|  | /* | 
|  | * Wininet - networking layer. Uses unix sockets or OpenSSL. | 
|  | * | 
|  | * Copyright 2002 TransGaming Technologies Inc. | 
|  | * | 
|  | * David Hammerton | 
|  | * | 
|  | * This library is free software; you can redistribute it and/or | 
|  | * modify it under the terms of the GNU Lesser General Public | 
|  | * License as published by the Free Software Foundation; either | 
|  | * version 2.1 of the License, or (at your option) any later version. | 
|  | * | 
|  | * This library is distributed in the hope that it will be useful, | 
|  | * but WITHOUT ANY WARRANTY; without even the implied warranty of | 
|  | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU | 
|  | * Lesser General Public License for more details. | 
|  | * | 
|  | * You should have received a copy of the GNU Lesser General Public | 
|  | * License along with this library; if not, write to the Free Software | 
|  | * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA | 
|  | */ | 
|  |  | 
|  | #include "config.h" | 
|  | #include "wine/port.h" | 
|  |  | 
|  | #ifdef HAVE_SYS_TIME_H | 
|  | # include <sys/time.h> | 
|  | #endif | 
|  | #include <sys/types.h> | 
|  | #ifdef HAVE_SYS_SOCKET_H | 
|  | # include <sys/socket.h> | 
|  | #endif | 
|  | #ifdef HAVE_UNISTD_H | 
|  | # include <unistd.h> | 
|  | #endif | 
|  | #include <stdarg.h> | 
|  | #include <stdlib.h> | 
|  | #include <string.h> | 
|  | #include <stdio.h> | 
|  | #include <errno.h> | 
|  |  | 
|  | #include "wine/library.h" | 
|  | #include "windef.h" | 
|  | #include "winbase.h" | 
|  | #include "wininet.h" | 
|  | #include "winerror.h" | 
|  |  | 
|  | /* To avoid conflicts with the Unix socket headers. we only need it for | 
|  | * the error codes anyway. */ | 
|  | #define USE_WS_PREFIX | 
|  | #include "winsock2.h" | 
|  |  | 
|  | #include "wine/debug.h" | 
|  | #include "internet.h" | 
|  | #include "wincrypt.h" | 
|  |  | 
|  | #define RESPONSE_TIMEOUT        30            /* FROM internet.c */ | 
|  |  | 
|  |  | 
|  | WINE_DEFAULT_DEBUG_CHANNEL(wininet); | 
|  |  | 
|  | /* FIXME!!!!!! | 
|  | *    This should use winsock - To use winsock the functions will have to change a bit | 
|  | *        as they are designed for unix sockets. | 
|  | *    SSL stuff should use crypt32.dll | 
|  | */ | 
|  |  | 
|  | #if defined HAVE_OPENSSL_SSL_H && defined HAVE_OPENSSL_ERR_H | 
|  |  | 
|  | #include <openssl/err.h> | 
|  |  | 
|  | #ifndef SONAME_LIBSSL | 
|  | #define SONAME_LIBSSL "libssl.so" | 
|  | #endif | 
|  | #ifndef SONAME_LIBCRYPTO | 
|  | #define SONAME_LIBCRYPTO "libcrypto.so" | 
|  | #endif | 
|  |  | 
|  | static void *OpenSSL_ssl_handle; | 
|  | static void *OpenSSL_crypto_handle; | 
|  |  | 
|  | static SSL_METHOD *meth; | 
|  | static SSL_CTX *ctx; | 
|  |  | 
|  | #define MAKE_FUNCPTR(f) static typeof(f) * p##f | 
|  |  | 
|  | /* OpenSSL functions that we use */ | 
|  | MAKE_FUNCPTR(SSL_library_init); | 
|  | MAKE_FUNCPTR(SSL_load_error_strings); | 
|  | MAKE_FUNCPTR(SSLv23_method); | 
|  | MAKE_FUNCPTR(SSL_CTX_new); | 
|  | MAKE_FUNCPTR(SSL_new); | 
|  | MAKE_FUNCPTR(SSL_free); | 
|  | MAKE_FUNCPTR(SSL_set_fd); | 
|  | MAKE_FUNCPTR(SSL_connect); | 
|  | MAKE_FUNCPTR(SSL_shutdown); | 
|  | MAKE_FUNCPTR(SSL_write); | 
|  | MAKE_FUNCPTR(SSL_read); | 
|  | MAKE_FUNCPTR(SSL_get_verify_result); | 
|  | MAKE_FUNCPTR(SSL_get_peer_certificate); | 
|  | MAKE_FUNCPTR(SSL_CTX_get_timeout); | 
|  | MAKE_FUNCPTR(SSL_CTX_set_timeout); | 
|  | MAKE_FUNCPTR(SSL_CTX_set_default_verify_paths); | 
|  | MAKE_FUNCPTR(i2d_X509); | 
|  |  | 
|  | /* OpenSSL's libcrypto functions that we use */ | 
|  | MAKE_FUNCPTR(BIO_new_fp); | 
|  | MAKE_FUNCPTR(ERR_get_error); | 
|  | MAKE_FUNCPTR(ERR_error_string); | 
|  | #undef MAKE_FUNCPTR | 
|  |  | 
|  | #endif | 
|  |  | 
|  | BOOL NETCON_init(WININET_NETCONNECTION *connection, BOOL useSSL) | 
|  | { | 
|  | connection->useSSL = FALSE; | 
|  | connection->socketFD = -1; | 
|  | if (useSSL) | 
|  | { | 
|  | #if defined HAVE_OPENSSL_SSL_H && defined HAVE_OPENSSL_ERR_H | 
|  | TRACE("using SSL connection\n"); | 
|  | if (OpenSSL_ssl_handle) /* already initialized everything */ | 
|  | return TRUE; | 
|  | OpenSSL_ssl_handle = wine_dlopen(SONAME_LIBSSL, RTLD_NOW, NULL, 0); | 
|  | if (!OpenSSL_ssl_handle) | 
|  | { | 
|  | ERR("trying to use a SSL connection, but couldn't load %s. Expect trouble.\n", | 
|  | SONAME_LIBSSL); | 
|  | INTERNET_SetLastError(ERROR_INTERNET_SECURITY_CHANNEL_ERROR); | 
|  | return FALSE; | 
|  | } | 
|  | OpenSSL_crypto_handle = wine_dlopen(SONAME_LIBCRYPTO, RTLD_NOW, NULL, 0); | 
|  | if (!OpenSSL_crypto_handle) | 
|  | { | 
|  | ERR("trying to use a SSL connection, but couldn't load %s. Expect trouble.\n", | 
|  | SONAME_LIBCRYPTO); | 
|  | INTERNET_SetLastError(ERROR_INTERNET_SECURITY_CHANNEL_ERROR); | 
|  | return FALSE; | 
|  | } | 
|  |  | 
|  | /* mmm nice ugly macroness */ | 
|  | #define DYNSSL(x) \ | 
|  | p##x = wine_dlsym(OpenSSL_ssl_handle, #x, NULL, 0); \ | 
|  | if (!p##x) \ | 
|  | { \ | 
|  | ERR("failed to load symbol %s\n", #x); \ | 
|  | INTERNET_SetLastError(ERROR_INTERNET_SECURITY_CHANNEL_ERROR); \ | 
|  | return FALSE; \ | 
|  | } | 
|  |  | 
|  | DYNSSL(SSL_library_init); | 
|  | DYNSSL(SSL_load_error_strings); | 
|  | DYNSSL(SSLv23_method); | 
|  | DYNSSL(SSL_CTX_new); | 
|  | DYNSSL(SSL_new); | 
|  | DYNSSL(SSL_free); | 
|  | DYNSSL(SSL_set_fd); | 
|  | DYNSSL(SSL_connect); | 
|  | DYNSSL(SSL_shutdown); | 
|  | DYNSSL(SSL_write); | 
|  | DYNSSL(SSL_read); | 
|  | DYNSSL(SSL_get_verify_result); | 
|  | DYNSSL(SSL_get_peer_certificate); | 
|  | DYNSSL(SSL_CTX_get_timeout); | 
|  | DYNSSL(SSL_CTX_set_timeout); | 
|  | DYNSSL(SSL_CTX_set_default_verify_paths); | 
|  | DYNSSL(i2d_X509); | 
|  | #undef DYNSSL | 
|  |  | 
|  | #define DYNCRYPTO(x) \ | 
|  | p##x = wine_dlsym(OpenSSL_crypto_handle, #x, NULL, 0); \ | 
|  | if (!p##x) \ | 
|  | { \ | 
|  | ERR("failed to load symbol %s\n", #x); \ | 
|  | INTERNET_SetLastError(ERROR_INTERNET_SECURITY_CHANNEL_ERROR); \ | 
|  | return FALSE; \ | 
|  | } | 
|  | DYNCRYPTO(BIO_new_fp); | 
|  | DYNCRYPTO(ERR_get_error); | 
|  | DYNCRYPTO(ERR_error_string); | 
|  | #undef DYNCRYPTO | 
|  |  | 
|  | pSSL_library_init(); | 
|  | pSSL_load_error_strings(); | 
|  | pBIO_new_fp(stderr, BIO_NOCLOSE); /* FIXME: should use winedebug stuff */ | 
|  |  | 
|  | meth = pSSLv23_method(); | 
|  | connection->peek_msg = NULL; | 
|  | connection->peek_msg_mem = NULL; | 
|  | #else | 
|  | FIXME("can't use SSL, not compiled in.\n"); | 
|  | INTERNET_SetLastError(ERROR_INTERNET_SECURITY_CHANNEL_ERROR); | 
|  | return FALSE; | 
|  | #endif | 
|  | } | 
|  | return TRUE; | 
|  | } | 
|  |  | 
|  | BOOL NETCON_connected(WININET_NETCONNECTION *connection) | 
|  | { | 
|  | if (connection->socketFD == -1) | 
|  | return FALSE; | 
|  | else | 
|  | return TRUE; | 
|  | } | 
|  |  | 
|  | /* translate a unix error code into a winsock one */ | 
|  | static int sock_get_error( int err ) | 
|  | { | 
|  | switch (err) | 
|  | { | 
|  | case EINTR:             return WSAEINTR; | 
|  | case EBADF:             return WSAEBADF; | 
|  | case EPERM: | 
|  | case EACCES:            return WSAEACCES; | 
|  | case EFAULT:            return WSAEFAULT; | 
|  | case EINVAL:            return WSAEINVAL; | 
|  | case EMFILE:            return WSAEMFILE; | 
|  | case EWOULDBLOCK:       return WSAEWOULDBLOCK; | 
|  | case EINPROGRESS:       return WSAEINPROGRESS; | 
|  | case EALREADY:          return WSAEALREADY; | 
|  | case ENOTSOCK:          return WSAENOTSOCK; | 
|  | case EDESTADDRREQ:      return WSAEDESTADDRREQ; | 
|  | case EMSGSIZE:          return WSAEMSGSIZE; | 
|  | case EPROTOTYPE:        return WSAEPROTOTYPE; | 
|  | case ENOPROTOOPT:       return WSAENOPROTOOPT; | 
|  | case EPROTONOSUPPORT:   return WSAEPROTONOSUPPORT; | 
|  | case ESOCKTNOSUPPORT:   return WSAESOCKTNOSUPPORT; | 
|  | case EOPNOTSUPP:        return WSAEOPNOTSUPP; | 
|  | case EPFNOSUPPORT:      return WSAEPFNOSUPPORT; | 
|  | case EAFNOSUPPORT:      return WSAEAFNOSUPPORT; | 
|  | case EADDRINUSE:        return WSAEADDRINUSE; | 
|  | case EADDRNOTAVAIL:     return WSAEADDRNOTAVAIL; | 
|  | case ENETDOWN:          return WSAENETDOWN; | 
|  | case ENETUNREACH:       return WSAENETUNREACH; | 
|  | case ENETRESET:         return WSAENETRESET; | 
|  | case ECONNABORTED:      return WSAECONNABORTED; | 
|  | case EPIPE: | 
|  | case ECONNRESET:        return WSAECONNRESET; | 
|  | case ENOBUFS:           return WSAENOBUFS; | 
|  | case EISCONN:           return WSAEISCONN; | 
|  | case ENOTCONN:          return WSAENOTCONN; | 
|  | case ESHUTDOWN:         return WSAESHUTDOWN; | 
|  | case ETOOMANYREFS:      return WSAETOOMANYREFS; | 
|  | case ETIMEDOUT:         return WSAETIMEDOUT; | 
|  | case ECONNREFUSED:      return WSAECONNREFUSED; | 
|  | case ELOOP:             return WSAELOOP; | 
|  | case ENAMETOOLONG:      return WSAENAMETOOLONG; | 
|  | case EHOSTDOWN:         return WSAEHOSTDOWN; | 
|  | case EHOSTUNREACH:      return WSAEHOSTUNREACH; | 
|  | case ENOTEMPTY:         return WSAENOTEMPTY; | 
|  | #ifdef EPROCLIM | 
|  | case EPROCLIM:          return WSAEPROCLIM; | 
|  | #endif | 
|  | #ifdef EUSERS | 
|  | case EUSERS:            return WSAEUSERS; | 
|  | #endif | 
|  | #ifdef EDQUOT | 
|  | case EDQUOT:            return WSAEDQUOT; | 
|  | #endif | 
|  | #ifdef ESTALE | 
|  | case ESTALE:            return WSAESTALE; | 
|  | #endif | 
|  | #ifdef EREMOTE | 
|  | case EREMOTE:           return WSAEREMOTE; | 
|  | #endif | 
|  | default: errno=err; perror("sock_set_error"); return WSAEFAULT; | 
|  | } | 
|  | } | 
|  |  | 
|  | /****************************************************************************** | 
|  | * NETCON_create | 
|  | * Basically calls 'socket()' | 
|  | */ | 
|  | BOOL NETCON_create(WININET_NETCONNECTION *connection, int domain, | 
|  | int type, int protocol) | 
|  | { | 
|  | #if defined HAVE_OPENSSL_SSL_H && defined HAVE_OPENSSL_ERR_H | 
|  | if (connection->useSSL) | 
|  | return FALSE; | 
|  | #endif | 
|  |  | 
|  | connection->socketFD = socket(domain, type, protocol); | 
|  | if (connection->socketFD == -1) | 
|  | { | 
|  | INTERNET_SetLastError(sock_get_error(errno)); | 
|  | return FALSE; | 
|  | } | 
|  | return TRUE; | 
|  | } | 
|  |  | 
|  | /****************************************************************************** | 
|  | * NETCON_close | 
|  | * Basically calls 'close()' unless we should use SSL | 
|  | */ | 
|  | BOOL NETCON_close(WININET_NETCONNECTION *connection) | 
|  | { | 
|  | int result; | 
|  |  | 
|  | if (!NETCON_connected(connection)) return FALSE; | 
|  |  | 
|  | #if defined HAVE_OPENSSL_SSL_H && defined HAVE_OPENSSL_ERR_H | 
|  | if (connection->useSSL) | 
|  | { | 
|  | HeapFree(GetProcessHeap(),0,connection->peek_msg_mem); | 
|  | connection->peek_msg = NULL; | 
|  | connection->peek_msg_mem = NULL; | 
|  | connection->peek_len = 0; | 
|  |  | 
|  | pSSL_shutdown(connection->ssl_s); | 
|  | pSSL_free(connection->ssl_s); | 
|  | connection->ssl_s = NULL; | 
|  |  | 
|  | connection->useSSL = FALSE; | 
|  | } | 
|  | #endif | 
|  |  | 
|  | result = closesocket(connection->socketFD); | 
|  | connection->socketFD = -1; | 
|  |  | 
|  | if (result == -1) | 
|  | { | 
|  | INTERNET_SetLastError(sock_get_error(errno)); | 
|  | return FALSE; | 
|  | } | 
|  | return TRUE; | 
|  | } | 
|  | #if defined HAVE_OPENSSL_SSL_H && defined HAVE_OPENSSL_ERR_H | 
|  | static BOOL check_hostname(X509 *cert, char *hostname) | 
|  | { | 
|  | /* FIXME: implement */ | 
|  | return TRUE; | 
|  | } | 
|  | #endif | 
|  | /****************************************************************************** | 
|  | * NETCON_secure_connect | 
|  | * Initiates a secure connection over an existing plaintext connection. | 
|  | */ | 
|  | BOOL NETCON_secure_connect(WININET_NETCONNECTION *connection, LPCWSTR hostname) | 
|  | { | 
|  | #if defined HAVE_OPENSSL_SSL_H && defined HAVE_OPENSSL_ERR_H | 
|  | long verify_res; | 
|  | X509 *cert; | 
|  | int len; | 
|  | char *hostname_unix; | 
|  |  | 
|  | /* can't connect if we are already connected */ | 
|  | if (connection->useSSL) | 
|  | { | 
|  | ERR("already connected\n"); | 
|  | return FALSE; | 
|  | } | 
|  |  | 
|  | ctx = pSSL_CTX_new(meth); | 
|  | if (!pSSL_CTX_set_default_verify_paths(ctx)) | 
|  | { | 
|  | ERR("SSL_CTX_set_default_verify_paths failed: %s\n", | 
|  | pERR_error_string(pERR_get_error(), 0)); | 
|  | INTERNET_SetLastError(ERROR_OUTOFMEMORY); | 
|  | return FALSE; | 
|  | } | 
|  | connection->ssl_s = pSSL_new(ctx); | 
|  | if (!connection->ssl_s) | 
|  | { | 
|  | ERR("SSL_new failed: %s\n", | 
|  | pERR_error_string(pERR_get_error(), 0)); | 
|  | INTERNET_SetLastError(ERROR_OUTOFMEMORY); | 
|  | goto fail; | 
|  | } | 
|  |  | 
|  | if (!pSSL_set_fd(connection->ssl_s, connection->socketFD)) | 
|  | { | 
|  | ERR("SSL_set_fd failed: %s\n", | 
|  | pERR_error_string(pERR_get_error(), 0)); | 
|  | INTERNET_SetLastError(ERROR_INTERNET_SECURITY_CHANNEL_ERROR); | 
|  | goto fail; | 
|  | } | 
|  |  | 
|  | if (pSSL_connect(connection->ssl_s) <= 0) | 
|  | { | 
|  | ERR("SSL_connect failed: %s\n", | 
|  | pERR_error_string(pERR_get_error(), 0)); | 
|  | INTERNET_SetLastError(ERROR_INTERNET_SECURITY_CHANNEL_ERROR); | 
|  | goto fail; | 
|  | } | 
|  | cert = pSSL_get_peer_certificate(connection->ssl_s); | 
|  | if (!cert) | 
|  | { | 
|  | ERR("no certificate for server %s\n", debugstr_w(hostname)); | 
|  | /* FIXME: is this the best error? */ | 
|  | INTERNET_SetLastError(ERROR_INTERNET_INVALID_CA); | 
|  | goto fail; | 
|  | } | 
|  | verify_res = pSSL_get_verify_result(connection->ssl_s); | 
|  | if (verify_res != X509_V_OK) | 
|  | { | 
|  | ERR("couldn't verify the security of the connection, %ld\n", verify_res); | 
|  | /* FIXME: we should set an error and return, but we only warn at | 
|  | * the moment */ | 
|  | } | 
|  |  | 
|  | len = WideCharToMultiByte(CP_UNIXCP, 0, hostname, -1, NULL, 0, NULL, NULL); | 
|  | hostname_unix = HeapAlloc(GetProcessHeap(), 0, len); | 
|  | if (!hostname_unix) | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_OUTOFMEMORY); | 
|  | goto fail; | 
|  | } | 
|  | WideCharToMultiByte(CP_UNIXCP, 0, hostname, -1, hostname_unix, len, NULL, NULL); | 
|  |  | 
|  | if (!check_hostname(cert, hostname_unix)) | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, hostname_unix); | 
|  | INTERNET_SetLastError(ERROR_INTERNET_SEC_CERT_CN_INVALID); | 
|  | goto fail; | 
|  | } | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, hostname_unix); | 
|  | connection->useSSL = TRUE; | 
|  | return TRUE; | 
|  |  | 
|  | fail: | 
|  | if (connection->ssl_s) | 
|  | { | 
|  | pSSL_shutdown(connection->ssl_s); | 
|  | pSSL_free(connection->ssl_s); | 
|  | connection->ssl_s = NULL; | 
|  | } | 
|  | #endif | 
|  | return FALSE; | 
|  | } | 
|  |  | 
|  | /****************************************************************************** | 
|  | * NETCON_connect | 
|  | * Connects to the specified address. | 
|  | */ | 
|  | BOOL NETCON_connect(WININET_NETCONNECTION *connection, const struct sockaddr *serv_addr, | 
|  | unsigned int addrlen) | 
|  | { | 
|  | int result; | 
|  |  | 
|  | if (!NETCON_connected(connection)) return FALSE; | 
|  |  | 
|  | result = connect(connection->socketFD, serv_addr, addrlen); | 
|  | if (result == -1) | 
|  | { | 
|  | WARN("Unable to connect to host (%s)\n", strerror(errno)); | 
|  | INTERNET_SetLastError(sock_get_error(errno)); | 
|  |  | 
|  | closesocket(connection->socketFD); | 
|  | connection->socketFD = -1; | 
|  | return FALSE; | 
|  | } | 
|  |  | 
|  | return TRUE; | 
|  | } | 
|  |  | 
|  | /****************************************************************************** | 
|  | * NETCON_send | 
|  | * Basically calls 'send()' unless we should use SSL | 
|  | * number of chars send is put in *sent | 
|  | */ | 
|  | BOOL NETCON_send(WININET_NETCONNECTION *connection, const void *msg, size_t len, int flags, | 
|  | int *sent /* out */) | 
|  | { | 
|  | if (!NETCON_connected(connection)) return FALSE; | 
|  | if (!connection->useSSL) | 
|  | { | 
|  | *sent = send(connection->socketFD, msg, len, flags); | 
|  | if (*sent == -1) | 
|  | { | 
|  | INTERNET_SetLastError(sock_get_error(errno)); | 
|  | return FALSE; | 
|  | } | 
|  | return TRUE; | 
|  | } | 
|  | else | 
|  | { | 
|  | #if defined HAVE_OPENSSL_SSL_H && defined HAVE_OPENSSL_ERR_H | 
|  | if (flags) | 
|  | FIXME("SSL_write doesn't support any flags (%08x)\n", flags); | 
|  | *sent = pSSL_write(connection->ssl_s, msg, len); | 
|  | if (*sent < 1 && len) | 
|  | return FALSE; | 
|  | return TRUE; | 
|  | #else | 
|  | return FALSE; | 
|  | #endif | 
|  | } | 
|  | } | 
|  |  | 
|  | /****************************************************************************** | 
|  | * NETCON_recv | 
|  | * Basically calls 'recv()' unless we should use SSL | 
|  | * number of chars received is put in *recvd | 
|  | */ | 
|  | BOOL NETCON_recv(WININET_NETCONNECTION *connection, void *buf, size_t len, int flags, | 
|  | int *recvd /* out */) | 
|  | { | 
|  | *recvd = 0; | 
|  | if (!NETCON_connected(connection)) return FALSE; | 
|  | if (!len) | 
|  | return TRUE; | 
|  | if (!connection->useSSL) | 
|  | { | 
|  | *recvd = recv(connection->socketFD, buf, len, flags); | 
|  | if (*recvd == -1) | 
|  | { | 
|  | INTERNET_SetLastError(sock_get_error(errno)); | 
|  | return FALSE; | 
|  | } | 
|  | return TRUE; | 
|  | } | 
|  | else | 
|  | { | 
|  | #if defined HAVE_OPENSSL_SSL_H && defined HAVE_OPENSSL_ERR_H | 
|  | if (flags & ~(MSG_PEEK|MSG_WAITALL)) | 
|  | FIXME("SSL_read does not support the following flag: %08x\n", flags); | 
|  |  | 
|  | /* this ugly hack is all for MSG_PEEK. eww gross */ | 
|  | if (flags & MSG_PEEK && !connection->peek_msg) | 
|  | { | 
|  | connection->peek_msg = connection->peek_msg_mem = HeapAlloc(GetProcessHeap(), 0, (sizeof(char) * len) + 1); | 
|  | } | 
|  | else if (flags & MSG_PEEK && connection->peek_msg) | 
|  | { | 
|  | if (len < connection->peek_len) | 
|  | FIXME("buffer isn't big enough. Do the expect us to wrap?\n"); | 
|  | *recvd = min(len, connection->peek_len); | 
|  | memcpy(buf, connection->peek_msg, *recvd); | 
|  | return TRUE; | 
|  | } | 
|  | else if (connection->peek_msg) | 
|  | { | 
|  | *recvd = min(len, connection->peek_len); | 
|  | memcpy(buf, connection->peek_msg, *recvd); | 
|  | connection->peek_len -= *recvd; | 
|  | connection->peek_msg += *recvd; | 
|  | if (connection->peek_len == 0) | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, connection->peek_msg_mem); | 
|  | connection->peek_msg_mem = NULL; | 
|  | connection->peek_msg = NULL; | 
|  | } | 
|  | /* check if we got enough data from the peek buffer */ | 
|  | if (!(flags & MSG_WAITALL) || (*recvd == len)) | 
|  | return TRUE; | 
|  | /* otherwise, fall through */ | 
|  | } | 
|  | *recvd += pSSL_read(connection->ssl_s, (char*)buf + *recvd, len - *recvd); | 
|  | if (flags & MSG_PEEK) /* must copy stuff into buffer */ | 
|  | { | 
|  | connection->peek_len = *recvd; | 
|  | if (!*recvd) | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, connection->peek_msg_mem); | 
|  | connection->peek_msg_mem = NULL; | 
|  | connection->peek_msg = NULL; | 
|  | } | 
|  | else | 
|  | memcpy(connection->peek_msg, buf, *recvd); | 
|  | } | 
|  | if (*recvd < 1 && len) | 
|  | return FALSE; | 
|  | return TRUE; | 
|  | #else | 
|  | return FALSE; | 
|  | #endif | 
|  | } | 
|  | } | 
|  |  | 
|  | /****************************************************************************** | 
|  | * NETCON_getNextLine | 
|  | */ | 
|  | BOOL NETCON_getNextLine(WININET_NETCONNECTION *connection, LPSTR lpszBuffer, LPDWORD dwBuffer) | 
|  | { | 
|  |  | 
|  | TRACE("\n"); | 
|  |  | 
|  | if (!NETCON_connected(connection)) return FALSE; | 
|  |  | 
|  | if (!connection->useSSL) | 
|  | { | 
|  | struct timeval tv; | 
|  | fd_set infd; | 
|  | BOOL bSuccess = FALSE; | 
|  | DWORD nRecv = 0; | 
|  |  | 
|  | FD_ZERO(&infd); | 
|  | FD_SET(connection->socketFD, &infd); | 
|  | tv.tv_sec=RESPONSE_TIMEOUT; | 
|  | tv.tv_usec=0; | 
|  |  | 
|  | while (nRecv < *dwBuffer) | 
|  | { | 
|  | if (select(connection->socketFD+1,&infd,NULL,NULL,&tv) > 0) | 
|  | { | 
|  | if (recv(connection->socketFD, &lpszBuffer[nRecv], 1, 0) <= 0) | 
|  | { | 
|  | INTERNET_SetLastError(sock_get_error(errno)); | 
|  | goto lend; | 
|  | } | 
|  |  | 
|  | if (lpszBuffer[nRecv] == '\n') | 
|  | { | 
|  | bSuccess = TRUE; | 
|  | break; | 
|  | } | 
|  | if (lpszBuffer[nRecv] != '\r') | 
|  | nRecv++; | 
|  | } | 
|  | else | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_INTERNET_TIMEOUT); | 
|  | goto lend; | 
|  | } | 
|  | } | 
|  |  | 
|  | lend:             /* FIXME: don't use labels */ | 
|  | if (bSuccess) | 
|  | { | 
|  | lpszBuffer[nRecv++] = '\0'; | 
|  | *dwBuffer = nRecv; | 
|  | TRACE(":%u %s\n", nRecv, lpszBuffer); | 
|  | return TRUE; | 
|  | } | 
|  | else | 
|  | { | 
|  | return FALSE; | 
|  | } | 
|  | } | 
|  | else | 
|  | { | 
|  | #if defined HAVE_OPENSSL_SSL_H && defined HAVE_OPENSSL_ERR_H | 
|  | long prev_timeout; | 
|  | DWORD nRecv = 0; | 
|  | BOOL success = TRUE; | 
|  |  | 
|  | prev_timeout = pSSL_CTX_get_timeout(ctx); | 
|  | pSSL_CTX_set_timeout(ctx, RESPONSE_TIMEOUT); | 
|  |  | 
|  | while (nRecv < *dwBuffer) | 
|  | { | 
|  | int recv = 1; | 
|  | if (!NETCON_recv(connection, &lpszBuffer[nRecv], 1, 0, &recv)) | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_CONNECTION_ABORTED); | 
|  | success = FALSE; | 
|  | } | 
|  |  | 
|  | if (lpszBuffer[nRecv] == '\n') | 
|  | { | 
|  | success = TRUE; | 
|  | break; | 
|  | } | 
|  | if (lpszBuffer[nRecv] != '\r') | 
|  | nRecv++; | 
|  | } | 
|  |  | 
|  | pSSL_CTX_set_timeout(ctx, prev_timeout); | 
|  | if (success) | 
|  | { | 
|  | lpszBuffer[nRecv++] = '\0'; | 
|  | *dwBuffer = nRecv; | 
|  | TRACE("_SSL:%u %s\n", nRecv, lpszBuffer); | 
|  | return TRUE; | 
|  | } | 
|  | return FALSE; | 
|  | #else | 
|  | return FALSE; | 
|  | #endif | 
|  | } | 
|  | } | 
|  |  | 
|  |  | 
|  | LPCVOID NETCON_GetCert(WININET_NETCONNECTION *connection) | 
|  | { | 
|  |  | 
|  | #if defined HAVE_OPENSSL_SSL_H && defined HAVE_OPENSSL_ERR_H | 
|  | X509* cert; | 
|  | unsigned char* buffer,*p; | 
|  | INT len; | 
|  | BOOL malloced = FALSE; | 
|  | LPCVOID r = NULL; | 
|  |  | 
|  | if (!connection->useSSL) | 
|  | return NULL; | 
|  |  | 
|  | cert = pSSL_get_peer_certificate(connection->ssl_s); | 
|  | p = NULL; | 
|  | len = pi2d_X509(cert,&p); | 
|  | /* | 
|  | * SSL 0.9.7 and above malloc the buffer if it is null. | 
|  | * however earlier version do not and so we would need to alloc the buffer. | 
|  | * | 
|  | * see the i2d_X509 man page for more details. | 
|  | */ | 
|  | if (!p) | 
|  | { | 
|  | buffer = HeapAlloc(GetProcessHeap(),0,len); | 
|  | p = buffer; | 
|  | len = pi2d_X509(cert,&p); | 
|  | } | 
|  | else | 
|  | { | 
|  | buffer = p; | 
|  | malloced = TRUE; | 
|  | } | 
|  |  | 
|  | r = CertCreateCertificateContext(X509_ASN_ENCODING,buffer,len); | 
|  |  | 
|  | if (malloced) | 
|  | free(buffer); | 
|  | else | 
|  | HeapFree(GetProcessHeap(),0,buffer); | 
|  |  | 
|  | return r; | 
|  | #else | 
|  | return NULL; | 
|  | #endif | 
|  | } | 
|  |  | 
|  | BOOL NETCON_set_timeout(WININET_NETCONNECTION *connection, BOOL send, int value) | 
|  | { | 
|  | int result; | 
|  | struct timeval tv; | 
|  |  | 
|  | /* FIXME: we should probably store the timeout in the connection to set | 
|  | * when we do connect */ | 
|  | if (!NETCON_connected(connection)) | 
|  | return TRUE; | 
|  |  | 
|  | /* value is in milliseconds, convert to struct timeval */ | 
|  | tv.tv_sec = value / 1000; | 
|  | tv.tv_usec = (value % 1000) * 1000; | 
|  |  | 
|  | result = setsockopt(connection->socketFD, SOL_SOCKET, | 
|  | send ? SO_SNDTIMEO : SO_RCVTIMEO, &tv, | 
|  | sizeof(tv)); | 
|  |  | 
|  | if (result == -1) | 
|  | { | 
|  | WARN("setsockopt failed (%s)\n", strerror(errno)); | 
|  | INTERNET_SetLastError(sock_get_error(errno)); | 
|  | return FALSE; | 
|  | } | 
|  |  | 
|  | return TRUE; | 
|  | } |