blob: 38747837502dc4699067178022c613ce7dcb009d [file] [log] [blame]
Paul Bakker5121ce52009-01-03 21:22:43 +00001/*
Manuel Pégourié-Gonnardf4acfe12014-09-17 10:56:54 +02002 * TCP/IP or UDP/IP networking functions
Paul Bakker5121ce52009-01-03 21:22:43 +00003 *
Bence Szépkútia2947ac2020-08-19 16:37:36 +02004 * Copyright The Mbed TLS Contributors
Bence Szépkútif744bd72020-06-05 13:02:18 +02005 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
6 *
7 * This file is provided under the Apache License 2.0, or the
8 * GNU General Public License v2.0 or later.
9 *
10 * **********
11 * Apache License 2.0:
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +020012 *
13 * Licensed under the Apache License, Version 2.0 (the "License"); you may
14 * not use this file except in compliance with the License.
15 * You may obtain a copy of the License at
16 *
17 * http://www.apache.org/licenses/LICENSE-2.0
18 *
19 * Unless required by applicable law or agreed to in writing, software
20 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
21 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
22 * See the License for the specific language governing permissions and
23 * limitations under the License.
Paul Bakkerb96f1542010-07-18 20:36:00 +000024 *
Bence Szépkútif744bd72020-06-05 13:02:18 +020025 * **********
26 *
27 * **********
28 * GNU General Public License v2.0 or later:
29 *
30 * This program is free software; you can redistribute it and/or modify
31 * it under the terms of the GNU General Public License as published by
32 * the Free Software Foundation; either version 2 of the License, or
33 * (at your option) any later version.
34 *
35 * This program is distributed in the hope that it will be useful,
36 * but WITHOUT ANY WARRANTY; without even the implied warranty of
37 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
38 * GNU General Public License for more details.
39 *
40 * You should have received a copy of the GNU General Public License along
41 * with this program; if not, write to the Free Software Foundation, Inc.,
42 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
43 *
44 * **********
Paul Bakker5121ce52009-01-03 21:22:43 +000045 */
46
Nicholas Wilson2682edf2017-12-05 12:08:15 +000047/* Enable definition of getaddrinfo() even when compiling with -std=c99. Must
48 * be set before config.h, which pulls in glibc's features.h indirectly.
49 * Harmless on other platforms. */
Flavio Ceolin9911e4a2020-05-27 22:41:19 -070050#ifndef _POSIX_C_SOURCE
Nicholas Wilson2682edf2017-12-05 12:08:15 +000051#define _POSIX_C_SOURCE 200112L
Flavio Ceolin9911e4a2020-05-27 22:41:19 -070052#endif
Nicholas Wilson2682edf2017-12-05 12:08:15 +000053
gufe4419735b62020-08-13 11:03:54 +020054#if defined(__NetBSD__)
Flavio Ceolin9911e4a2020-05-27 22:41:19 -070055#ifndef _XOPEN_SOURCE
gufe4419735b62020-08-13 11:03:54 +020056#define _XOPEN_SOURCE 600 /* sockaddr_storage */
57#endif
Flavio Ceolin9911e4a2020-05-27 22:41:19 -070058#endif
gufe4419735b62020-08-13 11:03:54 +020059
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020060#if !defined(MBEDTLS_CONFIG_FILE)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000061#include "mbedtls/config.h"
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020062#else
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020063#include MBEDTLS_CONFIG_FILE
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020064#endif
Paul Bakker5121ce52009-01-03 21:22:43 +000065
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020066#if defined(MBEDTLS_NET_C)
Paul Bakker5121ce52009-01-03 21:22:43 +000067
Manuel Pégourié-Gonnard325ce092016-02-22 10:33:34 +010068#if !defined(unix) && !defined(__unix__) && !defined(__unix) && \
Augustin Cavalier60bc47d2018-04-11 20:27:32 -040069 !defined(__APPLE__) && !defined(_WIN32) && !defined(__QNXNTO__) && \
70 !defined(__HAIKU__)
Manuel Pégourié-Gonnard325ce092016-02-22 10:33:34 +010071#error "This module only works on Unix and Windows, see MBEDTLS_NET_C in config.h"
72#endif
73
SimonBd5800b72016-04-26 07:43:27 +010074#if defined(MBEDTLS_PLATFORM_C)
75#include "mbedtls/platform.h"
76#else
77#include <stdlib.h>
SimonBd5800b72016-04-26 07:43:27 +010078#endif
79
Andres AG788aa4a2016-09-14 14:32:09 +010080#include "mbedtls/net_sockets.h"
Paul Bakker5121ce52009-01-03 21:22:43 +000081
Rich Evans00ab4702015-02-06 13:43:58 +000082#include <string.h>
83
Paul Bakkerfa6a6202013-10-28 18:48:30 +010084#if (defined(_WIN32) || defined(_WIN32_WCE)) && !defined(EFIX64) && \
85 !defined(EFI32)
Paul Bakker5121ce52009-01-03 21:22:43 +000086
Gilles Peskineea7dbbe2018-03-15 23:25:21 +010087#define IS_EINTR( ret ) ( ( ret ) == WSAEINTR )
Hanno Beckeref527962018-03-15 15:49:24 +000088
Fabio Alessandrellidf608562018-04-03 19:40:11 +020089#if !defined(_WIN32_WINNT) || (_WIN32_WINNT < 0x0501)
Manuel Pégourié-Gonnard3b6269a2014-03-21 10:31:12 +010090#undef _WIN32_WINNT
Manuel Pégourié-Gonnard3b6269a2014-03-21 10:31:12 +010091/* Enables getaddrinfo() & Co */
Manuel Pégourié-Gonnard13211352013-12-17 17:38:55 +010092#define _WIN32_WINNT 0x0501
Fabio Alessandrellidf608562018-04-03 19:40:11 +020093#endif
94
Manuel Pégourié-Gonnard6a398d42013-12-17 16:10:58 +010095#include <ws2tcpip.h>
Manuel Pégourié-Gonnard6a398d42013-12-17 16:10:58 +010096
Manuel Pégourié-Gonnard13211352013-12-17 17:38:55 +010097#include <winsock2.h>
98#include <windows.h>
99
Paul Bakkerf0fc2a22013-12-30 15:42:43 +0100100#if defined(_MSC_VER)
Paul Bakker5121ce52009-01-03 21:22:43 +0000101#if defined(_WIN32_WCE)
102#pragma comment( lib, "ws2.lib" )
103#else
104#pragma comment( lib, "ws2_32.lib" )
105#endif
Paul Bakkerf0fc2a22013-12-30 15:42:43 +0100106#endif /* _MSC_VER */
Paul Bakker5121ce52009-01-03 21:22:43 +0000107
Andres Amaya Garciabd9d42c2017-07-12 14:04:40 +0100108#define read(fd,buf,len) recv( fd, (char*)( buf ), (int)( len ), 0 )
109#define write(fd,buf,len) send( fd, (char*)( buf ), (int)( len ), 0 )
Paul Bakker5121ce52009-01-03 21:22:43 +0000110#define close(fd) closesocket(fd)
111
112static int wsa_init_done = 0;
113
Paul Bakkerdb20c102014-06-17 14:34:44 +0200114#else /* ( _WIN32 || _WIN32_WCE ) && !EFIX64 && !EFI32 */
Paul Bakker5121ce52009-01-03 21:22:43 +0000115
116#include <sys/types.h>
117#include <sys/socket.h>
118#include <netinet/in.h>
119#include <arpa/inet.h>
120#include <sys/time.h>
121#include <unistd.h>
122#include <signal.h>
123#include <fcntl.h>
124#include <netdb.h>
125#include <errno.h>
Paul Bakkerb3bb6c02009-07-27 21:09:47 +0000126
Gilles Peskineea7dbbe2018-03-15 23:25:21 +0100127#define IS_EINTR( ret ) ( ( ret ) == EINTR )
Hanno Beckeref527962018-03-15 15:49:24 +0000128
Paul Bakkerdb20c102014-06-17 14:34:44 +0200129#endif /* ( _WIN32 || _WIN32_WCE ) && !EFIX64 && !EFI32 */
Paul Bakker5121ce52009-01-03 21:22:43 +0000130
Manuel Pégourié-Gonnard9de64f52015-07-01 15:51:43 +0200131/* Some MS functions want int and MSVC warns if we pass size_t,
Andres Amaya Garciabd9d42c2017-07-12 14:04:40 +0100132 * but the standard functions use socklen_t, so cast only for MSVC */
Manuel Pégourié-Gonnard9de64f52015-07-01 15:51:43 +0200133#if defined(_MSC_VER)
134#define MSVC_INT_CAST (int)
135#else
136#define MSVC_INT_CAST
137#endif
138
Paul Bakker5121ce52009-01-03 21:22:43 +0000139#include <stdio.h>
Paul Bakkerfa9b1002013-07-03 15:31:03 +0200140
Paul Bakker5121ce52009-01-03 21:22:43 +0000141#include <time.h>
142
Manuel Pégourié-Gonnard93866642015-06-22 19:21:23 +0200143#include <stdint.h>
Paul Bakker5c2364c2012-10-01 14:41:15 +0000144
Paul Bakker5121ce52009-01-03 21:22:43 +0000145/*
Manuel Pégourié-Gonnard2e5c3162013-12-13 11:55:32 +0100146 * Prepare for using the sockets interface
Paul Bakker5121ce52009-01-03 21:22:43 +0000147 */
Manuel Pégourié-Gonnard173402b2013-12-17 15:57:05 +0100148static int net_prepare( void )
Paul Bakker5121ce52009-01-03 21:22:43 +0000149{
Paul Bakkerfa6a6202013-10-28 18:48:30 +0100150#if ( defined(_WIN32) || defined(_WIN32_WCE) ) && !defined(EFIX64) && \
151 !defined(EFI32)
Paul Bakker5121ce52009-01-03 21:22:43 +0000152 WSADATA wsaData;
153
154 if( wsa_init_done == 0 )
155 {
Peter Vaskovic7015de72014-05-15 02:54:37 +0200156 if( WSAStartup( MAKEWORD(2,0), &wsaData ) != 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200157 return( MBEDTLS_ERR_NET_SOCKET_FAILED );
Paul Bakker5121ce52009-01-03 21:22:43 +0000158
159 wsa_init_done = 1;
160 }
161#else
Paul Bakkerfa6a6202013-10-28 18:48:30 +0100162#if !defined(EFIX64) && !defined(EFI32)
Paul Bakker5121ce52009-01-03 21:22:43 +0000163 signal( SIGPIPE, SIG_IGN );
164#endif
Paul Bakkerfa6a6202013-10-28 18:48:30 +0100165#endif
Manuel Pégourié-Gonnardee5db1d2013-12-17 16:46:19 +0100166 return( 0 );
Manuel Pégourié-Gonnard2e5c3162013-12-13 11:55:32 +0100167}
168
169/*
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200170 * Initialize a context
171 */
172void mbedtls_net_init( mbedtls_net_context *ctx )
173{
174 ctx->fd = -1;
175}
176
177/*
Manuel Pégourié-Gonnardf5a13122014-03-23 17:38:16 +0100178 * Initiate a TCP connection with host:port and the given protocol
Manuel Pégourié-Gonnard2e5c3162013-12-13 11:55:32 +0100179 */
Simon Butcher532c94d2016-11-10 17:30:18 +0000180int mbedtls_net_connect( mbedtls_net_context *ctx, const char *host,
181 const char *port, int proto )
Manuel Pégourié-Gonnard2e5c3162013-12-13 11:55:32 +0100182{
Manuel Pégourié-Gonnard173402b2013-12-17 15:57:05 +0100183 int ret;
Manuel Pégourié-Gonnard10934de2013-12-13 12:54:09 +0100184 struct addrinfo hints, *addr_list, *cur;
Manuel Pégourié-Gonnard10934de2013-12-13 12:54:09 +0100185
Manuel Pégourié-Gonnard173402b2013-12-17 15:57:05 +0100186 if( ( ret = net_prepare() ) != 0 )
187 return( ret );
Manuel Pégourié-Gonnard10934de2013-12-13 12:54:09 +0100188
Manuel Pégourié-Gonnardf5a13122014-03-23 17:38:16 +0100189 /* Do name resolution with both IPv6 and IPv4 */
Manuel Pégourié-Gonnard10934de2013-12-13 12:54:09 +0100190 memset( &hints, 0, sizeof( hints ) );
191 hints.ai_family = AF_UNSPEC;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200192 hints.ai_socktype = proto == MBEDTLS_NET_PROTO_UDP ? SOCK_DGRAM : SOCK_STREAM;
193 hints.ai_protocol = proto == MBEDTLS_NET_PROTO_UDP ? IPPROTO_UDP : IPPROTO_TCP;
Manuel Pégourié-Gonnard10934de2013-12-13 12:54:09 +0100194
Manuel Pégourié-Gonnardc0d74942015-06-23 12:30:57 +0200195 if( getaddrinfo( host, port, &hints, &addr_list ) != 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200196 return( MBEDTLS_ERR_NET_UNKNOWN_HOST );
Manuel Pégourié-Gonnard10934de2013-12-13 12:54:09 +0100197
198 /* Try the sockaddrs until a connection succeeds */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200199 ret = MBEDTLS_ERR_NET_UNKNOWN_HOST;
Manuel Pégourié-Gonnard10934de2013-12-13 12:54:09 +0100200 for( cur = addr_list; cur != NULL; cur = cur->ai_next )
201 {
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200202 ctx->fd = (int) socket( cur->ai_family, cur->ai_socktype,
Paul Bakker00f5c522013-12-31 10:45:16 +0100203 cur->ai_protocol );
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200204 if( ctx->fd < 0 )
Manuel Pégourié-Gonnard10934de2013-12-13 12:54:09 +0100205 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200206 ret = MBEDTLS_ERR_NET_SOCKET_FAILED;
Manuel Pégourié-Gonnard10934de2013-12-13 12:54:09 +0100207 continue;
208 }
209
Manuel Pégourié-Gonnard9de64f52015-07-01 15:51:43 +0200210 if( connect( ctx->fd, cur->ai_addr, MSVC_INT_CAST cur->ai_addrlen ) == 0 )
Manuel Pégourié-Gonnard10934de2013-12-13 12:54:09 +0100211 {
212 ret = 0;
213 break;
214 }
215
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200216 close( ctx->fd );
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200217 ret = MBEDTLS_ERR_NET_CONNECT_FAILED;
Manuel Pégourié-Gonnard10934de2013-12-13 12:54:09 +0100218 }
219
220 freeaddrinfo( addr_list );
221
222 return( ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000223}
224
225/*
226 * Create a listening socket on bind_ip:port
227 */
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200228int mbedtls_net_bind( mbedtls_net_context *ctx, const char *bind_ip, const char *port, int proto )
Paul Bakker5121ce52009-01-03 21:22:43 +0000229{
Manuel Pégourié-Gonnard173402b2013-12-17 15:57:05 +0100230 int n, ret;
Manuel Pégourié-Gonnard389ce632013-12-13 14:00:51 +0100231 struct addrinfo hints, *addr_list, *cur;
Manuel Pégourié-Gonnard389ce632013-12-13 14:00:51 +0100232
Manuel Pégourié-Gonnard173402b2013-12-17 15:57:05 +0100233 if( ( ret = net_prepare() ) != 0 )
234 return( ret );
Manuel Pégourié-Gonnard389ce632013-12-13 14:00:51 +0100235
Manuel Pégourié-Gonnarddb2468d2015-06-30 17:19:48 +0200236 /* Bind to IPv6 and/or IPv4, but only in the desired protocol */
Manuel Pégourié-Gonnard389ce632013-12-13 14:00:51 +0100237 memset( &hints, 0, sizeof( hints ) );
238 hints.ai_family = AF_UNSPEC;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200239 hints.ai_socktype = proto == MBEDTLS_NET_PROTO_UDP ? SOCK_DGRAM : SOCK_STREAM;
240 hints.ai_protocol = proto == MBEDTLS_NET_PROTO_UDP ? IPPROTO_UDP : IPPROTO_TCP;
Manuel Pégourié-Gonnard389ce632013-12-13 14:00:51 +0100241 if( bind_ip == NULL )
242 hints.ai_flags = AI_PASSIVE;
243
Manuel Pégourié-Gonnardc0d74942015-06-23 12:30:57 +0200244 if( getaddrinfo( bind_ip, port, &hints, &addr_list ) != 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200245 return( MBEDTLS_ERR_NET_UNKNOWN_HOST );
Manuel Pégourié-Gonnard389ce632013-12-13 14:00:51 +0100246
247 /* Try the sockaddrs until a binding succeeds */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200248 ret = MBEDTLS_ERR_NET_UNKNOWN_HOST;
Manuel Pégourié-Gonnard389ce632013-12-13 14:00:51 +0100249 for( cur = addr_list; cur != NULL; cur = cur->ai_next )
250 {
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200251 ctx->fd = (int) socket( cur->ai_family, cur->ai_socktype,
Paul Bakker00f5c522013-12-31 10:45:16 +0100252 cur->ai_protocol );
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200253 if( ctx->fd < 0 )
Manuel Pégourié-Gonnard389ce632013-12-13 14:00:51 +0100254 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200255 ret = MBEDTLS_ERR_NET_SOCKET_FAILED;
Manuel Pégourié-Gonnard389ce632013-12-13 14:00:51 +0100256 continue;
257 }
258
Manuel Pégourié-Gonnardfd6b4cc2013-12-17 13:59:01 +0100259 n = 1;
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200260 if( setsockopt( ctx->fd, SOL_SOCKET, SO_REUSEADDR,
Paul Bakker874bd642014-04-17 12:43:05 +0200261 (const char *) &n, sizeof( n ) ) != 0 )
262 {
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200263 close( ctx->fd );
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200264 ret = MBEDTLS_ERR_NET_SOCKET_FAILED;
Paul Bakker874bd642014-04-17 12:43:05 +0200265 continue;
266 }
Manuel Pégourié-Gonnardfd6b4cc2013-12-17 13:59:01 +0100267
Manuel Pégourié-Gonnard9de64f52015-07-01 15:51:43 +0200268 if( bind( ctx->fd, cur->ai_addr, MSVC_INT_CAST cur->ai_addrlen ) != 0 )
Manuel Pégourié-Gonnard389ce632013-12-13 14:00:51 +0100269 {
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200270 close( ctx->fd );
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200271 ret = MBEDTLS_ERR_NET_BIND_FAILED;
Manuel Pégourié-Gonnard389ce632013-12-13 14:00:51 +0100272 continue;
273 }
274
Manuel Pégourié-Gonnardf5a13122014-03-23 17:38:16 +0100275 /* Listen only makes sense for TCP */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200276 if( proto == MBEDTLS_NET_PROTO_TCP )
Manuel Pégourié-Gonnard389ce632013-12-13 14:00:51 +0100277 {
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200278 if( listen( ctx->fd, MBEDTLS_NET_LISTEN_BACKLOG ) != 0 )
Manuel Pégourié-Gonnardf5a13122014-03-23 17:38:16 +0100279 {
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200280 close( ctx->fd );
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200281 ret = MBEDTLS_ERR_NET_LISTEN_FAILED;
Manuel Pégourié-Gonnardf5a13122014-03-23 17:38:16 +0100282 continue;
283 }
Manuel Pégourié-Gonnard389ce632013-12-13 14:00:51 +0100284 }
285
Brian J Murray2adecba2016-11-06 04:45:15 -0800286 /* Bind was successful */
Manuel Pégourié-Gonnard389ce632013-12-13 14:00:51 +0100287 ret = 0;
288 break;
289 }
290
291 freeaddrinfo( addr_list );
292
293 return( ret );
294
Paul Bakker5121ce52009-01-03 21:22:43 +0000295}
296
Paul Bakkerfa6a6202013-10-28 18:48:30 +0100297#if ( defined(_WIN32) || defined(_WIN32_WCE) ) && !defined(EFIX64) && \
298 !defined(EFI32)
Paul Bakker80025412014-01-23 20:59:49 +0100299/*
300 * Check if the requested operation would be blocking on a non-blocking socket
301 * and thus 'failed' with a negative return value.
302 */
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200303static int net_would_block( const mbedtls_net_context *ctx )
Paul Bakker80025412014-01-23 20:59:49 +0100304{
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200305 ((void) ctx);
Paul Bakker5121ce52009-01-03 21:22:43 +0000306 return( WSAGetLastError() == WSAEWOULDBLOCK );
Paul Bakker80025412014-01-23 20:59:49 +0100307}
Paul Bakker5121ce52009-01-03 21:22:43 +0000308#else
Paul Bakker80025412014-01-23 20:59:49 +0100309/*
310 * Check if the requested operation would be blocking on a non-blocking socket
311 * and thus 'failed' with a negative return value.
312 *
313 * Note: on a blocking socket this function always returns 0!
314 */
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200315static int net_would_block( const mbedtls_net_context *ctx )
Paul Bakker80025412014-01-23 20:59:49 +0100316{
Hanno Beckera6ed9c52017-05-04 13:39:22 +0100317 int err = errno;
Hanno Beckerf4e5b7e2018-04-03 16:28:09 +0100318
Paul Bakker80025412014-01-23 20:59:49 +0100319 /*
Jaeden Amero88a6e892019-05-29 09:38:29 +0100320 * Never return 'WOULD BLOCK' on a blocking socket
Paul Bakker80025412014-01-23 20:59:49 +0100321 */
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200322 if( ( fcntl( ctx->fd, F_GETFL ) & O_NONBLOCK ) != O_NONBLOCK )
Hanno Beckera6ed9c52017-05-04 13:39:22 +0100323 {
324 errno = err;
Paul Bakker80025412014-01-23 20:59:49 +0100325 return( 0 );
Hanno Beckera6ed9c52017-05-04 13:39:22 +0100326 }
Paul Bakker80025412014-01-23 20:59:49 +0100327
Hanno Beckera6ed9c52017-05-04 13:39:22 +0100328 switch( errno = err )
Paul Bakker5121ce52009-01-03 21:22:43 +0000329 {
330#if defined EAGAIN
331 case EAGAIN:
332#endif
333#if defined EWOULDBLOCK && EWOULDBLOCK != EAGAIN
334 case EWOULDBLOCK:
335#endif
336 return( 1 );
337 }
338 return( 0 );
Paul Bakker5121ce52009-01-03 21:22:43 +0000339}
Paul Bakkerdb20c102014-06-17 14:34:44 +0200340#endif /* ( _WIN32 || _WIN32_WCE ) && !EFIX64 && !EFI32 */
Paul Bakker5121ce52009-01-03 21:22:43 +0000341
342/*
343 * Accept a connection from a remote client
344 */
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200345int mbedtls_net_accept( mbedtls_net_context *bind_ctx,
346 mbedtls_net_context *client_ctx,
Manuel Pégourié-Gonnard0b104b02015-05-14 21:52:40 +0200347 void *client_ip, size_t buf_size, size_t *ip_len )
Paul Bakker5121ce52009-01-03 21:22:43 +0000348{
Manuel Pégourié-Gonnardf5a13122014-03-23 17:38:16 +0100349 int ret;
350 int type;
351
Manuel Pégourié-Gonnard6e315a92013-12-13 16:21:25 +0100352 struct sockaddr_storage client_addr;
Paul Bakker5121ce52009-01-03 21:22:43 +0000353
gufe4419735b62020-08-13 11:03:54 +0200354#if defined(__socklen_t_defined) || defined(_SOCKLEN_T) || \
355 defined(_SOCKLEN_T_DECLARED) || defined(__DEFINED_socklen_t) || \
356 ( defined(__NetBSD__) && defined(socklen_t) )
Paul Bakker5121ce52009-01-03 21:22:43 +0000357 socklen_t n = (socklen_t) sizeof( client_addr );
Manuel Pégourié-Gonnardf5a13122014-03-23 17:38:16 +0100358 socklen_t type_len = (socklen_t) sizeof( type );
Paul Bakker5121ce52009-01-03 21:22:43 +0000359#else
360 int n = (int) sizeof( client_addr );
Manuel Pégourié-Gonnardf5a13122014-03-23 17:38:16 +0100361 int type_len = (int) sizeof( type );
Paul Bakker5121ce52009-01-03 21:22:43 +0000362#endif
363
Manuel Pégourié-Gonnardf5a13122014-03-23 17:38:16 +0100364 /* Is this a TCP or UDP socket? */
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200365 if( getsockopt( bind_ctx->fd, SOL_SOCKET, SO_TYPE,
366 (void *) &type, &type_len ) != 0 ||
Manuel Pégourié-Gonnardf5a13122014-03-23 17:38:16 +0100367 ( type != SOCK_STREAM && type != SOCK_DGRAM ) )
368 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200369 return( MBEDTLS_ERR_NET_ACCEPT_FAILED );
Manuel Pégourié-Gonnardf5a13122014-03-23 17:38:16 +0100370 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000371
Manuel Pégourié-Gonnardf5a13122014-03-23 17:38:16 +0100372 if( type == SOCK_STREAM )
373 {
374 /* TCP: actual accept() */
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200375 ret = client_ctx->fd = (int) accept( bind_ctx->fd,
Simon Butcher532c94d2016-11-10 17:30:18 +0000376 (struct sockaddr *) &client_addr, &n );
Manuel Pégourié-Gonnardf5a13122014-03-23 17:38:16 +0100377 }
378 else
379 {
380 /* UDP: wait for a message, but keep it in the queue */
381 char buf[1] = { 0 };
382
Embedthis Softwarea25cab82015-09-09 08:49:48 -0700383 ret = (int) recvfrom( bind_ctx->fd, buf, sizeof( buf ), MSG_PEEK,
Manuel Pégourié-Gonnardf5a13122014-03-23 17:38:16 +0100384 (struct sockaddr *) &client_addr, &n );
Manuel Pégourié-Gonnard16a17a42015-06-30 11:20:22 +0200385
386#if defined(_WIN32)
387 if( ret == SOCKET_ERROR &&
388 WSAGetLastError() == WSAEMSGSIZE )
389 {
390 /* We know buf is too small, thanks, just peeking here */
391 ret = 0;
392 }
393#endif
Manuel Pégourié-Gonnardf5a13122014-03-23 17:38:16 +0100394 }
395
396 if( ret < 0 )
Paul Bakker5121ce52009-01-03 21:22:43 +0000397 {
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200398 if( net_would_block( bind_ctx ) != 0 )
Manuel Pégourié-Gonnard88369942015-05-06 16:19:31 +0100399 return( MBEDTLS_ERR_SSL_WANT_READ );
Paul Bakker5121ce52009-01-03 21:22:43 +0000400
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200401 return( MBEDTLS_ERR_NET_ACCEPT_FAILED );
Paul Bakker5121ce52009-01-03 21:22:43 +0000402 }
403
Manuel Pégourié-Gonnardabc729e2015-07-01 01:28:24 +0200404 /* UDP: hijack the listening socket to communicate with the client,
405 * then bind a new socket to accept new connections */
Manuel Pégourié-Gonnardf5a13122014-03-23 17:38:16 +0100406 if( type != SOCK_STREAM )
407 {
Manuel Pégourié-Gonnardabc729e2015-07-01 01:28:24 +0200408 struct sockaddr_storage local_addr;
409 int one = 1;
410
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200411 if( connect( bind_ctx->fd, (struct sockaddr *) &client_addr, n ) != 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200412 return( MBEDTLS_ERR_NET_ACCEPT_FAILED );
Manuel Pégourié-Gonnardf5a13122014-03-23 17:38:16 +0100413
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200414 client_ctx->fd = bind_ctx->fd;
Manuel Pégourié-Gonnardabc729e2015-07-01 01:28:24 +0200415 bind_ctx->fd = -1; /* In case we exit early */
416
417 n = sizeof( struct sockaddr_storage );
418 if( getsockname( client_ctx->fd,
419 (struct sockaddr *) &local_addr, &n ) != 0 ||
420 ( bind_ctx->fd = (int) socket( local_addr.ss_family,
421 SOCK_DGRAM, IPPROTO_UDP ) ) < 0 ||
422 setsockopt( bind_ctx->fd, SOL_SOCKET, SO_REUSEADDR,
423 (const char *) &one, sizeof( one ) ) != 0 )
424 {
425 return( MBEDTLS_ERR_NET_SOCKET_FAILED );
426 }
427
428 if( bind( bind_ctx->fd, (struct sockaddr *) &local_addr, n ) != 0 )
429 {
430 return( MBEDTLS_ERR_NET_BIND_FAILED );
431 }
Manuel Pégourié-Gonnardf5a13122014-03-23 17:38:16 +0100432 }
433
Paul Bakker5121ce52009-01-03 21:22:43 +0000434 if( client_ip != NULL )
Manuel Pégourié-Gonnard6e315a92013-12-13 16:21:25 +0100435 {
Manuel Pégourié-Gonnard6e315a92013-12-13 16:21:25 +0100436 if( client_addr.ss_family == AF_INET )
437 {
438 struct sockaddr_in *addr4 = (struct sockaddr_in *) &client_addr;
Manuel Pégourié-Gonnard0b104b02015-05-14 21:52:40 +0200439 *ip_len = sizeof( addr4->sin_addr.s_addr );
440
441 if( buf_size < *ip_len )
442 return( MBEDTLS_ERR_NET_BUFFER_TOO_SMALL );
443
444 memcpy( client_ip, &addr4->sin_addr.s_addr, *ip_len );
Manuel Pégourié-Gonnard6e315a92013-12-13 16:21:25 +0100445 }
446 else
447 {
448 struct sockaddr_in6 *addr6 = (struct sockaddr_in6 *) &client_addr;
Manuel Pégourié-Gonnard0b104b02015-05-14 21:52:40 +0200449 *ip_len = sizeof( addr6->sin6_addr.s6_addr );
450
451 if( buf_size < *ip_len )
452 return( MBEDTLS_ERR_NET_BUFFER_TOO_SMALL );
453
454 memcpy( client_ip, &addr6->sin6_addr.s6_addr, *ip_len);
Manuel Pégourié-Gonnard6e315a92013-12-13 16:21:25 +0100455 }
Manuel Pégourié-Gonnard6e315a92013-12-13 16:21:25 +0100456 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000457
458 return( 0 );
459}
460
461/*
462 * Set the socket blocking or non-blocking
463 */
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200464int mbedtls_net_set_block( mbedtls_net_context *ctx )
Paul Bakker5121ce52009-01-03 21:22:43 +0000465{
Paul Bakkerfa6a6202013-10-28 18:48:30 +0100466#if ( defined(_WIN32) || defined(_WIN32_WCE) ) && !defined(EFIX64) && \
467 !defined(EFI32)
Paul Bakkerf4f69682011-04-24 16:08:12 +0000468 u_long n = 0;
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200469 return( ioctlsocket( ctx->fd, FIONBIO, &n ) );
Paul Bakker5121ce52009-01-03 21:22:43 +0000470#else
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200471 return( fcntl( ctx->fd, F_SETFL, fcntl( ctx->fd, F_GETFL ) & ~O_NONBLOCK ) );
Paul Bakker5121ce52009-01-03 21:22:43 +0000472#endif
473}
474
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200475int mbedtls_net_set_nonblock( mbedtls_net_context *ctx )
Paul Bakker5121ce52009-01-03 21:22:43 +0000476{
Paul Bakkerfa6a6202013-10-28 18:48:30 +0100477#if ( defined(_WIN32) || defined(_WIN32_WCE) ) && !defined(EFIX64) && \
478 !defined(EFI32)
Paul Bakkerf4f69682011-04-24 16:08:12 +0000479 u_long n = 1;
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200480 return( ioctlsocket( ctx->fd, FIONBIO, &n ) );
Paul Bakker5121ce52009-01-03 21:22:43 +0000481#else
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200482 return( fcntl( ctx->fd, F_SETFL, fcntl( ctx->fd, F_GETFL ) | O_NONBLOCK ) );
Paul Bakker5121ce52009-01-03 21:22:43 +0000483#endif
484}
485
486/*
Hanno Beckere09ca3d2017-05-22 15:06:06 +0100487 * Check if data is available on the socket
488 */
489
490int mbedtls_net_poll( mbedtls_net_context *ctx, uint32_t rw, uint32_t timeout )
491{
492 int ret;
493 struct timeval tv;
494
495 fd_set read_fds;
496 fd_set write_fds;
497
498 int fd = ctx->fd;
499
500 if( fd < 0 )
501 return( MBEDTLS_ERR_NET_INVALID_CONTEXT );
502
Gilles Peskinef6042402021-02-24 19:49:44 +0100503 /* A limitation of select() is that it only works with file descriptors
Gilles Peskine121d7c72021-03-01 11:39:21 +0100504 * that are strictly less than FD_SETSIZE. This is a limitation of the
505 * fd_set type. Error out early, because attempting to call FD_SET on a
506 * large file descriptor is a buffer overflow on typical platforms. */
Gilles Peskinef6042402021-02-24 19:49:44 +0100507 if( fd >= FD_SETSIZE )
508 return( MBEDTLS_ERR_NET_POLL_FAILED );
509
Gilles Peskineec4733b2018-04-05 14:55:47 +0200510#if defined(__has_feature)
511#if __has_feature(memory_sanitizer)
512 /* Ensure that memory sanitizers consider read_fds and write_fds as
513 * initialized even on platforms such as Glibc/x86_64 where FD_ZERO
514 * is implemented in assembly. */
Hanno Beckerf4e5b7e2018-04-03 16:28:09 +0100515 memset( &read_fds, 0, sizeof( read_fds ) );
516 memset( &write_fds, 0, sizeof( write_fds ) );
Gilles Peskineec4733b2018-04-05 14:55:47 +0200517#endif
518#endif
Hanno Beckerf4e5b7e2018-04-03 16:28:09 +0100519
Hanno Beckere09ca3d2017-05-22 15:06:06 +0100520 FD_ZERO( &read_fds );
521 if( rw & MBEDTLS_NET_POLL_READ )
522 {
523 rw &= ~MBEDTLS_NET_POLL_READ;
524 FD_SET( fd, &read_fds );
525 }
526
527 FD_ZERO( &write_fds );
528 if( rw & MBEDTLS_NET_POLL_WRITE )
529 {
530 rw &= ~MBEDTLS_NET_POLL_WRITE;
531 FD_SET( fd, &write_fds );
532 }
533
534 if( rw != 0 )
535 return( MBEDTLS_ERR_NET_BAD_INPUT_DATA );
536
537 tv.tv_sec = timeout / 1000;
538 tv.tv_usec = ( timeout % 1000 ) * 1000;
539
Hanno Becker9ac64032018-03-15 12:19:31 +0000540 do
541 {
542 ret = select( fd + 1, &read_fds, &write_fds, NULL,
543 timeout == (uint32_t) -1 ? NULL : &tv );
Hanno Becker80e06d72018-03-15 14:41:55 +0000544 }
Gilles Peskineea7dbbe2018-03-15 23:25:21 +0100545 while( IS_EINTR( ret ) );
Hanno Beckere09ca3d2017-05-22 15:06:06 +0100546
547 if( ret < 0 )
548 return( MBEDTLS_ERR_NET_POLL_FAILED );
549
550 ret = 0;
551 if( FD_ISSET( fd, &read_fds ) )
552 ret |= MBEDTLS_NET_POLL_READ;
553 if( FD_ISSET( fd, &write_fds ) )
554 ret |= MBEDTLS_NET_POLL_WRITE;
555
556 return( ret );
557}
558
559/*
Paul Bakker5121ce52009-01-03 21:22:43 +0000560 * Portable usleep helper
561 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200562void mbedtls_net_usleep( unsigned long usec )
Paul Bakker5121ce52009-01-03 21:22:43 +0000563{
Manuel Pégourié-Gonnardacecb652015-07-01 11:29:31 +0200564#if defined(_WIN32)
565 Sleep( ( usec + 999 ) / 1000 );
566#else
Paul Bakker5121ce52009-01-03 21:22:43 +0000567 struct timeval tv;
Manuel Pégourié-Gonnarde4232462014-11-21 09:52:23 +0100568 tv.tv_sec = usec / 1000000;
Manuel Pégourié-Gonnardacecb652015-07-01 11:29:31 +0200569#if defined(__unix__) || defined(__unix) || \
570 ( defined(__APPLE__) && defined(__MACH__) )
Manuel Pégourié-Gonnarde4232462014-11-21 09:52:23 +0100571 tv.tv_usec = (suseconds_t) usec % 1000000;
Sander Niemeijeref5087d2014-08-16 12:45:52 +0200572#else
Manuel Pégourié-Gonnarde4232462014-11-21 09:52:23 +0100573 tv.tv_usec = usec % 1000000;
Sander Niemeijeref5087d2014-08-16 12:45:52 +0200574#endif
Paul Bakker5121ce52009-01-03 21:22:43 +0000575 select( 0, NULL, NULL, NULL, &tv );
Manuel Pégourié-Gonnardacecb652015-07-01 11:29:31 +0200576#endif
Paul Bakker5121ce52009-01-03 21:22:43 +0000577}
578
579/*
580 * Read at most 'len' characters
581 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200582int mbedtls_net_recv( void *ctx, unsigned char *buf, size_t len )
Paul Bakkerfa6a6202013-10-28 18:48:30 +0100583{
Manuel Pégourié-Gonnard9bd0afd2015-07-01 19:03:27 +0200584 int ret;
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200585 int fd = ((mbedtls_net_context *) ctx)->fd;
Manuel Pégourié-Gonnard9bd0afd2015-07-01 19:03:27 +0200586
587 if( fd < 0 )
588 return( MBEDTLS_ERR_NET_INVALID_CONTEXT );
589
590 ret = (int) read( fd, buf, len );
Paul Bakker5121ce52009-01-03 21:22:43 +0000591
Paul Bakker5121ce52009-01-03 21:22:43 +0000592 if( ret < 0 )
593 {
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200594 if( net_would_block( ctx ) != 0 )
Manuel Pégourié-Gonnard88369942015-05-06 16:19:31 +0100595 return( MBEDTLS_ERR_SSL_WANT_READ );
Paul Bakker5121ce52009-01-03 21:22:43 +0000596
Paul Bakkerfa6a6202013-10-28 18:48:30 +0100597#if ( defined(_WIN32) || defined(_WIN32_WCE) ) && !defined(EFIX64) && \
598 !defined(EFI32)
Paul Bakker5121ce52009-01-03 21:22:43 +0000599 if( WSAGetLastError() == WSAECONNRESET )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200600 return( MBEDTLS_ERR_NET_CONN_RESET );
Paul Bakker5121ce52009-01-03 21:22:43 +0000601#else
602 if( errno == EPIPE || errno == ECONNRESET )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200603 return( MBEDTLS_ERR_NET_CONN_RESET );
Paul Bakker5121ce52009-01-03 21:22:43 +0000604
605 if( errno == EINTR )
Manuel Pégourié-Gonnard88369942015-05-06 16:19:31 +0100606 return( MBEDTLS_ERR_SSL_WANT_READ );
Paul Bakker5121ce52009-01-03 21:22:43 +0000607#endif
608
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200609 return( MBEDTLS_ERR_NET_RECV_FAILED );
Paul Bakker5121ce52009-01-03 21:22:43 +0000610 }
611
612 return( ret );
613}
614
Manuel Pégourié-Gonnard9d9b0032014-09-18 11:22:45 +0200615/*
Manuel Pégourié-Gonnardc8d8e972014-10-01 15:01:39 +0200616 * Read at most 'len' characters, blocking for at most 'timeout' ms
Manuel Pégourié-Gonnard9d9b0032014-09-18 11:22:45 +0200617 */
Hanno Beckere09ca3d2017-05-22 15:06:06 +0100618int mbedtls_net_recv_timeout( void *ctx, unsigned char *buf,
619 size_t len, uint32_t timeout )
Manuel Pégourié-Gonnard9d9b0032014-09-18 11:22:45 +0200620{
621 int ret;
622 struct timeval tv;
623 fd_set read_fds;
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200624 int fd = ((mbedtls_net_context *) ctx)->fd;
Manuel Pégourié-Gonnard9d9b0032014-09-18 11:22:45 +0200625
Manuel Pégourié-Gonnard9bd0afd2015-07-01 19:03:27 +0200626 if( fd < 0 )
627 return( MBEDTLS_ERR_NET_INVALID_CONTEXT );
628
Gilles Peskinef6042402021-02-24 19:49:44 +0100629 /* A limitation of select() is that it only works with file descriptors
Gilles Peskine121d7c72021-03-01 11:39:21 +0100630 * that are strictly less than FD_SETSIZE. This is a limitation of the
631 * fd_set type. Error out early, because attempting to call FD_SET on a
632 * large file descriptor is a buffer overflow on typical platforms. */
Gilles Peskinef6042402021-02-24 19:49:44 +0100633 if( fd >= FD_SETSIZE )
634 return( MBEDTLS_ERR_NET_POLL_FAILED );
635
Manuel Pégourié-Gonnard9d9b0032014-09-18 11:22:45 +0200636 FD_ZERO( &read_fds );
637 FD_SET( fd, &read_fds );
638
Manuel Pégourié-Gonnardc8d8e972014-10-01 15:01:39 +0200639 tv.tv_sec = timeout / 1000;
640 tv.tv_usec = ( timeout % 1000 ) * 1000;
Manuel Pégourié-Gonnard9d9b0032014-09-18 11:22:45 +0200641
Manuel Pégourié-Gonnard07617332015-06-24 23:00:03 +0200642 ret = select( fd + 1, &read_fds, NULL, NULL, timeout == 0 ? NULL : &tv );
Manuel Pégourié-Gonnard9d9b0032014-09-18 11:22:45 +0200643
644 /* Zero fds ready means we timed out */
645 if( ret == 0 )
Manuel Pégourié-Gonnard88369942015-05-06 16:19:31 +0100646 return( MBEDTLS_ERR_SSL_TIMEOUT );
Manuel Pégourié-Gonnard9d9b0032014-09-18 11:22:45 +0200647
648 if( ret < 0 )
649 {
650#if ( defined(_WIN32) || defined(_WIN32_WCE) ) && !defined(EFIX64) && \
651 !defined(EFI32)
652 if( WSAGetLastError() == WSAEINTR )
Manuel Pégourié-Gonnard88369942015-05-06 16:19:31 +0100653 return( MBEDTLS_ERR_SSL_WANT_READ );
Manuel Pégourié-Gonnard9d9b0032014-09-18 11:22:45 +0200654#else
655 if( errno == EINTR )
Manuel Pégourié-Gonnard88369942015-05-06 16:19:31 +0100656 return( MBEDTLS_ERR_SSL_WANT_READ );
Manuel Pégourié-Gonnard9d9b0032014-09-18 11:22:45 +0200657#endif
658
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200659 return( MBEDTLS_ERR_NET_RECV_FAILED );
Manuel Pégourié-Gonnard9d9b0032014-09-18 11:22:45 +0200660 }
661
662 /* This call will not block */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200663 return( mbedtls_net_recv( ctx, buf, len ) );
Manuel Pégourié-Gonnard9d9b0032014-09-18 11:22:45 +0200664}
Manuel Pégourié-Gonnard9d9b0032014-09-18 11:22:45 +0200665
Paul Bakker5121ce52009-01-03 21:22:43 +0000666/*
667 * Write at most 'len' characters
668 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200669int mbedtls_net_send( void *ctx, const unsigned char *buf, size_t len )
Paul Bakker5121ce52009-01-03 21:22:43 +0000670{
Manuel Pégourié-Gonnard9bd0afd2015-07-01 19:03:27 +0200671 int ret;
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200672 int fd = ((mbedtls_net_context *) ctx)->fd;
Manuel Pégourié-Gonnard9bd0afd2015-07-01 19:03:27 +0200673
674 if( fd < 0 )
675 return( MBEDTLS_ERR_NET_INVALID_CONTEXT );
676
677 ret = (int) write( fd, buf, len );
Paul Bakker5121ce52009-01-03 21:22:43 +0000678
679 if( ret < 0 )
680 {
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200681 if( net_would_block( ctx ) != 0 )
Manuel Pégourié-Gonnard88369942015-05-06 16:19:31 +0100682 return( MBEDTLS_ERR_SSL_WANT_WRITE );
Paul Bakker5121ce52009-01-03 21:22:43 +0000683
Paul Bakkerfa6a6202013-10-28 18:48:30 +0100684#if ( defined(_WIN32) || defined(_WIN32_WCE) ) && !defined(EFIX64) && \
685 !defined(EFI32)
Paul Bakker5121ce52009-01-03 21:22:43 +0000686 if( WSAGetLastError() == WSAECONNRESET )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200687 return( MBEDTLS_ERR_NET_CONN_RESET );
Paul Bakker5121ce52009-01-03 21:22:43 +0000688#else
689 if( errno == EPIPE || errno == ECONNRESET )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200690 return( MBEDTLS_ERR_NET_CONN_RESET );
Paul Bakker5121ce52009-01-03 21:22:43 +0000691
692 if( errno == EINTR )
Manuel Pégourié-Gonnard88369942015-05-06 16:19:31 +0100693 return( MBEDTLS_ERR_SSL_WANT_WRITE );
Paul Bakker5121ce52009-01-03 21:22:43 +0000694#endif
695
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200696 return( MBEDTLS_ERR_NET_SEND_FAILED );
Paul Bakker5121ce52009-01-03 21:22:43 +0000697 }
698
699 return( ret );
700}
701
702/*
703 * Gracefully close the connection
704 */
Manuel Pégourié-Gonnard3d7d00a2015-06-30 15:55:03 +0200705void mbedtls_net_free( mbedtls_net_context *ctx )
Paul Bakker5121ce52009-01-03 21:22:43 +0000706{
Manuel Pégourié-Gonnard91895852015-06-30 13:34:45 +0200707 if( ctx->fd == -1 )
708 return;
709
710 shutdown( ctx->fd, 2 );
711 close( ctx->fd );
712
713 ctx->fd = -1;
Paul Bakker5121ce52009-01-03 21:22:43 +0000714}
715
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200716#endif /* MBEDTLS_NET_C */