDK_ARM.h"
|
|
|
|
#undef RNG
|
|
|
|
#define RNG CyaSSL_RNG
|
|
|
|
/* for avoiding name conflict in "stm32f2xx.h" */
|
2013-06-15 00:45:25 +04:00
|
|
|
static int errno;
|
2011-05-17 03:20:32 +04:00
|
|
|
#else
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <errno.h>
|
2012-08-14 03:10:05 +04:00
|
|
|
#ifndef EBSNET
|
|
|
|
#include <unistd.h>
|
|
|
|
#endif
|
2011-05-17 03:20:32 +04:00
|
|
|
#include <fcntl.h>
|
2013-06-15 00:45:25 +04:00
|
|
|
#if !(defined(DEVKITPRO) || defined(HAVE_RTP_SYS) || defined(EBSNET))
|
2011-05-17 03:20:32 +04:00
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netdb.h>
|
2011-07-13 23:25:08 +04:00
|
|
|
#ifdef __PPU
|
2011-07-13 00:28:48 +04:00
|
|
|
#include <netex/errno.h>
|
|
|
|
#else
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
#endif
|
2011-05-17 03:20:32 +04:00
|
|
|
#endif
|
2013-06-15 00:45:25 +04:00
|
|
|
#ifdef HAVE_RTP_SYS
|
2011-05-17 03:20:32 +04:00
|
|
|
#include <socket.h>
|
|
|
|
#endif
|
2012-08-14 03:10:05 +04:00
|
|
|
#ifdef EBSNET
|
|
|
|
#include "rtipapi.h" /* errno */
|
|
|
|
#include "socket.h"
|
|
|
|
#endif
|
2011-02-05 22:14:47 +03:00
|
|
|
#endif
|
|
|
|
#endif /* USE_WINDOWS_API */
|
|
|
|
|
|
|
|
#ifdef __sun
|
|
|
|
#include <sys/filio.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef USE_WINDOWS_API
|
|
|
|
/* no epipe yet */
|
|
|
|
#ifndef WSAEPIPE
|
|
|
|
#define WSAEPIPE -12345
|
|
|
|
#endif
|
|
|
|
#define SOCKET_EWOULDBLOCK WSAEWOULDBLOCK
|
2012-10-02 20:15:50 +04:00
|
|
|
#define SOCKET_EAGAIN WSAETIMEDOUT
|
2011-02-05 22:14:47 +03:00
|
|
|
#define SOCKET_ECONNRESET WSAECONNRESET
|
|
|
|
#define SOCKET_EINTR WSAEINTR
|
|
|
|
#define SOCKET_EPIPE WSAEPIPE
|
2012-09-21 20:36:01 +04:00
|
|
|
#define SOCKET_ECONNREFUSED WSAENOTCONN
|
2013-03-09 06:09:52 +04:00
|
|
|
#define SOCKET_ECONNABORTED WSAECONNABORTED
|
2011-07-13 23:25:08 +04:00
|
|
|
#elif defined(__PPU)
|
2011-07-13 00:28:48 +04:00
|
|
|
#define SOCKET_EWOULDBLOCK SYS_NET_EWOULDBLOCK
|
|
|
|
#define SOCKET_EAGAIN SYS_NET_EAGAIN
|
|
|
|
#define SOCKET_ECONNRESET SYS_NET_ECONNRESET
|
|
|
|
#define SOCKET_EINTR SYS_NET_EINTR
|
|
|
|
#define SOCKET_EPIPE SYS_NET_EPIPE
|
2012-09-21 20:36:01 +04:00
|
|
|
#define SOCKET_ECONNREFUSED SYS_NET_ECONNREFUSED
|
2013-03-09 06:09:52 +04:00
|
|
|
#define SOCKET_ECONNABORTED SYS_NET_ECONNABORTED
|
2012-11-01 21:23:42 +04:00
|
|
|
#elif defined(FREESCALE_MQX)
|
|
|
|
/* RTCS doesn't have an EWOULDBLOCK error */
|
|
|
|
#define SOCKET_EWOULDBLOCK EAGAIN
|
|
|
|
#define SOCKET_EAGAIN EAGAIN
|
|
|
|
#define SOCKET_ECONNRESET RTCSERR_TCP_CONN_RESET
|
|
|
|
#define SOCKET_EINTR EINTR
|
|
|
|
#define SOCKET_EPIPE EPIPE
|
|
|
|
#define SOCKET_ECONNREFUSED RTCSERR_TCP_CONN_REFUSED
|
2013-03-09 06:09:52 +04:00
|
|
|
#define SOCKET_ECONNABORTED RTCSERR_TCP_CONN_ABORTED
|
2013-05-21 04:56:27 +04:00
|
|
|
#elif defined(CYASSL_MDK_ARM)
|
|
|
|
#define SOCKET_EWOULDBLOCK SCK_EWOULDBLOCK
|
|
|
|
#define SOCKET_EAGAIN SCK_ELOCKED
|
|
|
|
#define SOCKET_ECONNRESET SCK_ECLOSED
|
|
|
|
#define SOCKET_EINTR SCK_ERROR
|
|
|
|
#define SOCKET_EPIPE SCK_ERROR
|
|
|
|
#define SOCKET_ECONNREFUSED SCK_ERROR
|
|
|
|
#define SOCKET_ECONNABORTED SCK_ERROR
|
2011-02-05 22:14:47 +03:00
|
|
|
#else
|
|
|
|
#define SOCKET_EWOULDBLOCK EWOULDBLOCK
|
|
|
|
#define SOCKET_EAGAIN EAGAIN
|
|
|
|
#define SOCKET_ECONNRESET ECONNRESET
|
|
|
|
#define SOCKET_EINTR EINTR
|
|
|
|
#define SOCKET_EPIPE EPIPE
|
2012-09-21 20:36:01 +04:00
|
|
|
#define SOCKET_ECONNREFUSED ECONNREFUSED
|
2013-03-09 06:09:52 +04:00
|
|
|
#define SOCKET_ECONNABORTED ECONNABORTED
|
2011-02-05 22:14:47 +03:00
|
|
|
#endif /* USE_WINDOWS_API */
|
|
|
|
|
|
|
|
|
|
|
|
#ifdef DEVKITPRO
|
|
|
|
/* from network.h */
|
|
|
|
int net_send(int, const void*, int, unsigned int);
|
|
|
|
int net_recv(int, void*, int, unsigned int);
|
|
|
|
#define SEND_FUNCTION net_send
|
|
|
|
#define RECV_FUNCTION net_recv
|
2012-08-16 04:00:11 +04:00
|
|
|
#elif defined(CYASSL_LWIP)
|
|
|
|
#define SEND_FUNCTION lwip_send
|
|
|
|
#define RECV_FUNCTION lwip_recv
|
2011-02-05 22:14:47 +03:00
|
|
|
#else
|
|
|
|
#define SEND_FUNCTION send
|
|
|
|
#define RECV_FUNCTION recv
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
2012-11-01 21:23:42 +04:00
|
|
|
/* Translates return codes returned from
|
|
|
|
* send() and recv() if need be.
|
|
|
|
*/
|
|
|
|
static INLINE int TranslateReturnCode(int old, int sd)
|
|
|
|
{
|
|
|
|
(void)sd;
|
|
|
|
|
|
|
|
#ifdef FREESCALE_MQX
|
|
|
|
if (old == 0) {
|
|
|
|
errno = SOCKET_EWOULDBLOCK;
|
|
|
|
return -1; /* convert to BSD style wouldblock as error */
|
|
|
|
}
|
|
|
|
|
|
|
|
if (old < 0) {
|
|
|
|
errno = RTCS_geterror(sd);
|
|
|
|
if (errno == RTCSERR_TCP_CONN_CLOSING)
|
|
|
|
return 0; /* convert to BSD style closing */
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return old;
|
|
|
|
}
|
|
|
|
|
2011-02-05 22:14:47 +03:00
|
|
|
static INLINE int LastError(void)
|
|
|
|
{
|
|
|
|
#ifdef USE_WINDOWS_API
|
|
|
|
return WSAGetLastError();
|
2012-08-14 03:10:05 +04:00
|
|
|
#elif defined(EBSNET)
|
2012-08-14 23:10:27 +04:00
|
|
|
return xn_getlasterror();
|
2011-02-05 22:14:47 +03:00
|
|
|
#else
|
|
|
|
return errno;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
/* The receive embedded callback
|
|
|
|
* return : nb bytes read, or error
|
|
|
|
*/
|
2012-09-07 09:41:55 +04:00
|
|
|
int EmbedReceive(CYASSL *ssl, char *buf, int sz, void *ctx)
|
2011-02-05 22:14:47 +03:00
|
|
|
{
|
|
|
|
int recvd;
|
|
|
|
int err;
|
2011-05-20 03:36:34 +04:00
|
|
|
int sd = *(int*)ctx;
|
2011-02-05 22:14:47 +03:00
|
|
|
|
2012-09-07 09:41:55 +04:00
|
|
|
#ifdef CYASSL_DTLS
|
2012-09-26 02:51:56 +04:00
|
|
|
{
|
|
|
|
int dtls_timeout = CyaSSL_dtls_get_current_timeout(ssl);
|
|
|
|
if (CyaSSL_dtls(ssl)
|
|
|
|
&& !CyaSSL_get_using_nonblock(ssl)
|
|
|
|
&& dtls_timeout != 0) {
|
|
|
|
#ifdef USE_WINDOWS_API
|
2012-10-04 02:29:28 +04:00
|
|
|
DWORD timeout = dtls_timeout * 1000;
|
2012-09-26 02:51:56 +04:00
|
|
|
#else
|
2013-03-16 01:21:36 +04:00
|
|
|
struct timeval timeout;
|
|
|
|
XMEMSET(&timeout, 0, sizeof(timeout));
|
|
|
|
timeout.tv_sec = dtls_timeout;
|
2012-09-26 02:51:56 +04:00
|
|
|
#endif
|
2013-02-20 00:53:58 +04:00
|
|
|
if (setsockopt(sd, SOL_SOCKET, SO_RCVTIMEO, (char*)&timeout,
|
2013-03-07 11:02:33 +04:00
|
|
|
sizeof(timeout)) != 0) {
|
2013-02-20 00:53:58 +04:00
|
|
|
CYASSL_MSG("setsockopt rcvtimeo failed");
|
|
|
|
}
|
2012-09-26 02:51:56 +04:00
|
|
|
}
|
2012-09-07 09:41:55 +04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2012-10-26 01:17:11 +04:00
|
|
|
recvd = (int)RECV_FUNCTION(sd, buf, sz, ssl->rflags);
|
2011-02-05 22:14:47 +03:00
|
|
|
|
2012-11-01 21:23:42 +04:00
|
|
|
recvd = TranslateReturnCode(recvd, sd);
|
|
|
|
|
2011-07-13 00:28:48 +04:00
|
|
|
if (recvd < 0) {
|
2011-02-05 22:14:47 +03:00
|
|
|
err = LastError();
|
2011-04-25 20:24:21 +04:00
|
|
|
CYASSL_MSG("Embed Receive error");
|
2011-02-05 22:14:47 +03:00
|
|
|
|
2011-04-25 20:24:21 +04:00
|
|
|
if (err == SOCKET_EWOULDBLOCK || err == SOCKET_EAGAIN) {
|
2012-09-29 02:10:35 +04:00
|
|
|
if (!CyaSSL_dtls(ssl) || CyaSSL_get_using_nonblock(ssl)) {
|
2012-09-07 09:41:55 +04:00
|
|
|
CYASSL_MSG(" Would block");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_WANT_READ;
|
2012-09-07 09:41:55 +04:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
CYASSL_MSG(" Socket timeout");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_TIMEOUT;
|
2012-09-07 09:41:55 +04:00
|
|
|
}
|
2011-04-25 20:24:21 +04:00
|
|
|
}
|
|
|
|
else if (err == SOCKET_ECONNRESET) {
|
|
|
|
CYASSL_MSG(" Connection reset");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_CONN_RST;
|
2011-04-25 20:24:21 +04:00
|
|
|
}
|
|
|
|
else if (err == SOCKET_EINTR) {
|
|
|
|
CYASSL_MSG(" Socket interrupted");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_ISR;
|
2011-04-25 20:24:21 +04:00
|
|
|
}
|
2012-09-21 20:36:01 +04:00
|
|
|
else if (err == SOCKET_ECONNREFUSED) {
|
|
|
|
CYASSL_MSG(" Connection refused");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_WANT_READ;
|
2012-09-21 20:36:01 +04:00
|
|
|
}
|
2013-03-09 06:09:52 +04:00
|
|
|
else if (err == SOCKET_ECONNABORTED) {
|
|
|
|
CYASSL_MSG(" Connection aborted");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_CONN_CLOSE;
|
2013-03-09 06:09:52 +04:00
|
|
|
}
|
2011-04-25 20:24:21 +04:00
|
|
|
else {
|
|
|
|
CYASSL_MSG(" General error");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_GENERAL;
|
2011-04-25 20:24:21 +04:00
|
|
|
}
|
2011-02-05 22:14:47 +03:00
|
|
|
}
|
2011-04-25 20:24:21 +04:00
|
|
|
else if (recvd == 0) {
|
|
|
|
CYASSL_MSG("Embed receive connection closed");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_CONN_CLOSE;
|
2011-04-25 20:24:21 +04:00
|
|
|
}
|
2011-02-05 22:14:47 +03:00
|
|
|
|
|
|
|
return recvd;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* The send embedded callback
|
|
|
|
* return : nb bytes sent, or error
|
|
|
|
*/
|
2012-09-07 09:41:55 +04:00
|
|
|
int EmbedSend(CYASSL* ssl, char *buf, int sz, void *ctx)
|
2011-02-05 22:14:47 +03:00
|
|
|
{
|
2011-05-20 03:36:34 +04:00
|
|
|
int sd = *(int*)ctx;
|
2011-02-05 22:14:47 +03:00
|
|
|
int sent;
|
|
|
|
int len = sz;
|
2011-04-25 20:24:21 +04:00
|
|
|
int err;
|
2011-02-05 22:14:47 +03:00
|
|
|
|
2012-10-26 01:17:11 +04:00
|
|
|
sent = (int)SEND_FUNCTION(sd, &buf[sz - len], len, ssl->wflags);
|
2011-02-05 22:14:47 +03:00
|
|
|
|
2011-07-13 00:28:48 +04:00
|
|
|
if (sent < 0) {
|
2011-04-25 20:24:21 +04:00
|
|
|
err = LastError();
|
|
|
|
CYASSL_MSG("Embed Send error");
|
2011-02-05 22:14:47 +03:00
|
|
|
|
2011-04-25 20:24:21 +04:00
|
|
|
if (err == SOCKET_EWOULDBLOCK || err == SOCKET_EAGAIN) {
|
|
|
|
CYASSL_MSG(" Would Block");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_WANT_WRITE;
|
2011-04-25 20:24:21 +04:00
|
|
|
}
|
|
|
|
else if (err == SOCKET_ECONNRESET) {
|
|
|
|
CYASSL_MSG(" Connection reset");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_CONN_RST;
|
2011-04-25 20:24:21 +04:00
|
|
|
}
|
|
|
|
else if (err == SOCKET_EINTR) {
|
|
|
|
CYASSL_MSG(" Socket interrupted");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_ISR;
|
2011-04-25 20:24:21 +04:00
|
|
|
}
|
|
|
|
else if (err == SOCKET_EPIPE) {
|
|
|
|
CYASSL_MSG(" Socket EPIPE");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_CONN_CLOSE;
|
2011-04-25 20:24:21 +04:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
CYASSL_MSG(" General error");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_GENERAL;
|
2011-04-25 20:24:21 +04:00
|
|
|
}
|
2011-02-05 22:14:47 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return sent;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-08-09 04:21:03 +04:00
|
|
|
#ifdef CYASSL_DTLS
|
|
|
|
|
|
|
|
#include <cyassl/ctaocrypt/sha.h>
|
|
|
|
|
2012-08-14 02:05:28 +04:00
|
|
|
#ifdef USE_WINDOWS_API
|
|
|
|
#define XSOCKLENT int
|
|
|
|
#else
|
|
|
|
#define XSOCKLENT socklen_t
|
|
|
|
#endif
|
|
|
|
|
2012-10-02 20:15:50 +04:00
|
|
|
#define SENDTO_FUNCTION sendto
|
|
|
|
#define RECVFROM_FUNCTION recvfrom
|
|
|
|
|
|
|
|
|
|
|
|
/* The receive embedded callback
|
|
|
|
* return : nb bytes read, or error
|
|
|
|
*/
|
|
|
|
int EmbedReceiveFrom(CYASSL *ssl, char *buf, int sz, void *ctx)
|
|
|
|
{
|
|
|
|
CYASSL_DTLS_CTX* dtlsCtx = (CYASSL_DTLS_CTX*)ctx;
|
|
|
|
int recvd;
|
|
|
|
int err;
|
|
|
|
int sd = dtlsCtx->fd;
|
|
|
|
int dtls_timeout = CyaSSL_dtls_get_current_timeout(ssl);
|
|
|
|
struct sockaddr_in peer;
|
|
|
|
XSOCKLENT peerSz = sizeof(peer);
|
|
|
|
|
|
|
|
CYASSL_ENTER("EmbedReceiveFrom()");
|
2013-02-20 00:53:58 +04:00
|
|
|
|
2012-10-02 20:15:50 +04:00
|
|
|
if (!CyaSSL_get_using_nonblock(ssl) && dtls_timeout != 0) {
|
|
|
|
#ifdef USE_WINDOWS_API
|
2012-10-04 02:29:28 +04:00
|
|
|
DWORD timeout = dtls_timeout * 1000;
|
2012-10-02 20:15:50 +04:00
|
|
|
#else
|
2013-03-16 01:21:36 +04:00
|
|
|
struct timeval timeout;
|
|
|
|
XMEMSET(&timeout, 0, sizeof(timeout));
|
|
|
|
timeout.tv_sec = dtls_timeout;
|
2012-10-02 20:15:50 +04:00
|
|
|
#endif
|
2013-02-20 00:53:58 +04:00
|
|
|
if (setsockopt(sd, SOL_SOCKET, SO_RCVTIMEO, (char*)&timeout,
|
2013-03-07 11:02:33 +04:00
|
|
|
sizeof(timeout)) != 0) {
|
2013-02-20 00:53:58 +04:00
|
|
|
CYASSL_MSG("setsockopt rcvtimeo failed");
|
|
|
|
}
|
2012-10-02 20:15:50 +04:00
|
|
|
}
|
|
|
|
|
2012-10-26 01:17:11 +04:00
|
|
|
recvd = (int)RECVFROM_FUNCTION(sd, buf, sz, ssl->rflags,
|
2012-10-19 23:44:23 +04:00
|
|
|
(struct sockaddr*)&peer, &peerSz);
|
2012-10-02 20:15:50 +04:00
|
|
|
|
2012-11-01 21:23:42 +04:00
|
|
|
recvd = TranslateReturnCode(recvd, sd);
|
|
|
|
|
2012-10-02 20:15:50 +04:00
|
|
|
if (recvd < 0) {
|
|
|
|
err = LastError();
|
|
|
|
CYASSL_MSG("Embed Receive From error");
|
|
|
|
|
|
|
|
if (err == SOCKET_EWOULDBLOCK || err == SOCKET_EAGAIN) {
|
|
|
|
if (CyaSSL_get_using_nonblock(ssl)) {
|
|
|
|
CYASSL_MSG(" Would block");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_WANT_READ;
|
2012-10-02 20:15:50 +04:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
CYASSL_MSG(" Socket timeout");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_TIMEOUT;
|
2012-10-02 20:15:50 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else if (err == SOCKET_ECONNRESET) {
|
|
|
|
CYASSL_MSG(" Connection reset");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_CONN_RST;
|
2012-10-02 20:15:50 +04:00
|
|
|
}
|
|
|
|
else if (err == SOCKET_EINTR) {
|
|
|
|
CYASSL_MSG(" Socket interrupted");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_ISR;
|
2012-10-02 20:15:50 +04:00
|
|
|
}
|
|
|
|
else if (err == SOCKET_ECONNREFUSED) {
|
|
|
|
CYASSL_MSG(" Connection refused");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_WANT_READ;
|
2012-10-02 20:15:50 +04:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
CYASSL_MSG(" General error");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_GENERAL;
|
2012-10-02 20:15:50 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
2013-02-20 00:53:58 +04:00
|
|
|
if (dtlsCtx->peer.sz > 0
|
2012-10-10 03:13:05 +04:00
|
|
|
&& peerSz != (XSOCKLENT)dtlsCtx->peer.sz
|
2012-10-02 20:15:50 +04:00
|
|
|
&& memcmp(&peer, dtlsCtx->peer.sa, peerSz) != 0) {
|
|
|
|
CYASSL_MSG(" Ignored packet from invalid peer");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_WANT_READ;
|
2012-10-02 20:15:50 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return recvd;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* The send embedded callback
|
|
|
|
* return : nb bytes sent, or error
|
|
|
|
*/
|
|
|
|
int EmbedSendTo(CYASSL* ssl, char *buf, int sz, void *ctx)
|
|
|
|
{
|
|
|
|
CYASSL_DTLS_CTX* dtlsCtx = (CYASSL_DTLS_CTX*)ctx;
|
|
|
|
int sd = dtlsCtx->fd;
|
|
|
|
int sent;
|
|
|
|
int len = sz;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
CYASSL_ENTER("EmbedSendTo()");
|
2013-02-20 00:53:58 +04:00
|
|
|
|
2012-10-26 01:17:11 +04:00
|
|
|
sent = (int)SENDTO_FUNCTION(sd, &buf[sz - len], len, ssl->wflags,
|
2012-10-19 23:44:23 +04:00
|
|
|
dtlsCtx->peer.sa, dtlsCtx->peer.sz);
|
2012-10-02 20:15:50 +04:00
|
|
|
if (sent < 0) {
|
|
|
|
err = LastError();
|
|
|
|
CYASSL_MSG("Embed Send To error");
|
|
|
|
|
|
|
|
if (err == SOCKET_EWOULDBLOCK || err == SOCKET_EAGAIN) {
|
|
|
|
CYASSL_MSG(" Would Block");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_WANT_WRITE;
|
2012-10-02 20:15:50 +04:00
|
|
|
}
|
|
|
|
else if (err == SOCKET_ECONNRESET) {
|
|
|
|
CYASSL_MSG(" Connection reset");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_CONN_RST;
|
2012-10-02 20:15:50 +04:00
|
|
|
}
|
|
|
|
else if (err == SOCKET_EINTR) {
|
|
|
|
CYASSL_MSG(" Socket interrupted");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_ISR;
|
2012-10-02 20:15:50 +04:00
|
|
|
}
|
|
|
|
else if (err == SOCKET_EPIPE) {
|
|
|
|
CYASSL_MSG(" Socket EPIPE");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_CONN_CLOSE;
|
2012-10-02 20:15:50 +04:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
CYASSL_MSG(" General error");
|
2013-04-16 23:32:55 +04:00
|
|
|
return CYASSL_CBIO_ERR_GENERAL;
|
2012-10-02 20:15:50 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return sent;
|
|
|
|
}
|
|
|
|
|
2012-08-14 02:05:28 +04:00
|
|
|
|
2012-08-08 21:38:12 +04:00
|
|
|
/* The DTLS Generate Cookie callback
|
|
|
|
* return : number of bytes copied into buf, or error
|
|
|
|
*/
|
2013-03-14 03:41:50 +04:00
|
|
|
int EmbedGenerateCookie(CYASSL* ssl, byte *buf, int sz, void *ctx)
|
2012-08-08 21:38:12 +04:00
|
|
|
{
|
|
|
|
int sd = ssl->wfd;
|
2012-08-14 02:05:28 +04:00
|
|
|
struct sockaddr_in peer;
|
|
|
|
XSOCKLENT peerSz = sizeof(peer);
|
|
|
|
byte cookieSrc[sizeof(struct in_addr) + sizeof(int)];
|
2012-08-08 21:38:12 +04:00
|
|
|
int cookieSrcSz = 0;
|
|
|
|
Sha sha;
|
|
|
|
|
2013-03-14 03:41:50 +04:00
|
|
|
(void)ctx;
|
|
|
|
|
2013-02-20 00:53:58 +04:00
|
|
|
if (getpeername(sd, (struct sockaddr*)&peer, &peerSz) != 0) {
|
|
|
|
CYASSL_MSG("getpeername failed in EmbedGenerateCookie");
|
|
|
|
return GEN_COOKIE_E;
|
|
|
|
}
|
2012-08-08 21:38:12 +04:00
|
|
|
|
2012-08-14 02:05:28 +04:00
|
|
|
if (peer.sin_family == AF_INET) {
|
2012-08-08 21:38:12 +04:00
|
|
|
struct sockaddr_in *s = (struct sockaddr_in*)&peer;
|
|
|
|
|
|
|
|
cookieSrcSz = sizeof(struct in_addr) + sizeof(s->sin_port);
|
|
|
|
XMEMCPY(cookieSrc, &s->sin_port, sizeof(s->sin_port));
|
|
|
|
XMEMCPY(cookieSrc + sizeof(s->sin_port),
|
|
|
|
&s->sin_addr, sizeof(struct in_addr));
|
|
|
|
}
|
|
|
|
|
|
|
|
InitSha(&sha);
|
|
|
|
ShaUpdate(&sha, cookieSrc, cookieSrcSz);
|
2012-08-14 02:05:28 +04:00
|
|
|
|
|
|
|
if (sz < SHA_DIGEST_SIZE) {
|
|
|
|
byte digest[SHA_DIGEST_SIZE];
|
|
|
|
ShaFinal(&sha, digest);
|
|
|
|
XMEMCPY(buf, digest, sz);
|
|
|
|
return sz;
|
|
|
|
}
|
|
|
|
|
2012-08-08 21:38:12 +04:00
|
|
|
ShaFinal(&sha, buf);
|
|
|
|
|
|
|
|
return SHA_DIGEST_SIZE;
|
|
|
|
}
|
|
|
|
|
2012-08-09 04:21:03 +04:00
|
|
|
#endif /* CYASSL_DTLS */
|
|
|
|
|
2013-01-04 05:19:56 +04:00
|
|
|
#ifdef HAVE_OCSP
|
|
|
|
|
|
|
|
#ifdef TEST_IPV6
|
|
|
|
typedef struct sockaddr_in6 SOCKADDR_IN_T;
|
|
|
|
#define AF_INET_V AF_INET6
|
|
|
|
#else
|
|
|
|
typedef struct sockaddr_in SOCKADDR_IN_T;
|
|
|
|
#define AF_INET_V AF_INET
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
2013-01-04 22:34:29 +04:00
|
|
|
static INLINE int tcp_connect(SOCKET_T* sockfd, const char* ip, word16 port)
|
2013-01-04 05:19:56 +04:00
|
|
|
{
|
2013-01-04 22:34:29 +04:00
|
|
|
SOCKADDR_IN_T addr;
|
|
|
|
const char* host = ip;
|
2013-01-04 05:19:56 +04:00
|
|
|
|
|
|
|
/* peer could be in human readable form */
|
2013-01-04 22:34:29 +04:00
|
|
|
if (ip != INADDR_ANY && isalpha(ip[0])) {
|
|
|
|
struct hostent* entry = gethostbyname(ip);
|
2013-01-04 05:19:56 +04:00
|
|
|
|
|
|
|
if (entry) {
|
|
|
|
struct sockaddr_in tmp;
|
|
|
|
XMEMSET(&tmp, 0, sizeof(struct sockaddr_in));
|
|
|
|
XMEMCPY(&tmp.sin_addr.s_addr, entry->h_addr_list[0],
|
|
|
|
entry->h_length);
|
|
|
|
host = inet_ntoa(tmp.sin_addr);
|
|
|
|
}
|
|
|
|
else {
|
2013-01-04 22:34:29 +04:00
|
|
|
CYASSL_MSG("no addr entry for OCSP responder");
|
|
|
|
return -1;
|
2013-01-04 05:19:56 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
*sockfd = socket(AF_INET_V, SOCK_STREAM, 0);
|
2013-02-21 03:26:22 +04:00
|
|
|
if (*sockfd < 0) {
|
|
|
|
CYASSL_MSG("bad socket fd, out of fds?");
|
|
|
|
return -1;
|
|
|
|
}
|
2013-01-04 22:34:29 +04:00
|
|
|
XMEMSET(&addr, 0, sizeof(SOCKADDR_IN_T));
|
2013-01-04 05:19:56 +04:00
|
|
|
|
2013-01-04 22:34:29 +04:00
|
|
|
addr.sin_family = AF_INET_V;
|
|
|
|
addr.sin_port = htons(port);
|
2013-01-04 05:19:56 +04:00
|
|
|
if (host == INADDR_ANY)
|
2013-01-04 22:34:29 +04:00
|
|
|
addr.sin_addr.s_addr = INADDR_ANY;
|
2013-01-04 05:19:56 +04:00
|
|
|
else
|
2013-01-04 22:34:29 +04:00
|
|
|
addr.sin_addr.s_addr = inet_addr(host);
|
2013-01-04 05:19:56 +04:00
|
|
|
|
|
|
|
if (connect(*sockfd, (const struct sockaddr*)&addr, sizeof(addr)) != 0) {
|
2013-01-04 22:34:29 +04:00
|
|
|
CYASSL_MSG("OCSP responder tcp connect failed");
|
|
|
|
return -1;
|
2013-01-04 05:19:56 +04:00
|
|
|
}
|
2013-01-04 22:34:29 +04:00
|
|
|
|
|
|
|
return 0;
|
2013-01-04 05:19:56 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int build_http_request(const char* domainName, const char* path,
|
|
|
|
int ocspReqSz, byte* buf, int bufSize)
|
|
|
|
{
|
|
|
|
return snprintf((char*)buf, bufSize,
|
|
|
|
"POST %s HTTP/1.1\r\n"
|
|
|
|
"Host: %s\r\n"
|
|
|
|
"Content-Length: %d\r\n"
|
|
|
|
"Content-Type: application/ocsp-request\r\n"
|
|
|
|
"\r\n",
|
|
|
|
path, domainName, ocspReqSz);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int decode_http_response(byte* httpBuf, int httpBufSz, byte** dst)
|
|
|
|
{
|
|
|
|
int idx = 0;
|
|
|
|
int stop = 0;
|
|
|
|
int len = 0;
|
|
|
|
byte* contentType = NULL;
|
|
|
|
byte* contentLength = NULL;
|
|
|
|
char* buf = (char*)httpBuf; /* kludge so I'm not constantly casting */
|
|
|
|
|
|
|
|
if (XSTRNCASECMP(buf, "HTTP/1", 6) != 0)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
idx = 9; /* sets to the first byte after "HTTP/1.X ", which should be the
|
|
|
|
* HTTP result code */
|
|
|
|
|
|
|
|
if (XSTRNCASECMP(&buf[idx], "200 OK", 6) != 0)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
idx += 8;
|
|
|
|
|
|
|
|
while (idx < httpBufSz && !stop) {
|
|
|
|
if (buf[idx] == '\r' && buf[idx+1] == '\n') {
|
|
|
|
stop = 1;
|
|
|
|
idx += 2;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
if (contentType == NULL &&
|
|
|
|
XSTRNCASECMP(&buf[idx], "Content-Type:", 13) == 0) {
|
|
|
|
idx += 13;
|
|
|
|
if (buf[idx] == ' ') idx++;
|
|
|
|
if (XSTRNCASECMP(&buf[idx],
|
|
|
|
"application/ocsp-response", 25) != 0) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
idx += 27;
|
|
|
|
}
|
|
|
|
else if (contentLength == NULL &&
|
|
|
|
XSTRNCASECMP(&buf[idx], "Content-Length:", 15) == 0) {
|
|
|
|
idx += 15;
|
|
|
|
if (buf[idx] == ' ') idx++;
|
|
|
|
while (buf[idx] >= '0' && buf[idx] <= '9' && idx < httpBufSz) {
|
|
|
|
len = (len * 10) + (buf[idx] - '0');
|
|
|
|
idx++;
|
|
|
|
}
|
|
|
|
idx += 2; /* skip the crlf */
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
/* Advance idx past the next \r\n */
|
|
|
|
char* end = XSTRSTR(&buf[idx], "\r\n");
|
|
|
|
idx = (int)(end - buf + 2);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (len > 0) {
|
|
|
|
*dst = (byte*)XMALLOC(len, NULL, DYNAMIC_TYPE_IN_BUFFER);
|
|
|
|
XMEMCPY(*dst, httpBuf + idx, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int decode_url(const char* url, int urlSz,
|
|
|
|
char* outName, char* outPath, int* outPort)
|
|
|
|
{
|
2013-05-25 04:23:07 +04:00
|
|
|
int result = -1;
|
|
|
|
|
2013-01-04 05:19:56 +04:00
|
|
|
if (outName != NULL && outPath != NULL && outPort != NULL)
|
|
|
|
{
|
|
|
|
if (url == NULL || urlSz == 0)
|
|
|
|
{
|
|
|
|
*outName = 0;
|
|
|
|
*outPath = 0;
|
|
|
|
*outPort = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
int i, cur;
|
|
|
|
|
|
|
|
/* need to break the url down into scheme, address, and port */
|
|
|
|
/* "http://example.com:8080/" */
|
|
|
|
if (XSTRNCMP(url, "http://", 7) == 0) {
|
|
|
|
cur = 7;
|
|
|
|
} else cur = 0;
|
|
|
|
|
|
|
|
i = 0;
|
2013-05-25 04:23:07 +04:00
|
|
|
while (url[cur] != 0 && url[cur] != ':' &&
|
|
|
|
url[cur] != '/' && cur < urlSz) {
|
2013-01-04 05:19:56 +04:00
|
|
|
outName[i++] = url[cur++];
|
|
|
|
}
|
|
|
|
outName[i] = 0;
|
|
|
|
/* Need to pick out the path after the domain name */
|
|
|
|
|
|
|
|
if (cur < urlSz && url[cur] == ':') {
|
|
|
|
char port[6];
|
|
|
|
int j;
|
|
|
|
i = 0;
|
|
|
|
cur++;
|
|
|
|
while (cur < urlSz && url[cur] != 0 && url[cur] != '/' &&
|
|
|
|
i < 6) {
|
|
|
|
port[i++] = url[cur++];
|
|
|
|
}
|
|
|
|
|
|
|
|
*outPort = 0;
|
|
|
|
for (j = 0; j < i; j++) {
|
|
|
|
if (port[j] < '0' || port[j] > '9') return -1;
|
|
|
|
*outPort = (*outPort * 10) + (port[j] - '0');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
*outPort = 80;
|
|
|
|
|
|
|
|
if (cur < urlSz && url[cur] == '/') {
|
|
|
|
i = 0;
|
|
|
|
while (cur < urlSz && url[cur] != 0 && i < 80) {
|
|
|
|
outPath[i++] = url[cur++];
|
|
|
|
}
|
|
|
|
outPath[i] = 0;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
outPath[0] = '/';
|
|
|
|
outPath[1] = 0;
|
|
|
|
}
|
2013-05-25 04:23:07 +04:00
|
|
|
result = 0;
|
2013-01-04 05:19:56 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-25 04:23:07 +04:00
|
|
|
return result;
|
2013-01-04 05:19:56 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#define SCRATCH_BUFFER_SIZE 2048
|
|
|
|
|
|
|
|
int EmbedOcspLookup(void* ctx, const char* url, int urlSz,
|
|
|
|
byte* ocspReqBuf, int ocspReqSz, byte** ocspRespBuf)
|
|
|
|
{
|
|
|
|
char domainName[80], path[80];
|
2013-02-21 03:26:22 +04:00
|
|
|
int port, httpBufSz, sfd = -1;
|
2013-01-04 05:58:45 +04:00
|
|
|
int ocspRespSz = 0;
|
2013-01-04 05:19:56 +04:00
|
|
|
byte* httpBuf = NULL;
|
|
|
|
|
|
|
|
(void)ctx;
|
|
|
|
|
2013-01-04 05:58:45 +04:00
|
|
|
if (ocspReqBuf == NULL || ocspReqSz == 0) {
|
|
|
|
CYASSL_MSG("OCSP request is required for lookup");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ocspRespBuf == NULL) {
|
|
|
|
CYASSL_MSG("Cannot save OCSP response");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2013-01-04 05:19:56 +04:00
|
|
|
if (decode_url(url, urlSz, domainName, path, &port) < 0) {
|
|
|
|
CYASSL_MSG("Unable to decode OCSP URL");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
httpBufSz = SCRATCH_BUFFER_SIZE;
|
|
|
|
httpBuf = (byte*)XMALLOC(httpBufSz, NULL, DYNAMIC_TYPE_IN_BUFFER);
|
|
|
|
|
|
|
|
if (httpBuf == NULL) {
|
|
|
|
CYASSL_MSG("Unable to create OCSP response buffer");
|
|
|
|
return -1;
|
|
|
|
}
|
2013-01-04 05:58:45 +04:00
|
|
|
*ocspRespBuf = httpBuf;
|
2013-01-04 05:19:56 +04:00
|
|
|
|
|
|
|
httpBufSz = build_http_request(domainName, path, ocspReqSz,
|
|
|
|
httpBuf, httpBufSz);
|
|
|
|
|
2013-01-04 22:34:29 +04:00
|
|
|
if ((tcp_connect(&sfd, domainName, port) == 0) && (sfd > 0)) {
|
2013-01-04 05:19:56 +04:00
|
|
|
int written;
|
2013-05-25 04:23:07 +04:00
|
|
|
written = (int)send(sfd, httpBuf, httpBufSz, 0);
|
2013-01-04 05:19:56 +04:00
|
|
|
if (written == httpBufSz) {
|
2013-05-25 04:23:07 +04:00
|
|
|
written = (int)send(sfd, ocspReqBuf, ocspReqSz, 0);
|
2013-01-04 05:19:56 +04:00
|
|
|
if (written == ocspReqSz) {
|
2013-05-25 04:23:07 +04:00
|
|
|
httpBufSz = (int)recv(sfd, httpBuf, SCRATCH_BUFFER_SIZE, 0);
|
2013-01-04 05:19:56 +04:00
|
|
|
if (httpBufSz > 0) {
|
|
|
|
ocspRespSz = decode_http_response(httpBuf, httpBufSz,
|
|
|
|
ocspRespBuf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
close(sfd);
|
|
|
|
if (ocspRespSz == 0) {
|
|
|
|
CYASSL_MSG("OCSP response was not OK, no OCSP response");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
CYASSL_MSG("OCSP Responder connection failed");
|
2013-02-21 03:26:22 +04:00
|
|
|
close(sfd);
|
2013-01-04 05:19:56 +04:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ocspRespSz;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void EmbedOcspRespFree(void* ctx, byte *resp)
|
|
|
|
{
|
|
|
|
(void)ctx;
|
|
|
|
|
|
|
|
if (resp)
|
|
|
|
XFREE(resp, NULL, DYNAMIC_TYPE_IN_BUFFER);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#endif
|
2012-08-08 21:38:12 +04:00
|
|
|
|
2011-02-05 22:14:47 +03:00
|
|
|
#endif /* CYASSL_USER_IO */
|
|
|
|
|
2011-08-27 01:40:51 +04:00
|
|
|
CYASSL_API void CyaSSL_SetIORecv(CYASSL_CTX *ctx, CallbackIORecv CBIORecv)
|
2011-02-05 22:14:47 +03:00
|
|
|
{
|
|
|
|
ctx->CBIORecv = CBIORecv;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-08-27 01:40:51 +04:00
|
|
|
CYASSL_API void CyaSSL_SetIOSend(CYASSL_CTX *ctx, CallbackIOSend CBIOSend)
|
2011-02-05 22:14:47 +03:00
|
|
|
{
|
|
|
|
ctx->CBIOSend = CBIOSend;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-08-27 01:40:51 +04:00
|
|
|
CYASSL_API void CyaSSL_SetIOReadCtx(CYASSL* ssl, void *rctx)
|
2011-02-05 22:14:47 +03:00
|
|
|
{
|
|
|
|
ssl->IOCB_ReadCtx = rctx;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-08-27 01:40:51 +04:00
|
|
|
CYASSL_API void CyaSSL_SetIOWriteCtx(CYASSL* ssl, void *wctx)
|
2011-02-05 22:14:47 +03:00
|
|
|
{
|
|
|
|
ssl->IOCB_WriteCtx = wctx;
|
|
|
|
}
|
|
|
|
|
2012-10-26 01:17:11 +04:00
|
|
|
|
|
|
|
CYASSL_API void CyaSSL_SetIOReadFlags(CYASSL* ssl, int flags)
|
|
|
|
{
|
|
|
|
ssl->rflags = flags;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
CYASSL_API void CyaSSL_SetIOWriteFlags(CYASSL* ssl, int flags)
|
|
|
|
{
|
|
|
|
ssl->wflags = flags;
|
|
|
|
}
|
|
|
|
|
2013-03-14 03:41:50 +04:00
|
|
|
|
|
|
|
#ifdef CYASSL_DTLS
|
|
|
|
|
|
|
|
CYASSL_API void CyaSSL_CTX_SetGenCookie(CYASSL_CTX* ctx, CallbackGenCookie cb)
|
|
|
|
{
|
|
|
|
ctx->CBIOCookie = cb;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
CYASSL_API void CyaSSL_SetCookieCtx(CYASSL* ssl, void *ctx)
|
|
|
|
{
|
|
|
|
ssl->IOCB_CookieCtx = ctx;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CYASSL_DTLS */
|
|
|
|
|
|
|
|
|
2013-01-04 05:19:56 +04:00
|
|
|
#ifdef HAVE_OCSP
|
|
|
|
|
|
|
|
CYASSL_API void CyaSSL_SetIOOcsp(CYASSL_CTX* ctx, CallbackIOOcsp cb)
|
|
|
|
{
|
|
|
|
ctx->ocsp.CBIOOcsp = cb;
|
|
|
|
}
|
|
|
|
|
|
|
|
CYASSL_API void CyaSSL_SetIOOcspRespFree(CYASSL_CTX* ctx,
|
|
|
|
CallbackIOOcspRespFree cb)
|
|
|
|
{
|
|
|
|
ctx->ocsp.CBIOOcspRespFree = cb;
|
|
|
|
}
|
|
|
|
|
|
|
|
CYASSL_API void CyaSSL_SetIOOcspCtx(CYASSL_CTX* ctx, void *octx)
|
|
|
|
{
|
|
|
|
ctx->ocsp.IOCB_OcspCtx = octx;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|