| // Copyright (C) 2010 David Sugar, Tycho Softworks. |
| // |
| // This file is part of GNU uCommon C++. |
| // |
| // GNU uCommon C++ is free software: you can redistribute it and/or modify |
| // it under the terms of the GNU Lesser General Public License as published |
| // by the Free Software Foundation, either version 3 of the License, or |
| // (at your option) any later version. |
| // |
| // GNU uCommon C++ is distributed in the hope that it will be useful, |
| // but WITHOUT ANY WARRANTY; without even the implied warranty of |
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| // GNU Lesser General Public License for more details. |
| // |
| // You should have received a copy of the GNU Lesser General Public License |
| // along with GNU uCommon C++. If not, see <http://www.gnu.org/licenses/>. |
| |
| #include "local.h" |
| |
| SSLBuffer::SSLBuffer(secure::client_t scontext) : |
| TCPBuffer() |
| { |
| context *ctx = (context *)scontext; |
| ssl = NULL; |
| bio = NULL; |
| server = false; |
| |
| if(ctx && ctx->ctx && ctx->err() == secure::OK) |
| ssl = SSL_new(ctx->ctx); |
| } |
| |
| SSLBuffer::SSLBuffer(const TCPServer *tcp, secure::server_t scontext, size_t size) : |
| TCPBuffer(tcp, size) |
| { |
| context *ctx = (context *)scontext; |
| ssl = NULL; |
| bio = NULL; |
| server = true; |
| |
| if(ctx && ctx->ctx && ctx->err() == secure::OK) |
| ssl = SSL_new(ctx->ctx); |
| |
| if(!is_open() || !ssl) |
| return; |
| |
| SSL_set_fd((SSL *)ssl, getsocket()); |
| |
| if(SSL_accept((SSL *)ssl) > 0) |
| bio = SSL_get_wbio((SSL *)ssl); |
| } |
| |
| SSLBuffer::~SSLBuffer() |
| { |
| release(); |
| } |
| |
| void SSLBuffer::open(const char *host, const char *service, size_t size) |
| { |
| if(server) { |
| ioerr = EBADF; |
| return; |
| } |
| |
| close(); |
| TCPBuffer::open(host, service, size); |
| |
| if(!is_open() || !ssl) |
| return; |
| |
| SSL_set_fd((SSL *)ssl, getsocket()); |
| |
| if(SSL_connect((SSL *)ssl) > 0) |
| bio = SSL_get_wbio((SSL *)ssl); |
| } |
| |
| void SSLBuffer::close(void) |
| { |
| if(server) { |
| ioerr = EBADF; |
| return; |
| } |
| |
| if(bio) { |
| SSL_shutdown((SSL *)ssl); |
| bio = NULL; |
| } |
| |
| TCPBuffer::close(); |
| } |
| |
| void SSLBuffer::release(void) |
| { |
| server = false; |
| close(); |
| if(ssl) { |
| SSL_free((SSL *)ssl); |
| ssl = NULL; |
| } |
| } |
| |
| size_t SSLBuffer::_push(const char *address, size_t size) |
| { |
| if(!bio) |
| return TCPBuffer::_push(address, size); |
| |
| int result = SSL_write((SSL *)ssl, address, size); |
| if(result < 0) { |
| result = 0; |
| ioerr = EIO; |
| } |
| return (ssize_t)result; |
| } |
| |
| bool SSLBuffer::_pending(void) |
| { |
| if(so == INVALID_SOCKET) |
| return false; |
| |
| if(input_pending()) |
| return true; |
| |
| if(ssl && SSL_pending((SSL *)ssl)) |
| return true; |
| |
| if(iowait && iowait != Timer::inf) |
| return Socket::wait(so, iowait); |
| |
| return Socket::wait(so, 0); |
| } |
| |
| size_t SSLBuffer::_pull(char *address, size_t size) |
| { |
| if(!bio) |
| return TCPBuffer::_pull(address, size); |
| |
| if(SSL_pending((SSL *)ssl) == 0 && iowait && iowait != Timer::inf && !Socket::wait(so, iowait)) |
| return 0; |
| |
| int result = SSL_read((SSL *)ssl, address, size); |
| if(result < 0) { |
| result = 0; |
| ioerr = EIO; |
| } |
| return (size_t) result; |
| } |
| |
| bool SSLBuffer::_flush(void) |
| { |
| int result; |
| |
| if(TCPBuffer::_flush()) { |
| if(bio) { |
| result = BIO_flush((BIO *)bio); |
| if(result < 1) { |
| ioerr = EIO; |
| return false; |
| } |
| } |
| return true; |
| } |
| |
| return false; |
| } |
| |