1 /* crypto/bio/bf_buff.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
62 #include <openssl/bio.h>
64 static int buffer_write(BIO
*h
, const char *buf
,int num
);
65 static int buffer_read(BIO
*h
, char *buf
, int size
);
66 static int buffer_puts(BIO
*h
, const char *str
);
67 static int buffer_gets(BIO
*h
, char *str
, int size
);
68 static long buffer_ctrl(BIO
*h
, int cmd
, long arg1
, void *arg2
);
69 static int buffer_new(BIO
*h
);
70 static int buffer_free(BIO
*data
);
71 static long buffer_callback_ctrl(BIO
*h
, int cmd
, bio_info_cb
*fp
);
72 #define DEFAULT_BUFFER_SIZE 4096
74 static BIO_METHOD methods_buffer
=
88 BIO_METHOD
*BIO_f_buffer(void)
90 return(&methods_buffer
);
93 static int buffer_new(BIO
*bi
)
95 BIO_F_BUFFER_CTX
*ctx
;
97 ctx
=(BIO_F_BUFFER_CTX
*)OPENSSL_malloc(sizeof(BIO_F_BUFFER_CTX
));
98 if (ctx
== NULL
) return(0);
99 ctx
->ibuf
=(char *)OPENSSL_malloc(DEFAULT_BUFFER_SIZE
);
100 if (ctx
->ibuf
== NULL
) { OPENSSL_free(ctx
); return(0); }
101 ctx
->obuf
=(char *)OPENSSL_malloc(DEFAULT_BUFFER_SIZE
);
102 if (ctx
->obuf
== NULL
) { OPENSSL_free(ctx
->ibuf
); OPENSSL_free(ctx
); return(0); }
103 ctx
->ibuf_size
=DEFAULT_BUFFER_SIZE
;
104 ctx
->obuf_size
=DEFAULT_BUFFER_SIZE
;
116 static int buffer_free(BIO
*a
)
120 if (a
== NULL
) return(0);
121 b
=(BIO_F_BUFFER_CTX
*)a
->ptr
;
122 if (b
->ibuf
!= NULL
) OPENSSL_free(b
->ibuf
);
123 if (b
->obuf
!= NULL
) OPENSSL_free(b
->obuf
);
124 OPENSSL_free(a
->ptr
);
131 static int buffer_read(BIO
*b
, char *out
, int outl
)
134 BIO_F_BUFFER_CTX
*ctx
;
136 if (out
== NULL
) return(0);
137 ctx
=(BIO_F_BUFFER_CTX
*)b
->ptr
;
139 if ((ctx
== NULL
) || (b
->next_bio
== NULL
)) return(0);
141 BIO_clear_retry_flags(b
);
145 /* If there is stuff left over, grab it */
148 if (i
> outl
) i
=outl
;
149 memcpy(out
,&(ctx
->ibuf
[ctx
->ibuf_off
]),i
);
153 if (outl
== i
) return(num
);
158 /* We may have done a partial read. try to do more.
159 * We have nothing in the buffer.
160 * If we get an error and have read some data, just return it
161 * and let them retry to get the error again.
162 * copy direct to parent address space */
163 if (outl
> ctx
->ibuf_size
)
167 i
=BIO_read(b
->next_bio
,out
,outl
);
170 BIO_copy_next_retry(b
);
171 if (i
< 0) return((num
> 0)?num
:i
);
172 if (i
== 0) return(num
);
175 if (outl
== i
) return(num
);
182 /* we are going to be doing some buffering */
183 i
=BIO_read(b
->next_bio
,ctx
->ibuf
,ctx
->ibuf_size
);
186 BIO_copy_next_retry(b
);
187 if (i
< 0) return((num
> 0)?num
:i
);
188 if (i
== 0) return(num
);
193 /* Lets re-read using ourselves :-) */
197 static int buffer_write(BIO
*b
, const char *in
, int inl
)
200 BIO_F_BUFFER_CTX
*ctx
;
202 if ((in
== NULL
) || (inl
<= 0)) return(0);
203 ctx
=(BIO_F_BUFFER_CTX
*)b
->ptr
;
204 if ((ctx
== NULL
) || (b
->next_bio
== NULL
)) return(0);
206 BIO_clear_retry_flags(b
);
208 i
=ctx
->obuf_size
-(ctx
->obuf_len
+ctx
->obuf_off
);
209 /* add to buffer and return */
212 memcpy(&(ctx
->obuf
[ctx
->obuf_off
+ctx
->obuf_len
]),in
,inl
);
217 /* stuff already in buffer, so add to it first, then flush */
218 if (ctx
->obuf_len
!= 0)
220 if (i
> 0) /* lets fill it up if we can */
222 memcpy(&(ctx
->obuf
[ctx
->obuf_off
+ctx
->obuf_len
]),in
,i
);
228 /* we now have a full buffer needing flushing */
231 i
=BIO_write(b
->next_bio
,&(ctx
->obuf
[ctx
->obuf_off
]),
235 BIO_copy_next_retry(b
);
237 if (i
< 0) return((num
> 0)?num
:i
);
238 if (i
== 0) return(num
);
242 if (ctx
->obuf_len
== 0) break;
245 /* we only get here if the buffer has been flushed and we
246 * still have stuff to write */
249 /* we now have inl bytes to write */
250 while (inl
>= ctx
->obuf_size
)
252 i
=BIO_write(b
->next_bio
,in
,inl
);
255 BIO_copy_next_retry(b
);
256 if (i
< 0) return((num
> 0)?num
:i
);
257 if (i
== 0) return(num
);
262 if (inl
== 0) return(num
);
265 /* copy the rest into the buffer since we have only a small
270 static long buffer_ctrl(BIO
*b
, int cmd
, long num
, void *ptr
)
273 BIO_F_BUFFER_CTX
*ctx
;
279 ctx
=(BIO_F_BUFFER_CTX
*)b
->ptr
;
288 if (b
->next_bio
== NULL
) return(0);
289 ret
=BIO_ctrl(b
->next_bio
,cmd
,num
,ptr
);
292 ret
=(long)ctx
->obuf_len
;
294 case BIO_C_GET_BUFF_NUM_LINES
:
297 for (i
=0; i
<ctx
->ibuf_len
; i
++)
299 if (p1
[ctx
->ibuf_off
+ i
] == '\n') ret
++;
302 case BIO_CTRL_WPENDING
:
303 ret
=(long)ctx
->obuf_len
;
306 if (b
->next_bio
== NULL
) return(0);
307 ret
=BIO_ctrl(b
->next_bio
,cmd
,num
,ptr
);
310 case BIO_CTRL_PENDING
:
311 ret
=(long)ctx
->ibuf_len
;
314 if (b
->next_bio
== NULL
) return(0);
315 ret
=BIO_ctrl(b
->next_bio
,cmd
,num
,ptr
);
318 case BIO_C_SET_BUFF_READ_DATA
:
319 if (num
> ctx
->ibuf_size
)
321 p1
=OPENSSL_malloc((int)num
);
322 if (p1
== NULL
) goto malloc_error
;
323 if (ctx
->ibuf
!= NULL
) OPENSSL_free(ctx
->ibuf
);
327 ctx
->ibuf_len
=(int)num
;
328 memcpy(ctx
->ibuf
,ptr
,(int)num
);
331 case BIO_C_SET_BUFF_SIZE
:
340 else /* if (*ip == 1) */
353 if ((ibs
> DEFAULT_BUFFER_SIZE
) && (ibs
!= ctx
->ibuf_size
))
355 p1
=(char *)OPENSSL_malloc((int)num
);
356 if (p1
== NULL
) goto malloc_error
;
358 if ((obs
> DEFAULT_BUFFER_SIZE
) && (obs
!= ctx
->obuf_size
))
360 p2
=(char *)OPENSSL_malloc((int)num
);
363 if (p1
!= ctx
->ibuf
) OPENSSL_free(p1
);
369 OPENSSL_free(ctx
->ibuf
);
377 OPENSSL_free(ctx
->obuf
);
384 case BIO_C_DO_STATE_MACHINE
:
385 if (b
->next_bio
== NULL
) return(0);
386 BIO_clear_retry_flags(b
);
387 ret
=BIO_ctrl(b
->next_bio
,cmd
,num
,ptr
);
388 BIO_copy_next_retry(b
);
392 if (b
->next_bio
== NULL
) return(0);
393 if (ctx
->obuf_len
<= 0)
395 ret
=BIO_ctrl(b
->next_bio
,cmd
,num
,ptr
);
401 BIO_clear_retry_flags(b
);
402 if (ctx
->obuf_len
> 0)
404 r
=BIO_write(b
->next_bio
,
405 &(ctx
->obuf
[ctx
->obuf_off
]),
408 fprintf(stderr
,"FLUSH [%3d] %3d -> %3d\n",ctx
->obuf_off
,ctx
->obuf_len
,r
);
410 BIO_copy_next_retry(b
);
411 if (r
<= 0) return((long)r
);
423 ret
=BIO_ctrl(b
->next_bio
,cmd
,num
,ptr
);
427 if ( !BIO_set_read_buffer_size(dbio
,ctx
->ibuf_size
) ||
428 !BIO_set_write_buffer_size(dbio
,ctx
->obuf_size
))
432 if (b
->next_bio
== NULL
) return(0);
433 ret
=BIO_ctrl(b
->next_bio
,cmd
,num
,ptr
);
438 BIOerr(BIO_F_BUFFER_CTRL
,ERR_R_MALLOC_FAILURE
);
442 static long buffer_callback_ctrl(BIO
*b
, int cmd
, bio_info_cb
*fp
)
446 if (b
->next_bio
== NULL
) return(0);
450 ret
=BIO_callback_ctrl(b
->next_bio
,cmd
,fp
);
456 static int buffer_gets(BIO
*b
, char *buf
, int size
)
458 BIO_F_BUFFER_CTX
*ctx
;
462 ctx
=(BIO_F_BUFFER_CTX
*)b
->ptr
;
463 size
--; /* reserve space for a '\0' */
464 BIO_clear_retry_flags(b
);
468 if (ctx
->ibuf_len
> 0)
470 p
= &(ctx
->ibuf
[ctx
->ibuf_off
]);
472 for (i
=0; (i
<ctx
->ibuf_len
) && (i
<size
); i
++)
486 if (flag
|| size
== 0)
492 else /* read another chunk */
494 i
=BIO_read(b
->next_bio
,ctx
->ibuf
,ctx
->ibuf_size
);
497 BIO_copy_next_retry(b
);
499 if (i
< 0) return((num
> 0)?num
:i
);
500 if (i
== 0) return(num
);
508 static int buffer_puts(BIO
*b
, const char *str
)
510 return(buffer_write(b
,str
,strlen(str
)));