2 Copyright (C) 2000 Christian Fraenkel.
4 This file is part of Wget.
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
28 #include <openssl/bio.h>
29 #include <openssl/crypto.h>
30 #include <openssl/x509.h>
31 #include <openssl/ssl.h>
32 #include <openssl/err.h>
33 #include <openssl/pem.h>
35 #define SSL_ERR_CTX_CREATION -2
44 /* #### Shouldn't this be static? --hniksic */
45 int verify_callback PARAMS ((int, X509_STORE_CTX *));
47 /* Creates a SSL Context and sets some defaults for it */
49 init_ssl (SSL_CTX **ctx)
51 SSL_METHOD *meth = NULL;
52 int verify = SSL_VERIFY_NONE;
54 SSL_load_error_strings ();
55 SSLeay_add_all_algorithms ();
56 SSLeay_add_ssl_algorithms ();
57 meth = SSLv23_client_method ();
58 *ctx = SSL_CTX_new (meth);
59 SSL_CTX_set_verify (*ctx, verify, verify_callback);
60 if (*ctx == NULL) return SSL_ERR_CTX_CREATION;
61 return 0; /* Succeded */
64 /* Sets up a SSL structure and performs the handshake on fd
65 Returns 0 if everything went right
66 Returns 1 if something went wrong ----- TODO: More exit codes
69 connect_ssl (SSL **con, SSL_CTX *ctx, int fd)
71 *con = (SSL *)SSL_new (ctx);
72 SSL_set_fd (*con, fd);
73 SSL_set_connect_state (*con);
75 if ((*con)->state != SSL_ST_OK)
81 shutdown_ssl (SSL* con)
89 free_ssl_ctx (SSL_CTX * ctx)
95 verify_callback (int ok, X509_STORE_CTX *ctx)
98 s = X509_NAME_oneline (X509_get_subject_name (ctx->current_cert), buf, 256);
100 switch (ctx->error) {
101 case X509_V_ERR_CERT_NOT_YET_VALID:
102 case X509_V_ERR_CERT_HAS_EXPIRED:
103 case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT:
110 /* SSL version of iread. Only exchanged read for SSL_read
111 Read at most LEN bytes from FD, storing them to BUF. This is
112 virtually the same as read(), but takes care of EINTR braindamage
113 and uses select() to timeout the stale connections (a connection is
114 stale if more than OPT.TIMEOUT time is spent in select() or
117 ssl_iread (SSL *con, char *buf, int len)
121 BIO_get_fd (con->rbio, &fd);
130 res = select_fd (fd, opt.timeout, 0);
132 while (res == -1 && errno == EINTR);
135 /* Set errno to ETIMEDOUT on timeout. */
137 /* #### Potentially evil! */
143 res = SSL_read (con, buf, len);
145 while (res == -1 && errno == EINTR);
150 /* SSL version of iwrite. Only exchanged write for SSL_write
151 Write LEN bytes from BUF to FD. This is similar to iread(), but
152 doesn't bother with select(). Unlike iread(), it makes sure that
153 all of BUF is actually written to FD, so callers needn't bother
154 with checking that the return value equals to LEN. Instead, you
155 should simply check for -1. */
157 ssl_iwrite (SSL *con, char *buf, int len)
161 BIO_get_fd (con->rbio, &fd);
162 /* `write' may write less than LEN bytes, thus the outward loop
163 keeps trying it until all was written, or an error occurred. The
164 inner loop is reserved for the usual EINTR f*kage, and the
165 innermost loop deals with the same during select(). */
175 res = select_fd (fd, opt.timeout, 1);
177 while (res == -1 && errno == EINTR);
180 /* Set errno to ETIMEDOUT on timeout. */
182 /* #### Potentially evil! */
188 res = SSL_write (con, buf, len);
190 while (res == -1 && errno == EINTR);
198 #endif /* HAVE_SSL */