aboutsummaryrefslogtreecommitdiff
path: root/client/wolfssl/src/bio.c
diff options
context:
space:
mode:
authorauth12 <[email protected]>2020-07-22 08:40:38 -0700
committerauth12 <[email protected]>2020-07-22 08:40:38 -0700
commit4ff89e85e74884e8f04edb5c31a94b4323e895e9 (patch)
tree65f98ebf9af0d0947e44bf397b1fac0f107d7a2f /client/wolfssl/src/bio.c
parentClient injection. (diff)
downloadloader-4ff89e85e74884e8f04edb5c31a94b4323e895e9.tar.xz
loader-4ff89e85e74884e8f04edb5c31a94b4323e895e9.zip
Removed wolfssl
Diffstat (limited to 'client/wolfssl/src/bio.c')
-rw-r--r--client/wolfssl/src/bio.c1705
1 files changed, 0 insertions, 1705 deletions
diff --git a/client/wolfssl/src/bio.c b/client/wolfssl/src/bio.c
deleted file mode 100644
index c134798..0000000
--- a/client/wolfssl/src/bio.c
+++ /dev/null
@@ -1,1705 +0,0 @@
-/* bio.c
- *
- * Copyright (C) 2006-2020 wolfSSL Inc.
- *
- * This file is part of wolfSSL.
- *
- * wolfSSL is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * wolfSSL is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
- */
-
-#include <wolfssl/wolfcrypt/settings.h>
-
-#if !defined(WOLFSSL_BIO_INCLUDED)
- #ifndef WOLFSSL_IGNORE_FILE_WARN
- #warning bio.c does not need to be compiled separately from ssl.c
- #endif
-#else
-
-
-/* Helper function to decode a base64 input
- *
- * returns size of resulting buffer on success
- */
-static int wolfSSL_BIO_BASE64_read(WOLFSSL_BIO* bio, void* buf, int len)
-{
- word32 frmtSz = len;
-
- WOLFSSL_ENTER("wolfSSL_BIO_BASE64_read");
-
- if (Base64_Decode((const byte*)buf, (word32)len, (byte*)buf, &frmtSz) !=0) {
- WOLFSSL_MSG("Err doing base64 decode");
- return SSL_FATAL_ERROR;
- }
-
- (void)bio;
- return (int)frmtSz;
-}
-
-
-/* Helper function to read from WOLFSSL_BIO_BIO type
- *
- * returns amount in bytes read on success
- */
-static int wolfSSL_BIO_BIO_read(WOLFSSL_BIO* bio, void* buf, int len)
-{
- int sz;
- char* pt;
-
- sz = wolfSSL_BIO_nread(bio, &pt, len);
-
- if (sz > 0) {
- XMEMCPY(buf, pt, sz);
- }
-
- return sz;
-}
-
-
-/* Handles reading from a memory type BIO and advancing the state.
- *
- * bio WOLFSSL_BIO to read from
- * buf buffer to put data from bio in
- * len amount of data to be read
- *
- * returns size read on success
- */
-static int wolfSSL_BIO_MEMORY_read(WOLFSSL_BIO* bio, void* buf, int len)
-{
- int sz;
- WOLFSSL_ENTER("wolfSSL_BIO_MEMORY_read");
-
- sz = wolfSSL_BIO_pending(bio);
- if (sz > 0) {
- const unsigned char* pt = NULL;
- int memSz;
-
- if (sz > len) {
- sz = len;
- }
- memSz = wolfSSL_BIO_get_mem_data(bio, (void*)&pt);
- if (memSz >= sz && pt != NULL) {
- byte* tmp;
-
- XMEMCPY(buf, (void*)pt, sz);
- if (memSz - sz > 0) {
- tmp = (byte*)XMALLOC(memSz-sz, bio->heap, DYNAMIC_TYPE_OPENSSL);
- if (tmp == NULL) {
- WOLFSSL_MSG("Memory error");
- return WOLFSSL_BIO_ERROR;
- }
- XMEMCPY(tmp, (void*)(pt + sz), memSz - sz);
-
- /* reset internal bio->mem */
- XFREE(bio->ptr, bio->heap, DYNAMIC_TYPE_OPENSSL);
- bio->ptr = tmp;
- bio->num = memSz-sz;
- if (bio->mem_buf != NULL) {
- bio->mem_buf->data = (char*)bio->ptr;
- bio->mem_buf->length = bio->num;
- }
- }
- bio->wrSz -= sz;
- }
- else {
- WOLFSSL_MSG("Issue with getting bio mem pointer");
- return 0;
- }
- }
- else {
- return WOLFSSL_BIO_ERROR;
- }
-
- return sz;
-}
-
-#ifndef WOLFCRYPT_ONLY
-/* Helper function to read from WOLFSSL_BIO_SSL type
- *
- * returns the number of bytes read on success
- */
-static int wolfSSL_BIO_SSL_read(WOLFSSL_BIO* bio, void* buf,
- int len, WOLFSSL_BIO* front)
-{
- int ret;
-
- WOLFSSL_ENTER("wolfSSL_BIO_SSL_read");
-
- /* already got eof, again is error */
- if ((front == NULL) || front->eof)
- return WOLFSSL_FATAL_ERROR;
-
- bio->flags &= ~(WOLFSSL_BIO_FLAG_RETRY); /* default no retry */
- ret = wolfSSL_read((WOLFSSL*)bio->ptr, buf, len);
- if (ret == 0)
- front->eof = 1;
- else if (ret < 0) {
- int err = wolfSSL_get_error((WOLFSSL*)bio->ptr, 0);
- if ( !(err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) ) {
- front->eof = 1;
- }
- else {
- bio->flags |= WOLFSSL_BIO_FLAG_RETRY; /* should retry */
- }
- }
-
- return ret;
-}
-
-static int wolfSSL_BIO_MD_read(WOLFSSL_BIO* bio, void* buf, int sz)
-{
- int ret = sz;
-
- if (wolfSSL_EVP_MD_CTX_type((WOLFSSL_EVP_MD_CTX*)bio->ptr) == NID_hmac) {
- if (wolfSSL_EVP_DigestSignUpdate((WOLFSSL_EVP_MD_CTX*)bio->ptr, buf,
- sz) != WOLFSSL_SUCCESS)
- {
- ret = WOLFSSL_FATAL_ERROR;
- }
- }
- else {
- if (wolfSSL_EVP_DigestUpdate((WOLFSSL_EVP_MD_CTX*)bio->ptr, buf, ret)
- != WOLFSSL_SUCCESS) {
- ret = WOLFSSL_FATAL_ERROR;
- }
- }
- return ret;
-}
-#endif /* WOLFCRYPT_ONLY */
-
-
-/* Used to read data from a WOLFSSL_BIO structure
- *
- * bio structure to read data from
- * buf buffer to hold the result
- * len length of buf buffer
- *
- * returns the number of bytes read on success
- */
-int wolfSSL_BIO_read(WOLFSSL_BIO* bio, void* buf, int len)
-{
- int ret = 0;
- WOLFSSL_BIO* front = bio;
- int sz = 0;
-
- WOLFSSL_ENTER("wolfSSL_BIO_read");
-
- /* info cb, abort if user returns <= 0*/
- if (front != NULL && front->infoCb != NULL) {
- ret = (int)front->infoCb(front, WOLFSSL_BIO_CB_READ, (const char*)buf,
- len, 0, 1);
- if (ret <= 0) {
- return ret;
- }
- }
-
- /* start at end of list and work backwards */
- while ((bio != NULL) && (bio->next != NULL)) {
- bio = bio->next;
- }
-
- while (bio != NULL && ret >= 0) {
- /* check for custom read */
- if (bio->method && bio->method->readCb) {
- ret = bio->method->readCb(bio, (char*)buf, len);
- }
-
- /* formatting data */
- if (bio->type == WOLFSSL_BIO_BASE64 && ret > 0 && sz > 0) {
- ret = wolfSSL_BIO_BASE64_read(bio, buf, sz);
- }
-
- /* write BIOs */
- if (bio && bio->type == WOLFSSL_BIO_BIO) {
- ret = wolfSSL_BIO_BIO_read(bio, buf, len);
- }
-
- if (bio && bio->type == WOLFSSL_BIO_MEMORY) {
- ret = wolfSSL_BIO_MEMORY_read(bio, buf, len);
- }
-
- #ifndef NO_FILESYSTEM
- if (bio && bio->type == WOLFSSL_BIO_FILE) {
- ret = (int)XFREAD(buf, 1, len, (XFILE)bio->ptr);
- }
- #endif
-
- #ifndef WOLFCRYPT_ONLY
- if (bio && bio->type == WOLFSSL_BIO_SSL) {
- ret = wolfSSL_BIO_SSL_read(bio, buf, len, front);
- }
-
- /* data passing through BIO MD wrapper */
- if (bio && bio->type == WOLFSSL_BIO_MD && ret > 0) {
- ret = wolfSSL_BIO_MD_read(bio, buf, ret);
- }
- #endif
-
- /* case where front of list is done */
- if (bio == front) {
- break; /* at front of list so be done */
- }
-
- if (ret > 0) {
- sz = ret; /* adjust size for formatting */
- }
-
- /* previous WOLFSSL_BIO in list working towards head of list */
- bio = bio->prev;
- }
-
- /* info cb, user can override return value */
- if (front != NULL && front->infoCb != NULL) {
- ret = (int)front->infoCb(front,
- WOLFSSL_BIO_CB_READ | WOLFSSL_BIO_CB_RETURN,
- (const char*)buf, len, 0, ret);
- }
-
- return ret;
-}
-
-
-/* Converts data into base64 output
- *
- * returns the resulting buffer size on success.
- */
-static int wolfSSL_BIO_BASE64_write(WOLFSSL_BIO* bio, const void* data,
- word32 inLen, byte* out, word32* outLen)
-{
- byte* tmp = NULL;
- int ret = 0;
-
- WOLFSSL_ENTER("wolfSSL_BIO_BASE64_write");
-
- if (bio == NULL || data == NULL || out == NULL || outLen == NULL) {
- return BAD_FUNC_ARG;
- }
-
-#if defined(WOLFSSL_BASE64_ENCODE)
- tmp = (byte*)XMALLOC(*outLen, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
- if (tmp == NULL) {
- return WOLFSSL_FATAL_ERROR;
- }
-
- if ((bio->flags & WOLFSSL_BIO_FLAG_BASE64_NO_NL) ==
- WOLFSSL_BIO_FLAG_BASE64_NO_NL) {
- if (Base64_Encode_NoNl((const byte*)data, inLen,
- tmp, outLen) < 0) {
- ret = WOLFSSL_FATAL_ERROR;
- }
- }
- else {
- if (Base64_Encode((const byte*)data, inLen,
- tmp, outLen) < 0) {
- ret = WOLFSSL_FATAL_ERROR;
- }
- }
-
- if (ret != WOLFSSL_FATAL_ERROR) {
- ret = (int) inLen;
- XMEMCPY(out, tmp, *outLen);
-
- }
- XFREE(tmp, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
-#else
- (void)bio;
- (void)data;
- (void)inLen;
- (void)out;
- (void)outLen;
- (void)tmp;
- WOLFSSL_MSG("BASE64 encoding not compiled in");
-#endif
- return ret;
-}
-
-
-#ifndef WOLFCRYPT_ONLY
-/* Helper function for writing to a WOLFSSL_BIO_SSL type
- *
- * returns the amount written in bytes on success
- */
-static int wolfSSL_BIO_SSL_write(WOLFSSL_BIO* bio, const void* data,
- int len, WOLFSSL_BIO* front)
-{
- int ret;
-
- WOLFSSL_ENTER("wolfSSL_BIO_SSL_write");
-
- if (bio->ptr == NULL) {
- return BAD_FUNC_ARG;
- }
-
- bio->flags &= ~(WOLFSSL_BIO_FLAG_RETRY); /* default no retry */
- ret = wolfSSL_write((WOLFSSL*)bio->ptr, data, len);
- if (ret == 0)
- front->eof = 1;
- else if (ret < 0) {
- int err = wolfSSL_get_error((WOLFSSL*)bio->ptr, 0);
- if ( !(err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) ) {
- front->eof = 1;
- }
- else {
- bio->flags |= WOLFSSL_BIO_FLAG_RETRY; /* should retry */
- }
- }
- return ret;
-}
-#endif /* WOLFCRYPT_ONLY */
-
-
-/* Writes to a WOLFSSL_BIO_BIO type.
- *
- * returns the amount written on success
- */
-static int wolfSSL_BIO_BIO_write(WOLFSSL_BIO* bio, const void* data,
- int len)
-{
- int sz;
- char* buf;
-
- WOLFSSL_ENTER("wolfSSL_BIO_BIO_write");
-
- /* adding in sanity checks for static analysis tools */
- if (bio == NULL || data == NULL) {
- return BAD_FUNC_ARG;
- }
-
- sz = wolfSSL_BIO_nwrite(bio, &buf, len);
-
- /* test space for write */
- if (sz <= 0) {
- WOLFSSL_MSG("No room left to write");
- return sz;
- }
-
- XMEMCPY(buf, data, sz);
-
- return sz;
-}
-
-
-/* for complete compatibility a bio memory write allocs its own memory
- * until the application runs out ....
- *
- * bio structure to hold incoming data
- * data buffer holding the data to be written
- * len length of data buffer
- *
- * returns the amount of data written on success and WOLFSSL_FAILURE or
- * WOLFSSL_BIO_ERROR for failure cases.
- */
-static int wolfSSL_BIO_MEMORY_write(WOLFSSL_BIO* bio, const void* data,
- int len)
-{
- int sz;
- const unsigned char* buf;
-
- WOLFSSL_ENTER("wolfSSL_BIO_MEMORY_write");
-
- if (bio == NULL || data == NULL) {
- return BAD_FUNC_ARG;
- }
-
- sz = wolfSSL_BIO_pending(bio);
- if (sz < 0) {
- WOLFSSL_MSG("Error getting memory data");
- return sz;
- }
-
- if (bio->ptr == NULL) {
- bio->ptr = (byte*)XMALLOC(len, bio->heap, DYNAMIC_TYPE_OPENSSL);
- if (bio->ptr == NULL) {
- WOLFSSL_MSG("Error on malloc");
- return WOLFSSL_FAILURE;
- }
- bio->num = len;
- if (bio->mem_buf != NULL) {
- bio->mem_buf->data = (char*)bio->ptr;
- bio->mem_buf->length = bio->num;
- }
- }
-
- /* check if will fit in current buffer size */
- if (wolfSSL_BIO_get_mem_data(bio, (void*)&buf) < 0) {
- return WOLFSSL_BIO_ERROR;
- }
- if (bio->num < sz + len) {
- bio->ptr = (byte*)XREALLOC(bio->ptr, sz + len, bio->heap,
- DYNAMIC_TYPE_OPENSSL);
- if (bio->ptr == NULL) {
- WOLFSSL_MSG("Error on realloc");
- return WOLFSSL_FAILURE;
- }
- bio->num = sz + len;
- if (bio->mem_buf != NULL) {
- bio->mem_buf->data = (char*)bio->ptr;
- bio->mem_buf->length = bio->num;
- }
- }
-
- XMEMCPY((byte*)bio->ptr + sz, data, len);
- bio->wrSz += len;
-
- return len;
-}
-
-
-#ifndef WOLFCRYPT_ONLY
-/* Helper function for writing to a WOLFSSL_BIO_MD type
- *
- * returns the amount written in bytes on success (0)
- */
-static int wolfSSL_BIO_MD_write(WOLFSSL_BIO* bio, const void* data, int len)
-{
- int ret = 0;
-
- if (bio == NULL || data == NULL) {
- return BAD_FUNC_ARG;
- }
-
- if (wolfSSL_EVP_MD_CTX_type((WOLFSSL_EVP_MD_CTX*)bio->ptr) == NID_hmac) {
- if (wolfSSL_EVP_DigestSignUpdate((WOLFSSL_EVP_MD_CTX*)bio->ptr, data,
- len) != WOLFSSL_SUCCESS) {
- ret = WOLFSSL_BIO_ERROR;
- }
- }
- else {
- if (wolfSSL_EVP_DigestUpdate((WOLFSSL_EVP_MD_CTX*)bio->ptr, data, len)
- != WOLFSSL_SUCCESS) {
- ret = WOLFSSL_BIO_ERROR;
- }
- }
- return ret;
-}
-#endif /* WOLFCRYPT_ONLY */
-
-
-/* Writes data to a WOLFSSL_BIO structure
- *
- * bio structure to write to
- * data holds the data to be written
- * len length of data buffer
- *
- * returns the amount written in bytes on success
- */
-int wolfSSL_BIO_write(WOLFSSL_BIO* bio, const void* data, int len)
-{
- int ret = 0;
- int retB64 = 0;
- WOLFSSL_BIO* front = bio;
- void* frmt = NULL;
- word32 frmtSz = 0;
-
- WOLFSSL_ENTER("wolfSSL_BIO_write");
-
- /* info cb, abort if user returns <= 0*/
- if (front != NULL && front->infoCb != NULL) {
- ret = (int)front->infoCb(front, WOLFSSL_BIO_CB_WRITE,
- (const char*)data, len, 0, 1);
- if (ret <= 0) {
- return ret;
- }
- }
-
- while (bio != NULL && ret >= 0) {
- /* check for custom write */
- if (bio->method && bio->method->writeCb) {
- ret = bio->method->writeCb(bio, (const char*)data, len);
- }
-
- /* check for formatting */
- if (bio->type == WOLFSSL_BIO_BASE64) {
-#if defined(WOLFSSL_BASE64_ENCODE)
- word32 sz = 0;
-
- if (bio->flags & WOLFSSL_BIO_FLAG_BASE64_NO_NL) {
- if (Base64_Encode_NoNl((const byte*)data, len, NULL,
- &sz) != LENGTH_ONLY_E) {
- WOLFSSL_MSG("Error with base 64 get length");
- ret = SSL_FATAL_ERROR;
- }
- }
- else {
- if (Base64_Encode((const byte*)data, len, NULL, &sz) !=
- LENGTH_ONLY_E) {
- WOLFSSL_MSG("Error with base 64 get length");
- ret = SSL_FATAL_ERROR;
- }
- }
-
- if (frmt == NULL && sz > 0 && ret != SSL_FATAL_ERROR) {
- frmt = (void*)XMALLOC(sz, front->heap,
- DYNAMIC_TYPE_TMP_BUFFER);
- if (frmt == NULL) {
- WOLFSSL_MSG("Memory error");
- ret = SSL_FATAL_ERROR;
- }
- frmtSz = sz;
- }
- else if (sz > frmtSz) {
- frmt = (void*)XREALLOC(frmt, sz, front->heap,
- DYNAMIC_TYPE_TMP_BUFFER);
- if (frmt == NULL) {
- WOLFSSL_MSG("Memory error");
- ret = SSL_FATAL_ERROR;
- }
- /* since frmt already existed then data should point to knew
- formatted buffer */
- data = frmt;
- len = frmtSz;
- frmtSz = sz;
- }
-#endif /* defined(WOLFSSL_BASE64_ENCODE) */
-
- if (ret >= 0) {
- /* change so that data is formatted buffer */
- retB64 = wolfSSL_BIO_BASE64_write(bio, data, (word32)len,
- (byte*)frmt, &frmtSz);
- data = frmt;
- len = frmtSz;
- }
- }
-
- /* write bios */
- if (bio && bio->type == WOLFSSL_BIO_BIO) {
- ret = wolfSSL_BIO_BIO_write(bio, data, len);
- }
-
- if (bio && bio->type == WOLFSSL_BIO_MEMORY) {
- ret = wolfSSL_BIO_MEMORY_write(bio, data, len);
- }
-
- #ifndef NO_FILESYSTEM
- if (bio && bio->type == WOLFSSL_BIO_FILE) {
- ret = (int)XFWRITE(data, 1, len, (XFILE)bio->ptr);
- }
- #endif
-
- #ifndef WOLFCRYPT_ONLY
- if (bio && bio->type == WOLFSSL_BIO_SSL) {
- /* already got eof, again is error */
- if (front->eof) {
- ret = SSL_FATAL_ERROR;
- }
- else {
- ret = wolfSSL_BIO_SSL_write(bio, data, len, front);
- }
- }
-
- if (bio && bio->type == WOLFSSL_BIO_MD) {
- if (bio->next != NULL) { /* data passing through MD BIO */
- ret = wolfSSL_BIO_MD_write(bio, data, len);
- }
- }
- #endif /* WOLFCRYPT_ONLY */
-
- /* advance to the next bio in list */
- bio = bio->next;
- }
-
- if (frmt != NULL) {
- XFREE(frmt, front->heap, DYNAMIC_TYPE_TMP_BUFFER);
- }
-
- /* info cb, user can override return value */
- if (front != NULL && front->infoCb != NULL) {
- ret = (int)front->infoCb(front,
- WOLFSSL_BIO_CB_WRITE | WOLFSSL_BIO_CB_RETURN,
- (const char*)data, 0, 0, ret);
- }
-
- if (retB64 != 0)
- return retB64;
- else
- return ret;
-}
-
-
-/* Wrapper for other BIO type functions, expected to grow as OpenSSL compatibility
- * layer grows.
- *
- * return info. specific to the cmd that is passed in.
- */
-#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)
-long wolfSSL_BIO_ctrl(WOLFSSL_BIO *bio, int cmd, long larg, void *parg)
-{
- long ret;
-
- (void)larg; /* not currently used */
-
- WOLFSSL_ENTER("wolfSSL_BIO_ctrl");
-
- if (bio && bio->method && bio->method->ctrlCb) {
- return bio->method->ctrlCb(bio, cmd, larg, parg);
- }
-
- switch(cmd) {
- case BIO_CTRL_PENDING:
- case BIO_CTRL_WPENDING:
- ret = (long)wolfSSL_BIO_ctrl_pending(bio);
- break;
- case BIO_CTRL_INFO:
- ret = (long)wolfSSL_BIO_get_mem_data(bio, parg);
- break;
- case BIO_CTRL_FLUSH:
- ret = (long)wolfSSL_BIO_flush(bio);
- break;
- case BIO_CTRL_RESET:
- ret = (long)wolfSSL_BIO_reset(bio);
- break;
- default:
- WOLFSSL_MSG("CMD not yet implemented");
- ret = WOLFSSL_FAILURE;
- break;
- }
- return ret;
-}
-#endif
-
-
-/* helper function for wolfSSL_BIO_gets
- * size till a newline is hit
- * returns the number of bytes including the new line character
- */
-static int wolfSSL_getLineLength(char* in, int inSz)
-{
- int i;
-
- for (i = 0; i < inSz; i++) {
- if (in[i] == '\n') {
- return i + 1; /* includes new line character */
- }
- }
-
- return inSz; /* rest of buffer is all one line */
-}
-
-
-/* Gets the next line from bio. Goes until a new line character or end of
- * buffer is reached.
- *
- * bio the structure to read a new line from
- * buf buffer to hold the result
- * sz the size of "buf" buffer
- *
- * returns the size of the result placed in buf on success and a 0 or negative
- * value in an error case.
- */
-int wolfSSL_BIO_gets(WOLFSSL_BIO* bio, char* buf, int sz)
-{
- int ret = WOLFSSL_BIO_UNSET;
-
- WOLFSSL_ENTER("wolfSSL_BIO_gets");
-
- if (bio == NULL || buf == NULL) {
- return WOLFSSL_FAILURE;
- }
-
- /* not enough space for character plus terminator */
- if (sz <= 1) {
- return 0;
- }
-
- /* info cb, abort if user returns <= 0*/
- if (bio->infoCb != NULL) {
- ret = (int)bio->infoCb(bio, WOLFSSL_BIO_CB_GETS, buf, sz, 0, 1);
- if (ret <= 0) {
- return ret;
- }
- }
-
- /* check if is custom method */
- if (bio->method && bio->method->getsCb) {
- return bio->method->getsCb(bio, buf, sz);
- }
-
- switch (bio->type) {
-#ifndef NO_FILESYSTEM
- case WOLFSSL_BIO_FILE:
- if (((XFILE)bio->ptr) == XBADFILE) {
- return WOLFSSL_BIO_ERROR;
- }
-
- #if defined(MICRIUM) || defined(LSR_FS) || defined(EBSNET)
- WOLFSSL_MSG("XFGETS not ported for this system yet");
- ret = XFGETS(buf, sz, (XFILE)bio->ptr);
- #else
- if (XFGETS(buf, sz, (XFILE)bio->ptr) != NULL) {
- ret = (int)XSTRLEN(buf);
- }
- else {
- ret = WOLFSSL_BIO_ERROR;
- }
- #endif
- break;
-#endif /* NO_FILESYSTEM */
- case WOLFSSL_BIO_MEMORY:
- {
- const byte* c;
- int cSz;
- cSz = wolfSSL_BIO_pending(bio);
- if (cSz == 0) {
- ret = 0; /* Nothing to read */
- buf[0] = '\0';
- break;
- }
-
- if (wolfSSL_BIO_get_mem_data(bio, (void*)&c) <= 0) {
- ret = WOLFSSL_BIO_ERROR;
- break;
- }
-
- cSz = wolfSSL_getLineLength((char*)c, cSz);
- /* check case where line was bigger then buffer and buffer
- * needs end terminator */
- if (cSz >= sz) {
- cSz = sz - 1;
- buf[cSz] = '\0';
- }
- else {
- /* not minus 1 here because placing terminator after
- msg and have checked that sz is large enough */
- buf[cSz] = '\0';
- }
-
- ret = wolfSSL_BIO_MEMORY_read(bio, (void*)buf, cSz);
- /* ret is read after the switch statement */
- break;
- }
- case WOLFSSL_BIO_BIO:
- {
- char* c;
- int cSz;
- cSz = wolfSSL_BIO_nread0(bio, &c);
- if (cSz == 0) {
- ret = 0; /* Nothing to read */
- buf[0] = '\0';
- break;
- }
-
- cSz = wolfSSL_getLineLength(c, cSz);
- /* check case where line was bigger then buffer and buffer
- * needs end terminator */
- if (cSz >= sz) {
- cSz = sz - 1;
- buf[cSz] = '\0';
- }
- else {
- /* not minus 1 here because placing terminator after
- msg and have checked that sz is large enough */
- buf[cSz] = '\0';
- }
-
- ret = wolfSSL_BIO_nread(bio, &c, cSz);
- if (ret > 0 && ret < sz) {
- XMEMCPY(buf, c, ret);
- }
- break;
- }
-
-#ifndef WOLFCRYPT_ONLY
- /* call final on hash */
- case WOLFSSL_BIO_MD:
- if (wolfSSL_EVP_MD_CTX_size((WOLFSSL_EVP_MD_CTX*)bio->ptr) > sz) {
- WOLFSSL_MSG("Output buffer was too small for digest");
- ret = WOLFSSL_FAILURE;
- }
- else {
- unsigned int szOut = 0;
- ret = wolfSSL_EVP_DigestFinal((WOLFSSL_EVP_MD_CTX*)bio->ptr,
- (unsigned char*)buf, &szOut);
- if (ret == WOLFSSL_SUCCESS) {
- ret = szOut;
- }
- }
- break;
-#endif /* WOLFCRYPT_ONLY */
-
- default:
- WOLFSSL_MSG("BIO type not supported yet with wolfSSL_BIO_gets");
- }
-
- /* info cb, user can override return value */
- if (bio->infoCb != NULL) {
- ret = (int)bio->infoCb(bio, WOLFSSL_BIO_CB_GETS | WOLFSSL_BIO_CB_RETURN,
- buf, sz, 0, ret);
- }
-
- return ret;
-}
-
-
-/* Writes a null terminated string to bio.
- *
- * bio the structure to write to
- * buf buffer to holding input string
- *
- * returns the size of the result placed in bio on success and a 0 or negative
- * value in an error case. -2 is returned if the implementation is not
- * supported for the BIO type.
- */
-int wolfSSL_BIO_puts(WOLFSSL_BIO* bio, const char* buf)
-{
- int sz;
-
- if (bio == NULL || buf == NULL) {
- return WOLFSSL_FATAL_ERROR;
- }
-
- /* check if is custom method */
- if (bio->method && bio->method->putsCb) {
- return bio->method->putsCb(bio, buf);
- }
-
- sz = (int)XSTRLEN(buf);
- if (sz <= 0) {
- return WOLFSSL_FATAL_ERROR;
- }
-
- return wolfSSL_BIO_write(bio, buf, sz);
-}
-
-
-/* searches through bio list for a BIO of type "type"
- * returns NULL on failure to find a given type */
-WOLFSSL_BIO* wolfSSL_BIO_find_type(WOLFSSL_BIO* bio, int type)
-{
- WOLFSSL_BIO* local = NULL;
- WOLFSSL_BIO* current;
-
- WOLFSSL_ENTER("wolfSSL_BIO_find_type");
-
- if (bio == NULL) {
- return local;
- }
-
- current = bio;
- while (current != NULL) {
- if (current->type == type) {
- WOLFSSL_MSG("Found matching WOLFSSL_BIO type");
- local = current;
- break;
- }
- current = current->next;
- }
-
- return local;
-}
-
-
-/* returns a pointer to the next WOLFSSL_BIO in the chain on success.
- * If a failure case then NULL is returned */
-WOLFSSL_BIO* wolfSSL_BIO_next(WOLFSSL_BIO* bio)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_next");
-
- if (bio == NULL) {
- WOLFSSL_MSG("Bad argument passed in");
- return NULL;
- }
-
- return bio->next;
-}
-
-/* BIO_wpending returns the number of bytes pending to be written. */
-size_t wolfSSL_BIO_wpending(const WOLFSSL_BIO *bio)
-{
- WOLFSSL_ENTER("BIO_wpending");
-
- if (bio == NULL)
- return 0;
-
- if (bio->type == WOLFSSL_BIO_MEMORY) {
- return bio->wrSz;
- }
-
- /* type BIO_BIO then check paired buffer */
- if (bio->type == WOLFSSL_BIO_BIO && bio->pair != NULL) {
- WOLFSSL_BIO* pair = bio->pair;
- return pair->wrIdx;
- }
-
- return 0;
-}
-
-/* Return the number of pending bytes in read and write buffers */
-size_t wolfSSL_BIO_ctrl_pending(WOLFSSL_BIO *bio)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_ctrl_pending");
- if (bio == NULL) {
- return 0;
- }
-
- if (bio->type == WOLFSSL_BIO_MD) {
- /* MD is a wrapper only get next bio */
- while (bio->next != NULL) {
- bio = bio->next;
- if (bio->type != WOLFSSL_BIO_MD) {
- break;
- }
- }
- }
-
-#ifndef WOLFCRYPT_ONLY
- if (bio->type == WOLFSSL_BIO_SSL && bio->ptr != NULL) {
- return (long)wolfSSL_pending((WOLFSSL*)bio->ptr);
- }
-#endif
-
- if (bio->type == WOLFSSL_BIO_MEMORY) {
- return bio->wrSz;
- }
-
- /* type BIO_BIO then check paired buffer */
- if (bio->type == WOLFSSL_BIO_BIO && bio->pair != NULL) {
- WOLFSSL_BIO* pair = bio->pair;
- if (pair->wrIdx > 0 && pair->wrIdx <= pair->rdIdx) {
- /* in wrap around state where beginning of buffer is being
- * overwritten */
- return pair->wrSz - pair->rdIdx + pair->wrIdx;
- }
- else {
- /* simple case where has not wrapped around */
- return pair->wrIdx - pair->rdIdx;
- }
- }
- return 0;
-}
-
-
-long wolfSSL_BIO_get_mem_ptr(WOLFSSL_BIO *bio, WOLFSSL_BUF_MEM **ptr)
-{
- WOLFSSL_BIO* front = bio;
- long ret = WOLFSSL_FAILURE;
-
- WOLFSSL_ENTER("wolfSSL_BIO_get_mem_ptr");
-
- if (bio == NULL || ptr == NULL) {
- return WOLFSSL_FAILURE;
- }
-
- /* start at end and work backwards to find a memory BIO in the BIO chain */
- while ((bio != NULL) && (bio->next != NULL)) {
- bio = bio->next;
- }
-
- while (bio != NULL) {
-
- if (bio->type == WOLFSSL_BIO_MEMORY) {
- *ptr = bio->mem_buf;
- ret = WOLFSSL_SUCCESS;
- }
-
- if (bio == front) {
- break;
- }
- bio = bio->prev;
- }
-
- return ret;
-}
-
-WOLFSSL_API long wolfSSL_BIO_int_ctrl(WOLFSSL_BIO *bp, int cmd, long larg, int iarg)
-{
- (void) bp;
- (void) cmd;
- (void) larg;
- (void) iarg;
- WOLFSSL_STUB("BIO_int_ctrl");
- return 0;
-}
-
-
-int wolfSSL_BIO_set_write_buf_size(WOLFSSL_BIO *bio, long size)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_set_write_buf_size");
-
- if (bio == NULL || bio->type != WOLFSSL_BIO_BIO || size < 0) {
- return WOLFSSL_FAILURE;
- }
-
- /* if already in pair then do not change size */
- if (bio->pair != NULL) {
- WOLFSSL_MSG("WOLFSSL_BIO is paired, free from pair before changing");
- return WOLFSSL_FAILURE;
- }
-
- bio->wrSz = (int)size;
- if (bio->wrSz < 0) {
- WOLFSSL_MSG("Unexpected negative size value");
- return WOLFSSL_FAILURE;
- }
-
- if (bio->ptr != NULL) {
- XFREE(bio->ptr, bio->heap, DYNAMIC_TYPE_OPENSSL);
- }
-
- bio->ptr = (byte*)XMALLOC(bio->wrSz, bio->heap, DYNAMIC_TYPE_OPENSSL);
- if (bio->ptr == NULL) {
- WOLFSSL_MSG("Memory allocation error");
- return WOLFSSL_FAILURE;
- }
- bio->num = bio->wrSz;
- bio->wrIdx = 0;
- bio->rdIdx = 0;
- if (bio->mem_buf != NULL) {
- bio->mem_buf->data = (char*)bio->ptr;
- bio->mem_buf->length = bio->num;
- }
-
- return WOLFSSL_SUCCESS;
-}
-
-
-/* Joins two BIO_BIO types. The write of b1 goes to the read of b2 and vice
- * versa. Creating something similar to a two way pipe.
- * Reading and writing between the two BIOs is not thread safe, they are
- * expected to be used by the same thread. */
-int wolfSSL_BIO_make_bio_pair(WOLFSSL_BIO *b1, WOLFSSL_BIO *b2)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_make_bio_pair");
-
- if (b1 == NULL || b2 == NULL) {
- WOLFSSL_LEAVE("wolfSSL_BIO_make_bio_pair", BAD_FUNC_ARG);
- return WOLFSSL_FAILURE;
- }
-
- /* both are expected to be of type BIO and not already paired */
- if (b1->type != WOLFSSL_BIO_BIO || b2->type != WOLFSSL_BIO_BIO ||
- b1->pair != NULL || b2->pair != NULL) {
- WOLFSSL_MSG("Expected type BIO and not already paired");
- return WOLFSSL_FAILURE;
- }
-
- /* set default write size if not already set */
- if (b1->ptr == NULL && wolfSSL_BIO_set_write_buf_size(b1,
- WOLFSSL_BIO_SIZE) != WOLFSSL_SUCCESS) {
- return WOLFSSL_FAILURE;
- }
-
- if (b2->ptr == NULL && wolfSSL_BIO_set_write_buf_size(b2,
- WOLFSSL_BIO_SIZE) != WOLFSSL_SUCCESS) {
- return WOLFSSL_FAILURE;
- }
-
- b1->pair = b2;
- b2->pair = b1;
-
- return WOLFSSL_SUCCESS;
-}
-
-
-int wolfSSL_BIO_ctrl_reset_read_request(WOLFSSL_BIO *b)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_ctrl_reset_read_request");
-
- if (b == NULL || b->type == WOLFSSL_BIO_MEMORY) {
- return SSL_FAILURE;
- }
-
- b->readRq = 0;
-
- return WOLFSSL_SUCCESS;
-}
-
-
-/* Does not advance read index pointer */
-int wolfSSL_BIO_nread0(WOLFSSL_BIO *bio, char **buf)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_nread0");
-
- if (bio == NULL || buf == NULL) {
- WOLFSSL_MSG("NULL argument passed in");
- return 0;
- }
-
- /* if paired read from pair */
- if (bio->pair != NULL) {
- WOLFSSL_BIO* pair = bio->pair;
-
- /* case where have wrapped around write buffer */
- *buf = (char*)pair->ptr + pair->rdIdx;
- if (pair->wrIdx > 0 && pair->rdIdx >= pair->wrIdx) {
- return pair->wrSz - pair->rdIdx;
- }
- else {
- return pair->wrIdx - pair->rdIdx;
- }
- }
-
- return 0;
-}
-
-
-/* similar to wolfSSL_BIO_nread0 but advances the read index */
-int wolfSSL_BIO_nread(WOLFSSL_BIO *bio, char **buf, int num)
-{
- int sz = WOLFSSL_BIO_UNSET;
-
- WOLFSSL_ENTER("wolfSSL_BIO_nread");
-
- if (bio == NULL || buf == NULL) {
- WOLFSSL_MSG("NULL argument passed in");
- return WOLFSSL_FAILURE;
- }
-
- if (bio->type == WOLFSSL_BIO_MEMORY) {
- return SSL_FAILURE;
- }
-
- if (bio->pair != NULL) {
- /* special case if asking to read 0 bytes */
- if (num == 0) {
- *buf = (char*)bio->pair->ptr + bio->pair->rdIdx;
- return 0;
- }
-
- /* get amount able to read and set buffer pointer */
- sz = wolfSSL_BIO_nread0(bio, buf);
- if (sz == 0) {
- return WOLFSSL_BIO_ERROR;
- }
-
- if (num < sz) {
- sz = num;
- }
- bio->pair->rdIdx += sz;
-
- /* check if have read to the end of the buffer and need to reset */
- if (bio->pair->rdIdx == bio->pair->wrSz) {
- bio->pair->rdIdx = 0;
- if (bio->pair->wrIdx == bio->pair->wrSz) {
- bio->pair->wrIdx = 0;
- }
- }
-
- /* check if read up to write index, if so then reset index */
- if (bio->pair->rdIdx == bio->pair->wrIdx) {
- bio->pair->rdIdx = 0;
- bio->pair->wrIdx = 0;
- }
- }
-
- return sz;
-}
-
-
-int wolfSSL_BIO_nwrite(WOLFSSL_BIO *bio, char **buf, int num)
-{
- int sz = WOLFSSL_BIO_UNSET;
-
- WOLFSSL_ENTER("wolfSSL_BIO_nwrite");
-
- if (bio == NULL || buf == NULL) {
- WOLFSSL_MSG("NULL argument passed in");
- return 0;
- }
-
- if (bio->type != WOLFSSL_BIO_BIO) {
- return SSL_FAILURE;
- }
-
- if (bio->pair != NULL) {
- if (num == 0) {
- *buf = (char*)bio->ptr + bio->wrIdx;
- return 0;
- }
-
- if (bio->wrIdx < bio->rdIdx) {
- /* if wrapped around only write up to read index. In this case
- * rdIdx is always greater then wrIdx so sz will not be negative. */
- sz = bio->rdIdx - bio->wrIdx;
- }
- else if (bio->rdIdx > 0 && bio->wrIdx == bio->rdIdx) {
- return WOLFSSL_BIO_ERROR; /* no more room to write */
- }
- else {
- /* write index is past read index so write to end of buffer */
- sz = bio->wrSz - bio->wrIdx;
-
- if (sz <= 0) {
- /* either an error has occurred with write index or it is at the
- * end of the write buffer. */
- if (bio->rdIdx == 0) {
- /* no more room, nothing has been read */
- return WOLFSSL_BIO_ERROR;
- }
-
- bio->wrIdx = 0;
-
- /* check case where read index is not at 0 */
- if (bio->rdIdx > 0) {
- sz = bio->rdIdx; /* can write up to the read index */
- }
- else {
- sz = bio->wrSz; /* no restriction other then buffer size */
- }
- }
- }
-
- if (num < sz) {
- sz = num;
- }
- *buf = (char*)bio->ptr + bio->wrIdx;
- bio->wrIdx += sz;
-
- /* if at the end of the buffer and space for wrap around then set
- * write index back to 0 */
- if (bio->wrIdx == bio->wrSz && bio->rdIdx > 0) {
- bio->wrIdx = 0;
- }
- }
-
- return sz;
-}
-
-
-/* Reset BIO to initial state */
-int wolfSSL_BIO_reset(WOLFSSL_BIO *bio)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_reset");
-
- if (bio == NULL) {
- WOLFSSL_MSG("NULL argument passed in");
- /* -1 is consistent failure even for FILE type */
- return WOLFSSL_BIO_ERROR;
- }
-
- switch (bio->type) {
- #ifndef NO_FILESYSTEM
- case WOLFSSL_BIO_FILE:
- XREWIND((XFILE)bio->ptr);
- return 0;
- #endif
-
- case WOLFSSL_BIO_BIO:
- bio->rdIdx = 0;
- bio->wrIdx = 0;
- return 0;
-
- case WOLFSSL_BIO_MEMORY:
- bio->rdIdx = 0;
- bio->wrIdx = 0;
- bio->wrSz = 0;
- XFREE(bio->ptr, bio->heap, DYNAMIC_TYPE_OPENSSL);
- bio->ptr = NULL;
- bio->num = 0;
- if (bio->mem_buf != NULL) {
- bio->mem_buf->data = (char*)bio->ptr;
- bio->mem_buf->length = bio->num;
- }
- return 0;
-
-#ifndef WOLFCRYPT_ONLY
- case WOLFSSL_BIO_MD:
- if (bio->ptr != NULL) {
- const WOLFSSL_EVP_MD* md =
- wolfSSL_EVP_MD_CTX_md((WOLFSSL_EVP_MD_CTX*)bio->ptr);
- wolfSSL_EVP_MD_CTX_init((WOLFSSL_EVP_MD_CTX*)bio->ptr);
- wolfSSL_EVP_DigestInit((WOLFSSL_EVP_MD_CTX*)bio->ptr, md);
- }
- return 0;
-#endif /* WOLFCRYPT_ONLY */
-
- default:
- WOLFSSL_MSG("Unknown BIO type needs added to reset function");
- }
-
- return WOLFSSL_BIO_ERROR;
-}
-
-#ifndef NO_FILESYSTEM
-long wolfSSL_BIO_set_fp(WOLFSSL_BIO *bio, XFILE fp, int c)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_set_fp");
-
- if (bio == NULL || fp == XBADFILE) {
- WOLFSSL_LEAVE("wolfSSL_BIO_set_fp", BAD_FUNC_ARG);
- return WOLFSSL_FAILURE;
- }
-
- if (bio->type != WOLFSSL_BIO_FILE) {
- return WOLFSSL_FAILURE;
- }
-
- bio->shutdown = (byte)c;
- bio->ptr = (XFILE)fp;
-
- return WOLFSSL_SUCCESS;
-}
-
-
-long wolfSSL_BIO_get_fp(WOLFSSL_BIO *bio, XFILE* fp)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_get_fp");
-
- if (bio == NULL || fp == XBADFILE) {
- return WOLFSSL_FAILURE;
- }
-
- if (bio->type != WOLFSSL_BIO_FILE) {
- return SSL_FAILURE;
- }
-
- *fp = (XFILE)bio->ptr;
-
- return WOLFSSL_SUCCESS;
-}
-
-/* overwrites file */
-int wolfSSL_BIO_write_filename(WOLFSSL_BIO *bio, char *name)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_write_filename");
-
- if (bio == NULL || name == NULL) {
- return WOLFSSL_FAILURE;
- }
-
- if (bio->type == WOLFSSL_BIO_FILE) {
- if (((XFILE)bio->ptr) != XBADFILE && bio->shutdown == BIO_CLOSE) {
- XFCLOSE((XFILE)bio->ptr);
- }
-
- bio->ptr = XFOPEN(name, "w");
- if (((XFILE)bio->ptr) == XBADFILE) {
- return WOLFSSL_FAILURE;
- }
- bio->shutdown = BIO_CLOSE;
-
- return WOLFSSL_SUCCESS;
- }
-
- return WOLFSSL_FAILURE;
-}
-
-
-int wolfSSL_BIO_seek(WOLFSSL_BIO *bio, int ofs)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_seek");
-
- if (bio == NULL) {
- return -1;
- }
-
- /* offset ofs from beginning of file */
- if (bio->type == WOLFSSL_BIO_FILE &&
- XFSEEK((XFILE)bio->ptr, ofs, SEEK_SET) < 0) {
- return -1;
- }
-
- return 0;
-}
-#endif /* NO_FILESYSTEM */
-
-
-long wolfSSL_BIO_set_mem_eof_return(WOLFSSL_BIO *bio, int v)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_set_mem_eof_return");
-
- if (bio != NULL) {
- bio->eof = v;
- }
-
- return 0;
-}
-
-int wolfSSL_BIO_get_len(WOLFSSL_BIO *bio)
-{
- int len;
-#ifndef NO_FILESYSTEM
- long memSz = 0, curr = 0;
- XFILE file;
-#endif
-
- WOLFSSL_ENTER("wolfSSL_BIO_get_len");
-
- if ((len = wolfSSL_BIO_pending(bio)) > 0) {
- }
-#ifndef NO_FILESYSTEM
- else if (bio->type == WOLFSSL_BIO_FILE) {
- if (wolfSSL_BIO_get_fp(bio, &file) != WOLFSSL_SUCCESS)
- len = BAD_FUNC_ARG;
- if (len == 0) {
- curr = XFTELL(file);
- if (curr < 0) {
- len = WOLFSSL_BAD_FILE;
- }
- if (XFSEEK(file, 0, XSEEK_END) != 0)
- len = WOLFSSL_BAD_FILE;
- }
- if (len == 0) {
- memSz = XFTELL(file);
- if (memSz > MAX_WOLFSSL_FILE_SIZE || memSz < 0)
- len = WOLFSSL_BAD_FILE;
- }
- if (len == 0) {
- memSz -= curr;
- len = (int)memSz;
- if (XFSEEK(file, curr, SEEK_SET) != 0)
- len = WOLFSSL_BAD_FILE;
- }
- }
-#endif
- return len;
-}
-
-
-void wolfSSL_BIO_set_callback(WOLFSSL_BIO *bio, wolf_bio_info_cb callback_func)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_set_callback");
-
- if (bio != NULL) {
- bio->infoCb = callback_func;
- }
-}
-
-
-wolf_bio_info_cb wolfSSL_BIO_get_callback(WOLFSSL_BIO *bio)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_get_callback");
-
- if (bio != NULL) {
- return bio->infoCb;
- }
-
- return NULL;
-}
-
-
-void wolfSSL_BIO_set_callback_arg(WOLFSSL_BIO *bio, char *arg)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_set_callback_arg");
-
- if (bio != NULL) {
- bio->infoArg = arg;
- }
-}
-
-
-char* wolfSSL_BIO_get_callback_arg(const WOLFSSL_BIO *bio)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_get_callback_arg");
-
- if (bio != NULL) {
- return bio->infoArg;
- }
-
- return NULL;
-}
-
-
-/* store a user pointer in the WOLFSSL_BIO structure */
-void wolfSSL_BIO_set_data(WOLFSSL_BIO* bio, void *ptr)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_set_data");
-
- if (bio != NULL) {
- bio->usrCtx = ptr;
- }
-}
-
-
-void* wolfSSL_BIO_get_data(WOLFSSL_BIO* bio)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_get_data");
-
- if (bio != NULL)
- return bio->usrCtx;
-
- WOLFSSL_MSG("WOLFSSL_BIO was null");
- return NULL;
-}
-
-/* If flag is 0 then blocking is set, if 1 then non blocking.
- * Always returns 1
- */
-long wolfSSL_BIO_set_nbio(WOLFSSL_BIO* bio, long on)
-{
- #ifndef WOLFSSL_DTLS
- (void)on;
- #endif
- WOLFSSL_ENTER("wolfSSL_BIO_set_nbio");
-
- switch (bio->type) {
- case WOLFSSL_BIO_SOCKET:
- #ifdef XFCNTL
- {
- int flag = XFCNTL(bio->num, F_GETFL, 0);
- if (on)
- XFCNTL(bio->num, F_SETFL, flag | O_NONBLOCK);
- else
- XFCNTL(bio->num, F_SETFL, flag & ~O_NONBLOCK);
- }
- #endif
- break;
- case WOLFSSL_BIO_SSL:
- #ifdef WOLFSSL_DTLS
- wolfSSL_dtls_set_using_nonblock((WOLFSSL*)bio->ptr, (int)on);
- #endif
- break;
-
- default:
- WOLFSSL_MSG("Unsupported bio type for non blocking");
- break;
- }
-
- return 1;
-}
-
-
-
-/* creates a new custom WOLFSSL_BIO_METHOD */
-WOLFSSL_BIO_METHOD *wolfSSL_BIO_meth_new(int type, const char *name)
-{
- WOLFSSL_BIO_METHOD* meth;
-
- WOLFSSL_ENTER("wolfSSL_BIO_meth_new");
-
- meth = (WOLFSSL_BIO_METHOD*)XMALLOC(sizeof(WOLFSSL_BIO_METHOD), NULL,
- DYNAMIC_TYPE_OPENSSL);
- if (meth == NULL) {
- WOLFSSL_MSG("Error allocating memory for WOLFSSL_BIO_METHOD");
- return NULL;
- }
- XMEMSET(meth, 0, sizeof(WOLFSSL_BIO_METHOD));
- meth->type = (byte)type;
- XSTRNCPY(meth->name, name, MAX_BIO_METHOD_NAME - 1);
-
- return meth;
-}
-
-
-void wolfSSL_BIO_meth_free(WOLFSSL_BIO_METHOD *biom)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_meth_free");
- if (biom) {
- XFREE(biom, NULL, DYNAMIC_TYPE_OPENSSL);
- }
-}
-
-
-int wolfSSL_BIO_meth_set_write(WOLFSSL_BIO_METHOD *biom,
- wolfSSL_BIO_meth_write_cb biom_write)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_meth_set_write");
- if (biom) {
- biom->writeCb = biom_write;
- return WOLFSSL_SUCCESS;
- }
- return WOLFSSL_FAILURE;
-}
-
-
-int wolfSSL_BIO_meth_set_read(WOLFSSL_BIO_METHOD *biom,
- wolfSSL_BIO_meth_read_cb biom_read)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_meth_set_read");
- if (biom) {
- biom->readCb = biom_read;
- return WOLFSSL_SUCCESS;
- }
- return WOLFSSL_FAILURE;
-}
-
-
-int wolfSSL_BIO_meth_set_puts(WOLFSSL_BIO_METHOD *biom,
- wolfSSL_BIO_meth_puts_cb biom_puts)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_meth_set_puts");
- if (biom) {
- biom->putsCb = biom_puts;
- return WOLFSSL_SUCCESS;
- }
- return WOLFSSL_FAILURE;
-}
-
-
-int wolfSSL_BIO_meth_set_gets(WOLFSSL_BIO_METHOD *biom,
- wolfSSL_BIO_meth_gets_cb biom_gets)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_meth_set_gets");
- if (biom) {
- biom->getsCb = biom_gets;
- return WOLFSSL_SUCCESS;
- }
- return WOLFSSL_FAILURE;
-}
-
-
-int wolfSSL_BIO_meth_set_ctrl(WOLFSSL_BIO_METHOD *biom,
- wolfSSL_BIO_meth_ctrl_get_cb biom_ctrl)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_meth_set_ctrl");
- if (biom) {
- biom->ctrlCb = biom_ctrl;
- return WOLFSSL_SUCCESS;
- }
- return WOLFSSL_FAILURE;
-}
-
-
-int wolfSSL_BIO_meth_set_create(WOLFSSL_BIO_METHOD *biom,
- wolfSSL_BIO_meth_create_cb biom_create)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_meth_set_create");
- if (biom) {
- biom->createCb = biom_create;
- return WOLFSSL_SUCCESS;
- }
- return WOLFSSL_FAILURE;
-}
-
-
-int wolfSSL_BIO_meth_set_destroy(WOLFSSL_BIO_METHOD *biom,
- wolfSSL_BIO_meth_destroy_cb biom_destroy)
-{
- WOLFSSL_STUB("wolfSSL_BIO_meth_set_destroy");
- if (biom) {
- biom->freeCb = biom_destroy;
- return WOLFSSL_SUCCESS;
- }
- return WOLFSSL_FAILURE;
-}
-
-
-/* this compatibility function can be used for multiple BIO types */
-int wolfSSL_BIO_get_mem_data(WOLFSSL_BIO* bio, void* p)
-{
- WOLFSSL_ENTER("wolfSSL_BIO_get_mem_data");
-
- if (bio == NULL)
- return WOLFSSL_FATAL_ERROR;
-
- if (p) {
- *(byte**)p = (byte*)bio->ptr;
- }
-
- return bio->num;
-}
-
-int wolfSSL_BIO_pending(WOLFSSL_BIO* bio)
-{
- return (int)wolfSSL_BIO_ctrl_pending(bio);
-}
-
-
-int wolfSSL_BIO_flush(WOLFSSL_BIO* bio)
-{
- /* for wolfSSL no flushing needed */
- WOLFSSL_ENTER("BIO_flush");
- (void)bio;
- return 1;
-}
-#endif /* WOLFSSL_BIO_INCLUDED */