blob: 65ffae0da1b2720d3cf5538d9979667723073c26 [file] [log] [blame]
// Copyright (C) 2010 David Sugar, Tycho Softworks.
//
// This file is part of GNU uCommon C++.
//
// GNU uCommon C++ is free software: you can redistribute it and/or modify
// it under the terms of the GNU Lesser General Public License as published
// by the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// GNU uCommon C++ is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Lesser General Public License for more details.
//
// You should have received a copy of the GNU Lesser General Public License
// along with GNU uCommon C++. If not, see <http://www.gnu.org/licenses/>.
#include "local.h"
SSLBuffer::SSLBuffer(secure::client_t scontext) :
TCPBuffer()
{
context *ctx = (context *)scontext;
ssl = NULL;
bio = NULL;
server = false;
if(ctx && ctx->ctx && ctx->err() == secure::OK)
ssl = SSL_new(ctx->ctx);
}
SSLBuffer::SSLBuffer(const TCPServer *tcp, secure::server_t scontext, size_t size) :
TCPBuffer(tcp, size)
{
context *ctx = (context *)scontext;
ssl = NULL;
bio = NULL;
server = true;
if(ctx && ctx->ctx && ctx->err() == secure::OK)
ssl = SSL_new(ctx->ctx);
if(!is_open() || !ssl)
return;
SSL_set_fd((SSL *)ssl, getsocket());
if(SSL_accept((SSL *)ssl) > 0)
bio = SSL_get_wbio((SSL *)ssl);
}
SSLBuffer::~SSLBuffer()
{
release();
}
void SSLBuffer::open(const char *host, const char *service, size_t size)
{
if(server) {
ioerr = EBADF;
return;
}
close();
TCPBuffer::open(host, service, size);
if(!is_open() || !ssl)
return;
SSL_set_fd((SSL *)ssl, getsocket());
if(SSL_connect((SSL *)ssl) > 0)
bio = SSL_get_wbio((SSL *)ssl);
}
void SSLBuffer::close(void)
{
if(server) {
ioerr = EBADF;
return;
}
if(bio) {
SSL_shutdown((SSL *)ssl);
bio = NULL;
}
TCPBuffer::close();
}
void SSLBuffer::release(void)
{
server = false;
close();
if(ssl) {
SSL_free((SSL *)ssl);
ssl = NULL;
}
}
size_t SSLBuffer::_push(const char *address, size_t size)
{
if(!bio)
return TCPBuffer::_push(address, size);
int result = SSL_write((SSL *)ssl, address, size);
if(result < 0) {
result = 0;
ioerr = EIO;
}
return (ssize_t)result;
}
bool SSLBuffer::_pending(void)
{
if(so == INVALID_SOCKET)
return false;
if(input_pending())
return true;
if(ssl && SSL_pending((SSL *)ssl))
return true;
if(iowait && iowait != Timer::inf)
return Socket::wait(so, iowait);
return Socket::wait(so, 0);
}
size_t SSLBuffer::_pull(char *address, size_t size)
{
if(!bio)
return TCPBuffer::_pull(address, size);
if(SSL_pending((SSL *)ssl) == 0 && iowait && iowait != Timer::inf && !Socket::wait(so, iowait))
return 0;
int result = SSL_read((SSL *)ssl, address, size);
if(result < 0) {
result = 0;
ioerr = EIO;
}
return (size_t) result;
}
bool SSLBuffer::_flush(void)
{
int result;
if(TCPBuffer::_flush()) {
if(bio) {
result = BIO_flush((BIO *)bio);
if(result < 1) {
ioerr = EIO;
return false;
}
}
return true;
}
return false;
}