2 * Copyright (c) 1995-2001, Index Data
3 * See the file LICENSE for details.
6 * Revision 1.43 2001-10-22 16:00:04 adam
7 * Renamed states for COMSTACKs to avoid confusion with events.
9 * Revision 1.42 2001/10/22 13:57:24 adam
10 * Implemented cs_rcvconnect and cs_look as described in the documentation.
12 * Revision 1.41 2001/10/12 21:49:26 adam
13 * For accept/recv/send check for EAGAIN if it's differs from EWOULDBLOCK.
15 * Revision 1.40 2001/08/23 09:02:46 adam
16 * WIN32 fixes: Socket not re-used for bind. yaz_log logs WIN32 error
19 * Revision 1.39 2001/07/19 19:49:40 adam
20 * Fixed bug in tcpip_set_blocking.
22 * Revision 1.38 2001/03/21 12:43:36 adam
23 * Implemented cs_create_host. Better error reporting for SSL comstack.
25 * Revision 1.37 2001/03/08 20:18:55 adam
26 * Added cs_set_blocking. Patch from Matthew Carey.
28 * Revision 1.36 2001/02/21 13:46:53 adam
31 * Revision 1.35 2000/11/27 15:17:40 adam
32 * Using SSLeay_add_all_algorithms instead of OpenSSL_add_all_algorithms.
34 * Revision 1.34 2000/11/23 10:58:32 adam
35 * SSL comstack support. Separate POSIX thread support library.
37 * Revision 1.33 2000/09/04 08:27:11 adam
38 * Work on error handling for tcpip_accept.
40 * Revision 1.32 1999/11/30 13:47:11 adam
41 * Improved installation. Moved header files to include/yaz.
43 * Revision 1.31 1999/04/29 07:31:23 adam
44 * Changed tcpip_strtoaddr_ex so that only part 'till '/' is considered
47 * Revision 1.30 1999/04/20 09:56:48 adam
48 * Added 'name' paramter to encoder/decoder routines (typedef Odr_fun).
49 * Modified all encoders/decoders to reflect this change.
51 * Revision 1.29 1999/04/16 14:45:55 adam
52 * Added interface for tcpd wrapper for access control.
54 * Revision 1.28 1999/03/31 11:11:14 adam
55 * Function getprotobyname only called once. Minor change in tcpip_get
56 * to handle multi-threaded conditions.
58 * Revision 1.27 1999/02/02 13:57:31 adam
59 * Uses preprocessor define WIN32 instead of WINDOWS to build code
60 * for Microsoft WIN32.
62 * Revision 1.26 1999/01/08 11:23:14 adam
63 * Added const modifier to some of the BER/ODR encoding routines.
65 * Revision 1.25 1998/07/07 15:49:23 adam
66 * Added braces to avoid warning.
68 * Revision 1.24 1998/06/29 07:59:17 adam
71 * Revision 1.23 1998/06/23 15:37:50 adam
72 * Added type cast to prevent warning.
74 * Revision 1.22 1998/06/22 11:32:36 adam
75 * Added 'conditional cs_listen' feature.
77 * Revision 1.21 1998/05/20 09:55:32 adam
78 * Function tcpip_get treats EINPROGRESS error in the same way as
79 * EWOULDBLOCK. EINPROGRESS shouldn't be returned - but it is on
80 * Solaris in some cases.
82 * Revision 1.20 1998/05/18 10:10:40 adam
83 * Minor change to avoid C++ warning.
85 * Revision 1.19 1998/02/11 11:53:33 adam
86 * Changed code so that it compiles as C++.
88 * Revision 1.18 1997/09/29 07:15:25 adam
89 * Changed use of setsockopt to avoid warnings on MSVC.
91 * Revision 1.17 1997/09/17 12:10:30 adam
94 * Revision 1.16 1997/09/01 08:49:14 adam
95 * New windows NT/95 port using MSV5.0. Minor changes only.
97 * Revision 1.15 1997/05/14 06:53:33 adam
100 * Revision 1.14 1997/05/01 15:06:32 adam
101 * Moved WINSOCK init. code to tcpip_init routine.
103 * Revision 1.13 1996/11/01 08:45:18 adam
104 * Bug fix: used close on MS-Windows. Fixed to closesocket.
106 * Revision 1.12 1996/07/06 19:58:30 quinn
107 * System headerfiles gathered in yconfig
109 * Revision 1.11 1996/02/23 10:00:39 quinn
112 * Revision 1.10 1996/02/20 12:52:11 quinn
113 * WAIS protocol support.
115 * Revision 1.9 1996/02/10 12:23:11 quinn
116 * Enablie inetd operations fro TCP/IP stack
118 * Revision 1.8 1995/11/01 13:54:27 quinn
121 * Revision 1.7 1995/10/30 12:41:16 quinn
122 * Added hostname lookup for server.
124 * Revision 1.6 1995/09/29 17:12:00 quinn
127 * Revision 1.5 1995/09/29 17:01:48 quinn
130 * Revision 1.4 1995/09/28 10:12:26 quinn
131 * Windows-support changes
133 * Revision 1.3 1995/09/27 15:02:45 quinn
134 * Modified function heads & prototypes.
136 * Revision 1.2 1995/06/15 12:30:06 quinn
137 * Added @ as hostname alias for INADDR ANY.
139 * Revision 1.1 1995/06/14 09:58:20 quinn
140 * Renamed yazlib to comstack.
142 * Revision 1.20 1995/05/16 08:51:16 quinn
143 * License, documentation, and memory fixes
145 * Revision 1.19 1995/04/10 10:24:08 quinn
148 * Revision 1.18 1995/03/30 13:29:27 quinn
149 * Added REUSEADDR in tcpip_bind
151 * Revision 1.17 1995/03/27 08:36:10 quinn
152 * Some work on nonblocking operation in xmosi.c and rfct.c.
153 * Added protocol parameter to cs_create()
155 * Revision 1.16 1995/03/21 15:53:41 quinn
158 * Revision 1.15 1995/03/21 12:31:27 quinn
159 * Added check for EINPROGRESS on connect.
161 * Revision 1.14 1995/03/20 09:47:21 quinn
162 * Added server-side support to xmosi.c
163 * Fixed possible problems in rfct
166 * Revision 1.13 1995/03/15 16:15:13 adam
169 * Revision 1.12 1995/03/15 15:36:27 quinn
170 * Mods to support nonblocking I/O
172 * Revision 1.11 1995/03/15 08:37:57 quinn
173 * Now we're pretty much set for nonblocking I/O.
175 * Revision 1.10 1995/03/14 17:00:07 quinn
176 * Bug-fixes - added tracing info to tcpip.c
178 * Revision 1.9 1995/03/14 10:28:42 quinn
179 * Adding server-side support to tcpip.c and fixing bugs in nonblocking I/O
181 * Revision 1.8 1995/03/10 14:22:50 quinn
182 * Removed debug output.
184 * Revision 1.7 1995/03/10 11:44:59 quinn
185 * Fixes and debugging
187 * Revision 1.6 1995/03/07 10:26:55 quinn
188 * Initialized type field in the comstacks.
190 * Revision 1.5 1995/02/14 20:40:07 quinn
193 * Revision 1.4 1995/02/14 11:54:49 quinn
194 * Beginning to add full CCL.
196 * Revision 1.3 1995/02/10 18:58:10 quinn
197 * Fixed tcpip_get (formerly tcpip_read).
198 * Turned tst (cli) into a proper, event-driven thingy.
200 * Revision 1.2 1995/02/10 15:55:47 quinn
203 * Revision 1.1 1995/02/09 15:51:52 quinn
216 #if HAVE_OPENSSL_SSL_H
217 #include <openssl/ssl.h>
218 #include <openssl/err.h>
221 #include <yaz/comstack.h>
222 #include <yaz/tcpip.h>
225 /* Chas added the following, so we get the definition of completeBER */
228 int tcpip_close(COMSTACK h);
229 int tcpip_put(COMSTACK h, char *buf, int size);
230 int tcpip_get(COMSTACK h, char **buf, int *bufsize);
231 int tcpip_connect(COMSTACK h, void *address);
232 int tcpip_more(COMSTACK h);
233 int tcpip_rcvconnect(COMSTACK h);
234 int tcpip_bind(COMSTACK h, void *address, int mode);
235 int tcpip_listen(COMSTACK h, char *raddr, int *addrlen,
236 int (*check_ip)(void *cd, const char *a, int len, int type),
238 int static tcpip_set_blocking(COMSTACK p, int blocking);
240 #if HAVE_OPENSSL_SSL_H
241 int ssl_get(COMSTACK h, char **buf, int *bufsize);
242 int ssl_put(COMSTACK h, char *buf, int size);
245 COMSTACK tcpip_accept(COMSTACK h);
246 char *tcpip_addrstr(COMSTACK h);
247 void *tcpip_straddr(COMSTACK h, const char *str);
255 /* this state is used for both SSL and straight TCP/IP */
256 typedef struct tcpip_state
258 char *altbuf; /* alternate buffer for surplus data */
259 int altsize; /* size as xmalloced */
260 int altlen; /* length of data or 0 if none */
262 int written; /* -1 if we aren't writing */
263 int towrite; /* to verify against user input */
264 int (*complete)(const unsigned char *buf, int len); /* length/comple. */
265 struct sockaddr_in addr; /* returned by cs_straddr */
266 char buf[128]; /* returned by cs_addrstr */
267 #if HAVE_OPENSSL_SSL_H
275 static int tcpip_init (void)
277 static int initialized = 0;
283 requested = MAKEWORD(1, 1);
284 if (WSAStartup(requested, &wd))
291 static int proto_number = 0;
293 static int tcpip_init (void)
295 struct protoent *proto;
296 /* only call getprotobyname once, in case it allocates memory */
297 if (!(proto = getprotobyname("tcp")))
299 proto_number = proto->p_proto;
305 * This function is always called through the cs_create() macro.
306 * s >= 0: socket has already been established for us.
308 COMSTACK tcpip_type(int s, int blocking, int protocol, void *vp)
314 unsigned long tru = 1;
322 if ((s = socket(AF_INET, SOCK_STREAM, 0)) < 0)
325 if ((s = socket(AF_INET, SOCK_STREAM, proto_number)) < 0)
332 if (!(p = (struct comstack *)xmalloc(sizeof(struct comstack))))
334 if (!(state = (struct tcpip_state *)(p->cprivate =
335 xmalloc(sizeof(tcpip_state)))))
339 if (!(p->blocking = blocking) && ioctlsocket(s, FIONBIO, &tru) < 0)
341 if (!(p->blocking = blocking) && fcntl(s, F_SETFL, O_NONBLOCK) < 0)
347 p->type = tcpip_type;
348 p->protocol = (enum oid_proto) protocol;
350 p->f_connect = tcpip_connect;
351 p->f_rcvconnect = tcpip_rcvconnect;
352 p->f_get = tcpip_get;
353 p->f_put = tcpip_put;
354 p->f_close = tcpip_close;
355 p->f_more = tcpip_more;
356 p->f_bind = tcpip_bind;
357 p->f_listen = tcpip_listen;
358 p->f_accept = tcpip_accept;
359 p->f_addrstr = tcpip_addrstr;
360 p->f_straddr = tcpip_straddr;
361 p->f_set_blocking = tcpip_set_blocking;
363 p->state = new_socket ? CS_ST_UNBND : CS_ST_IDLE; /* state of line */
368 #if HAVE_OPENSSL_SSL_H
369 state->ctx = state->ctx_alloc = 0;
374 state->altsize = state->altlen = 0;
375 state->towrite = state->written = -1;
376 if (protocol == PROTO_WAIS)
377 state->complete = completeWAIS;
379 state->complete = completeBER;
381 p->timeout = COMSTACK_DEFAULT_TIMEOUT;
382 TRC(fprintf(stderr, "Created new TCPIP comstack\n"));
387 #if HAVE_OPENSSL_SSL_H
389 COMSTACK ssl_type(int s, int blocking, int protocol, void *vp)
393 yaz_log(LOG_LOG, "ssl_type begin");
395 p = tcpip_type (s, blocking, protocol, 0);
401 state = (tcpip_state *) p->cprivate;
406 SSL_load_error_strings();
407 SSLeay_add_all_algorithms();
409 state->ctx = state->ctx_alloc = SSL_CTX_new (SSLv23_method());
416 /* note: we don't handle already opened socket in SSL mode - yet */
417 yaz_log(LOG_LOG, "ssl_type end");
422 int tcpip_strtoaddr_ex(const char *str, struct sockaddr_in *add)
426 short int port = 210;
431 TRC(fprintf(stderr, "tcpip_strtoaddress: %s\n", str ? str : "NULL"));
432 add->sin_family = AF_INET;
433 strncpy(buf, str, 511);
435 if ((p = strchr(buf, '/')))
437 if ((p = strchr(buf, ':')))
442 add->sin_port = htons(port);
443 if (!strcmp("@", buf))
444 add->sin_addr.s_addr = INADDR_ANY;
445 else if ((hp = gethostbyname(buf)))
446 memcpy(&add->sin_addr.s_addr, *hp->h_addr_list,
447 sizeof(struct in_addr));
448 else if ((tmpadd = (unsigned) inet_addr(buf)) != 0)
449 memcpy(&add->sin_addr.s_addr, &tmpadd, sizeof(struct in_addr));
455 void *tcpip_straddr(COMSTACK h, const char *str)
457 tcpip_state *sp = (tcpip_state *)h->cprivate;
459 if (!tcpip_strtoaddr_ex (str, &sp->addr))
464 struct sockaddr_in *tcpip_strtoaddr(const char *str)
466 static struct sockaddr_in add;
468 if (!tcpip_strtoaddr_ex (str, &add))
473 int tcpip_more(COMSTACK h)
475 tcpip_state *sp = (tcpip_state *)h->cprivate;
477 return sp->altlen && (*sp->complete)((unsigned char *) sp->altbuf,
482 * connect(2) will block (sometimes) - nothing we can do short of doing
483 * weird things like spawning subprocesses or threading or some weird junk
486 int tcpip_connect(COMSTACK h, void *address)
488 struct sockaddr_in *add = (struct sockaddr_in *)address;
489 #if HAVE_OPENSSL_SSL_H
490 tcpip_state *sp = (tcpip_state *)h->cprivate;
494 TRC(fprintf(stderr, "tcpip_connect\n"));
496 if (h->state == CS_ST_UNBND)
498 r = connect(h->iofile, (struct sockaddr *) add, sizeof(*add));
502 if (WSAGetLastError() == WSAEWOULDBLOCK)
504 h->event = CS_CONNECT;
505 h->state = CS_ST_CONNECTING;
506 h->io_pending = CS_WANT_WRITE;
510 if (errno == EINPROGRESS)
512 h->event = CS_CONNECT;
513 h->state = CS_ST_CONNECTING;
514 h->io_pending = CS_WANT_WRITE|CS_WANT_READ;
521 h->event = CS_CONNECT;
522 h->state = CS_ST_CONNECTING;
524 if (h->state != CS_ST_CONNECTING)
526 h->cerrno = CSOUTSTATE;
529 #if HAVE_OPENSSL_SSL_H
536 sp->ssl = SSL_new (sp->ctx);
537 SSL_set_fd (sp->ssl, h->iofile);
539 res = SSL_connect (sp->ssl);
542 int err = SSL_get_error(sp->ssl, res);
543 if (err == SSL_ERROR_WANT_READ)
545 yaz_log (LOG_LOG, "SSL_connect. want_read");
546 h->io_pending = CS_WANT_READ;
549 if (err == SSL_ERROR_WANT_WRITE)
551 yaz_log (LOG_LOG, "SSL_connect. want_write");
552 h->io_pending = CS_WANT_WRITE;
555 h->cerrno = CSERRORSSL;
561 h->state = CS_ST_DATAXFER;
568 int tcpip_rcvconnect(COMSTACK cs)
570 TRC(fprintf(stderr, "tcpip_rcvconnect\n"));
572 if (cs->event == CS_CONNECT)
575 fd_set input, output;
585 FD_SET (fd, &output);
587 r = select (fd+1, &input, &output, 0, &tv);
590 if (FD_ISSET(cs->iofile, &output))
593 return 0; /* write OK, we're OK */
596 return -1; /* an error, for sure */
599 return 0; /* timeout - incomplete */
601 return -1; /* wrong state or bad select */
604 #define CERTF "ztest.pem"
605 #define KEYF "ztest.pem"
607 int tcpip_bind(COMSTACK h, void *address, int mode)
609 struct sockaddr *addr = (struct sockaddr *)address;
613 unsigned long one = 1;
616 #if HAVE_OPENSSL_SSL_H
617 tcpip_state *sp = (tcpip_state *)h->cprivate;
623 res = SSL_CTX_use_certificate_file (sp->ctx, CERTF,
627 ERR_print_errors_fp(stderr);
630 res = SSL_CTX_use_PrivateKey_file (sp->ctx, KEYF,
634 ERR_print_errors_fp(stderr);
637 res = SSL_CTX_check_private_key (sp->ctx);
640 ERR_print_errors_fp(stderr);
644 TRC (fprintf (stderr, "ssl_bind\n"));
648 TRC (fprintf (stderr, "tcpip_bind\n"));
651 TRC (fprintf (stderr, "tcpip_bind\n"));
654 if (setsockopt(h->iofile, SOL_SOCKET, SO_REUSEADDR, (char*)
655 &one, sizeof(one)) < 0)
661 if (bind(h->iofile, addr, sizeof(struct sockaddr_in)))
666 if (mode == CS_SERVER && listen(h->iofile, 3) < 0)
671 h->state = CS_ST_IDLE;
672 h->event = CS_LISTEN;
676 int tcpip_listen(COMSTACK h, char *raddr, int *addrlen,
677 int (*check_ip)(void *cd, const char *a, int len, int t),
680 struct sockaddr_in addr;
682 socklen_t len = sizeof(addr);
684 int len = sizeof(addr);
687 TRC(fprintf(stderr, "tcpip_listen pid=%d\n", getpid()));
688 if (h->state != CS_ST_IDLE)
690 h->cerrno = CSOUTSTATE;
693 h->newfd = accept(h->iofile, (struct sockaddr*)&addr, &len);
698 WSAGetLastError() == WSAEWOULDBLOCK
702 #if EAGAIN != EWOULDBLOCK
708 h->cerrno = CSNODATA;
713 if (addrlen && (size_t) (*addrlen) >= sizeof(struct sockaddr_in))
714 memcpy(raddr, &addr, *addrlen = sizeof(struct sockaddr_in));
717 if (check_ip && (*check_ip)(cd, (const char *) &addr,
718 sizeof(addr), AF_INET))
722 closesocket(h->newfd);
729 h->state = CS_ST_INCON;
733 COMSTACK tcpip_accept(COMSTACK h)
736 tcpip_state *state, *st = (tcpip_state *)h->cprivate;
738 unsigned long tru = 1;
741 TRC(fprintf(stderr, "tcpip_accept\n"));
742 if (h->state == CS_ST_INCON)
744 if (!(cnew = (COMSTACK)xmalloc(sizeof(*cnew))))
748 closesocket(h->newfd);
755 memcpy(cnew, h, sizeof(*h));
756 cnew->iofile = h->newfd;
757 cnew->io_pending = 0;
758 if (!(state = (tcpip_state *)
759 (cnew->cprivate = xmalloc(sizeof(tcpip_state)))))
765 closesocket(h->newfd);
773 if (!cnew->blocking &&
775 (ioctlsocket(cnew->iofile, FIONBIO, &tru) < 0)
777 (!cnew->blocking && fcntl(cnew->iofile, F_SETFL, O_NONBLOCK) < 0)
785 closesocket(h->newfd);
797 state->altsize = state->altlen = 0;
798 state->towrite = state->written = -1;
799 state->complete = st->complete;
800 cnew->state = CS_ST_ACCEPT;
801 h->state = CS_ST_IDLE;
803 #if HAVE_OPENSSL_SSL_H
804 state->ctx = st->ctx;
805 state->ctx_alloc = 0;
806 state->ssl = st->ssl;
809 state->ssl = SSL_new (state->ctx);
810 SSL_set_fd (state->ssl, cnew->iofile);
815 if (h->state == CS_ST_ACCEPT)
817 #if HAVE_OPENSSL_SSL_H
818 tcpip_state *state = (tcpip_state *)h->cprivate;
821 int res = SSL_accept (state->ssl);
822 TRC(fprintf(stderr, "SSL_accept\n"));
825 int err = SSL_get_error(state->ssl, res);
826 if (err == SSL_ERROR_WANT_READ)
828 h->io_pending = CS_WANT_READ;
829 yaz_log (LOG_LOG, "SSL_accept. want_read");
832 if (err == SSL_ERROR_WANT_WRITE)
834 h->io_pending = CS_WANT_WRITE;
835 yaz_log (LOG_LOG, "SSL_accept. want_write");
846 h->cerrno = CSOUTSTATE;
850 h->state = CS_ST_DATAXFER;
855 #define CS_TCPIP_BUFCHUNK 4096
858 * Return: -1 error, >1 good, len of buffer, ==1 incomplete buffer,
859 * 0=connection closed.
861 int tcpip_get(COMSTACK h, char **buf, int *bufsize)
863 tcpip_state *sp = (tcpip_state *)h->cprivate;
865 int tmpi, berlen, rest, req, tomove;
866 int hasread = 0, res;
868 TRC(fprintf(stderr, "tcpip_get: bufsize=%d\n", *bufsize));
869 if (sp->altlen) /* switch buffers */
871 TRC(fprintf(stderr, " %d bytes in altbuf (0x%x)\n", sp->altlen,
872 (unsigned) sp->altbuf));
876 *bufsize = sp->altsize;
877 hasread = sp->altlen;
883 while (!(berlen = (*sp->complete)((unsigned char *)*buf, hasread)))
887 if (!(*buf = (char *)xmalloc(*bufsize = CS_TCPIP_BUFCHUNK)))
890 else if (*bufsize - hasread < CS_TCPIP_BUFCHUNK)
891 if (!(*buf =(char *)xrealloc(*buf, *bufsize *= 2)))
893 res = recv(h->iofile, *buf + hasread, CS_TCPIP_BUFCHUNK, 0);
894 TRC(fprintf(stderr, " recv res=%d, hasread=%d\n", res, hasread));
898 if (WSAGetLastError() == WSAEWOULDBLOCK)
900 h->io_pending = CS_WANT_READ;
906 if (errno == EWOULDBLOCK
908 #if EAGAIN != EWOULDBLOCK
912 || errno == EINPROGRESS
915 h->io_pending = CS_WANT_READ;
928 TRC (fprintf (stderr, " Out of read loop with hasread=%d, berlen=%d\n",
930 /* move surplus buffer (or everything if we didn't get a BER rec.) */
931 if (hasread > berlen)
933 tomove = req = hasread - berlen;
934 rest = tomove % CS_TCPIP_BUFCHUNK;
936 req += CS_TCPIP_BUFCHUNK - rest;
939 if (!(sp->altbuf = (char *)xmalloc(sp->altsize = req)))
941 } else if (sp->altsize < req)
942 if (!(sp->altbuf =(char *)xrealloc(sp->altbuf, sp->altsize = req)))
944 TRC(fprintf(stderr, " Moving %d bytes to altbuf(0x%x)\n", tomove,
945 (unsigned) sp->altbuf));
946 memcpy(sp->altbuf, *buf + berlen, sp->altlen = tomove);
948 if (berlen < CS_TCPIP_BUFCHUNK - 1)
949 *(*buf + berlen) = '\0';
950 return berlen ? berlen : 1;
954 #if HAVE_OPENSSL_SSL_H
956 * Return: -1 error, >1 good, len of buffer, ==1 incomplete buffer,
957 * 0=connection closed.
959 int ssl_get(COMSTACK h, char **buf, int *bufsize)
961 tcpip_state *sp = (tcpip_state *)h->cprivate;
963 int tmpi, berlen, rest, req, tomove;
964 int hasread = 0, res;
966 TRC(fprintf(stderr, "ssl_get: bufsize=%d\n", *bufsize));
967 if (sp->altlen) /* switch buffers */
969 TRC(fprintf(stderr, " %d bytes in altbuf (0x%x)\n", sp->altlen,
970 (unsigned) sp->altbuf));
974 *bufsize = sp->altsize;
975 hasread = sp->altlen;
981 while (!(berlen = (*sp->complete)((unsigned char *)*buf, hasread)))
985 if (!(*buf = (char *)xmalloc(*bufsize = CS_TCPIP_BUFCHUNK)))
988 else if (*bufsize - hasread < CS_TCPIP_BUFCHUNK)
989 if (!(*buf =(char *)xrealloc(*buf, *bufsize *= 2)))
991 res = SSL_read (sp->ssl, *buf + hasread, CS_TCPIP_BUFCHUNK);
992 TRC(fprintf(stderr, " SSL_read res=%d, hasread=%d\n", res, hasread));
995 int ssl_err = SSL_get_error(sp->ssl, res);
996 if (ssl_err == SSL_ERROR_WANT_READ)
998 h->io_pending = CS_WANT_READ;
999 yaz_log (LOG_LOG, "SSL_read. want_read");
1002 if (ssl_err == SSL_ERROR_WANT_WRITE)
1004 h->io_pending = CS_WANT_WRITE;
1005 yaz_log (LOG_LOG, "SSL_read. want_write");
1010 h->cerrno = CSERRORSSL;
1015 TRC (fprintf (stderr, " Out of read loop with hasread=%d, berlen=%d\n",
1017 /* move surplus buffer (or everything if we didn't get a BER rec.) */
1018 if (hasread > berlen)
1020 tomove = req = hasread - berlen;
1021 rest = tomove % CS_TCPIP_BUFCHUNK;
1023 req += CS_TCPIP_BUFCHUNK - rest;
1026 if (!(sp->altbuf = (char *)xmalloc(sp->altsize = req)))
1028 } else if (sp->altsize < req)
1029 if (!(sp->altbuf =(char *)xrealloc(sp->altbuf, sp->altsize = req)))
1031 TRC(fprintf(stderr, " Moving %d bytes to altbuf(0x%x)\n", tomove,
1032 (unsigned) sp->altbuf));
1033 memcpy(sp->altbuf, *buf + berlen, sp->altlen = tomove);
1035 if (berlen < CS_TCPIP_BUFCHUNK - 1)
1036 *(*buf + berlen) = '\0';
1037 return berlen ? berlen : 1;
1042 * Returns 1, 0 or -1
1043 * In nonblocking mode, you must call again with same buffer while
1044 * return value is 1.
1046 int tcpip_put(COMSTACK h, char *buf, int size)
1049 struct tcpip_state *state = (struct tcpip_state *)h->cprivate;
1051 TRC(fprintf(stderr, "tcpip_put: size=%d\n", size));
1054 if (state->towrite < 0)
1056 state->towrite = size;
1059 else if (state->towrite != size)
1061 h->cerrno = CSWRONGBUF;
1064 while (state->towrite > state->written)
1067 send(h->iofile, buf + state->written, size -
1078 WSAGetLastError() == WSAEWOULDBLOCK
1080 errno == EWOULDBLOCK
1082 #if EAGAIN != EWOULDBLOCK
1089 TRC(fprintf(stderr, " Flow control stop\n"));
1090 h->io_pending = CS_WANT_WRITE;
1093 h->cerrno = CSYSERR;
1096 state->written += res;
1097 TRC(fprintf(stderr, " Wrote %d, written=%d, nbytes=%d\n",
1098 res, state->written, size));
1100 state->towrite = state->written = -1;
1101 TRC(fprintf(stderr, " Ok\n"));
1106 #if HAVE_OPENSSL_SSL_H
1108 * Returns 1, 0 or -1
1109 * In nonblocking mode, you must call again with same buffer while
1110 * return value is 1.
1112 int ssl_put(COMSTACK h, char *buf, int size)
1115 struct tcpip_state *state = (struct tcpip_state *)h->cprivate;
1117 TRC(fprintf(stderr, "ssl_put: size=%d\n", size));
1120 if (state->towrite < 0)
1122 state->towrite = size;
1125 else if (state->towrite != size)
1127 h->cerrno = CSWRONGBUF;
1130 while (state->towrite > state->written)
1132 res = SSL_write (state->ssl, buf + state->written,
1133 size - state->written);
1136 int ssl_err = SSL_get_error(state->ssl, res);
1137 if (ssl_err == SSL_ERROR_WANT_READ)
1139 h->io_pending = CS_WANT_READ;
1140 yaz_log (LOG_LOG, "SSL_write. want_read");
1143 if (ssl_err == SSL_ERROR_WANT_WRITE)
1145 h->io_pending = CS_WANT_WRITE;
1146 yaz_log (LOG_LOG, "SSL_write. want_write");
1149 h->cerrno = CSERRORSSL;
1152 state->written += res;
1153 TRC(fprintf(stderr, " Wrote %d, written=%d, nbytes=%d\n",
1154 res, state->written, size));
1156 state->towrite = state->written = -1;
1157 TRC(fprintf(stderr, " Ok\n"));
1162 int tcpip_close(COMSTACK h)
1164 tcpip_state *sp = (struct tcpip_state *)h->cprivate;
1166 TRC(fprintf(stderr, "tcpip_close\n"));
1167 if (h->iofile != -1)
1169 #if HAVE_OPENSSL_SSL_H
1172 SSL_shutdown (sp->ssl);
1176 closesocket(h->iofile);
1183 #if HAVE_OPENSSL_SSL_H
1186 TRC (fprintf(stderr, "SSL_free\n"));
1191 SSL_CTX_free (sp->ctx_alloc);
1198 char *tcpip_addrstr(COMSTACK h)
1200 struct sockaddr_in addr;
1201 tcpip_state *sp = (struct tcpip_state *)h->cprivate;
1202 char *r, *buf = sp->buf;
1204 struct hostent *host;
1207 if (getpeername(h->iofile, (struct sockaddr*) &addr, &len) < 0)
1209 h->cerrno = CSYSERR;
1212 if ((host = gethostbyaddr((char*)&addr.sin_addr, sizeof(addr.sin_addr),
1214 r = (char*) host->h_name;
1216 r = inet_ntoa(addr.sin_addr);
1217 sprintf(buf, "tcp:%s", r);
1218 #if HAVE_OPENSSL_SSL_H
1220 sprintf(buf, "ssl:%s", r);
1225 int static tcpip_set_blocking(COMSTACK p, int blocking)
1229 if (p->blocking == blocking)
1233 if (ioctlsocket(p->iofile, FIONBIO, &flag) < 0)
1236 flag = fcntl(p->iofile, F_GETFL, 0);
1238 flag = flag & ~O_NONBLOCK;
1240 flag = flag | O_NONBLOCK;
1241 if (fcntl(p->iofile, F_SETFL, flag) < 0)
1244 p->blocking = blocking;