os400sys.c 33 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549
  1. /***************************************************************************
  2. * _ _ ____ _
  3. * Project ___| | | | _ \| |
  4. * / __| | | | |_) | |
  5. * | (__| |_| | _ <| |___
  6. * \___|\___/|_| \_\_____|
  7. *
  8. * Copyright (C) 1998 - 2013, Daniel Stenberg, <daniel@haxx.se>, et al.
  9. *
  10. * This software is licensed as described in the file COPYING, which
  11. * you should have received as part of this distribution. The terms
  12. * are also available at http://curl.haxx.se/docs/copyright.html.
  13. *
  14. * You may opt to use, copy, modify, merge, publish, distribute and/or sell
  15. * copies of the Software, and permit persons to whom the Software is
  16. * furnished to do so, under the terms of the COPYING file.
  17. *
  18. * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
  19. * KIND, either express or implied.
  20. *
  21. *
  22. ***************************************************************************/
  23. /* OS/400 additional support. */
  24. #include "curlbuild.h"
  25. #include "config-os400.h" /* Not curl_setup.h: we only need some defines. */
  26. #include <sys/types.h>
  27. #include <sys/socket.h>
  28. #include <sys/un.h>
  29. #include <stdlib.h>
  30. #include <stddef.h>
  31. #include <string.h>
  32. #include <pthread.h>
  33. #include <netdb.h>
  34. #include <qadrt.h>
  35. #include <errno.h>
  36. #ifdef HAVE_ZLIB_H
  37. #include <zlib.h>
  38. #endif
  39. #ifdef USE_QSOSSL
  40. #include <qsossl.h>
  41. #endif
  42. #ifdef USE_GSKIT
  43. #include <gskssl.h>
  44. #include <qsoasync.h>
  45. #endif
  46. #ifdef HAVE_GSSAPI
  47. #include <gssapi.h>
  48. #endif
  49. #ifndef CURL_DISABLE_LDAP
  50. #include <ldap.h>
  51. #endif
  52. #include <netinet/in.h>
  53. #include <arpa/inet.h>
  54. #include "os400sys.h"
  55. /**
  56. *** QADRT OS/400 ASCII runtime defines only the most used procedures, but
  57. *** but a lot of them are not supported. This module implements
  58. *** ASCII wrappers for those that are used by libcurl, but not
  59. *** defined by QADRT.
  60. **/
  61. #pragma convert(0) /* Restore EBCDIC. */
  62. #define MIN_BYTE_GAIN 1024 /* Minimum gain when shortening a buffer. */
  63. typedef struct {
  64. unsigned long size; /* Buffer size. */
  65. char * buf; /* Buffer address. */
  66. } buffer_t;
  67. static char * buffer_undef(localkey_t key, long size);
  68. static char * buffer_threaded(localkey_t key, long size);
  69. static char * buffer_unthreaded(localkey_t key, long size);
  70. static pthread_mutex_t mutex = PTHREAD_MUTEX_INITIALIZER;
  71. static pthread_key_t thdkey;
  72. static buffer_t * locbufs;
  73. char * (* Curl_thread_buffer)(localkey_t key, long size) = buffer_undef;
  74. static void
  75. thdbufdestroy(void * private)
  76. {
  77. localkey_t i;
  78. buffer_t * p;
  79. if(private) {
  80. p = (buffer_t *) private;
  81. for(i = (localkey_t) 0; i < LK_LAST; i++) {
  82. if(p->buf)
  83. free(p->buf);
  84. p++;
  85. }
  86. free(private);
  87. }
  88. }
  89. static void
  90. terminate(void)
  91. {
  92. if(Curl_thread_buffer == buffer_threaded) {
  93. locbufs = pthread_getspecific(thdkey);
  94. pthread_setspecific(thdkey, (void *) NULL);
  95. pthread_key_delete(thdkey);
  96. }
  97. if(Curl_thread_buffer != buffer_undef) {
  98. thdbufdestroy((void *) locbufs);
  99. locbufs = (buffer_t *) NULL;
  100. }
  101. Curl_thread_buffer = buffer_undef;
  102. }
  103. static char *
  104. get_buffer(buffer_t * buf, long size)
  105. {
  106. char * cp;
  107. /* If `size' >= 0, make sure buffer at `buf' is at least `size'-byte long.
  108. Return the buffer address. */
  109. if(size < 0)
  110. return buf->buf;
  111. if(!buf->buf) {
  112. if((buf->buf = malloc(size)))
  113. buf->size = size;
  114. return buf->buf;
  115. }
  116. if((unsigned long) size <= buf->size) {
  117. /* Shorten the buffer only if it frees a significant byte count. This
  118. avoids some realloc() overhead. */
  119. if(buf->size - size < MIN_BYTE_GAIN)
  120. return buf->buf;
  121. }
  122. /* Resize the buffer. */
  123. if((cp = realloc(buf->buf, size))) {
  124. buf->buf = cp;
  125. buf->size = size;
  126. }
  127. else if(size <= buf->size)
  128. cp = buf->buf;
  129. return cp;
  130. }
  131. static char *
  132. buffer_unthreaded(localkey_t key, long size)
  133. {
  134. return get_buffer(locbufs + key, size);
  135. }
  136. static char *
  137. buffer_threaded(localkey_t key, long size)
  138. {
  139. buffer_t * bufs;
  140. /* Get the buffer for the given local key in the current thread, and
  141. make sure it is at least `size'-byte long. Set `size' to < 0 to get
  142. its address only. */
  143. bufs = (buffer_t *) pthread_getspecific(thdkey);
  144. if(!bufs) {
  145. if(size < 0)
  146. return (char *) NULL; /* No buffer yet. */
  147. /* Allocate buffer descriptors for the current thread. */
  148. if(!(bufs = calloc((size_t) LK_LAST, sizeof *bufs)))
  149. return (char *) NULL;
  150. if(pthread_setspecific(thdkey, (void *) bufs)) {
  151. free(bufs);
  152. return (char *) NULL;
  153. }
  154. }
  155. return get_buffer(bufs + key, size);
  156. }
  157. static char *
  158. buffer_undef(localkey_t key, long size)
  159. {
  160. /* Define the buffer system, get the buffer for the given local key in
  161. the current thread, and make sure it is at least `size'-byte long.
  162. Set `size' to < 0 to get its address only. */
  163. pthread_mutex_lock(&mutex);
  164. /* Determine if we can use pthread-specific data. */
  165. if(Curl_thread_buffer == buffer_undef) { /* If unchanged during lock. */
  166. if(!pthread_key_create(&thdkey, thdbufdestroy))
  167. Curl_thread_buffer = buffer_threaded;
  168. else if(!(locbufs = calloc((size_t) LK_LAST, sizeof *locbufs))) {
  169. pthread_mutex_unlock(&mutex);
  170. return (char *) NULL;
  171. }
  172. else
  173. Curl_thread_buffer = buffer_unthreaded;
  174. atexit(terminate);
  175. }
  176. pthread_mutex_unlock(&mutex);
  177. return Curl_thread_buffer(key, size);
  178. }
  179. static char *
  180. set_thread_string(localkey_t key, const char * s)
  181. {
  182. int i;
  183. char * cp;
  184. if(!s)
  185. return (char *) NULL;
  186. i = strlen(s) + 1;
  187. cp = Curl_thread_buffer(key, MAX_CONV_EXPANSION * i + 1);
  188. if(cp) {
  189. i = QadrtConvertE2A(cp, s, MAX_CONV_EXPANSION * i, i);
  190. cp[i] = '\0';
  191. }
  192. return cp;
  193. }
  194. int
  195. Curl_getnameinfo_a(const struct sockaddr * sa, curl_socklen_t salen,
  196. char * nodename, curl_socklen_t nodenamelen,
  197. char * servname, curl_socklen_t servnamelen,
  198. int flags)
  199. {
  200. char * enodename;
  201. char * eservname;
  202. int status;
  203. int i;
  204. enodename = (char *) NULL;
  205. eservname = (char *) NULL;
  206. if(nodename && nodenamelen)
  207. if(!(enodename = malloc(nodenamelen)))
  208. return EAI_MEMORY;
  209. if(servname && servnamelen)
  210. if(!(eservname = malloc(servnamelen))) {
  211. if(enodename)
  212. free(enodename);
  213. return EAI_MEMORY;
  214. }
  215. status = getnameinfo(sa, salen, enodename, nodenamelen,
  216. eservname, servnamelen, flags);
  217. if(!status) {
  218. if(enodename) {
  219. i = QadrtConvertE2A(nodename, enodename,
  220. nodenamelen - 1, strlen(enodename));
  221. nodename[i] = '\0';
  222. }
  223. if(eservname) {
  224. i = QadrtConvertE2A(servname, eservname,
  225. servnamelen - 1, strlen(eservname));
  226. servname[i] = '\0';
  227. }
  228. }
  229. if(enodename)
  230. free(enodename);
  231. if(eservname)
  232. free(eservname);
  233. return status;
  234. }
  235. int
  236. Curl_getaddrinfo_a(const char * nodename, const char * servname,
  237. const struct addrinfo * hints,
  238. struct addrinfo * * res)
  239. {
  240. char * enodename;
  241. char * eservname;
  242. int status;
  243. int i;
  244. enodename = (char *) NULL;
  245. eservname = (char *) NULL;
  246. if(nodename) {
  247. i = strlen(nodename);
  248. if(!(enodename = malloc(i + 1)))
  249. return EAI_MEMORY;
  250. i = QadrtConvertA2E(enodename, nodename, i, i);
  251. enodename[i] = '\0';
  252. }
  253. if(servname) {
  254. i = strlen(servname);
  255. if(!(eservname = malloc(i + 1))) {
  256. if(enodename)
  257. free(enodename);
  258. return EAI_MEMORY;
  259. }
  260. QadrtConvertA2E(eservname, servname, i, i);
  261. eservname[i] = '\0';
  262. }
  263. status = getaddrinfo(enodename, eservname, hints, res);
  264. if(enodename)
  265. free(enodename);
  266. if(eservname)
  267. free(eservname);
  268. return status;
  269. }
  270. #ifdef USE_QSOSSL
  271. /* ASCII wrappers for the SSL procedures. */
  272. int
  273. Curl_SSL_Init_Application_a(SSLInitApp * init_app)
  274. {
  275. int rc;
  276. unsigned int i;
  277. SSLInitApp ia;
  278. if(!init_app || !init_app->applicationID || !init_app->applicationIDLen)
  279. return SSL_Init_Application(init_app);
  280. memcpy((char *) &ia, (char *) init_app, sizeof ia);
  281. i = ia.applicationIDLen;
  282. if(!(ia.applicationID = malloc(i + 1))) {
  283. errno = ENOMEM;
  284. return SSL_ERROR_IO;
  285. }
  286. QadrtConvertA2E(ia.applicationID, init_app->applicationID, i, i);
  287. ia.applicationID[i] = '\0';
  288. rc = SSL_Init_Application(&ia);
  289. free(ia.applicationID);
  290. init_app->localCertificateLen = ia.localCertificateLen;
  291. init_app->sessionType = ia.sessionType;
  292. return rc;
  293. }
  294. int
  295. Curl_SSL_Init_a(SSLInit * init)
  296. {
  297. int rc;
  298. unsigned int i;
  299. SSLInit ia;
  300. if(!init || (!init->keyringFileName && !init->keyringPassword))
  301. return SSL_Init(init);
  302. memcpy((char *) &ia, (char *) init, sizeof ia);
  303. if(ia.keyringFileName) {
  304. i = strlen(ia.keyringFileName);
  305. if(!(ia.keyringFileName = malloc(i + 1))) {
  306. errno = ENOMEM;
  307. return SSL_ERROR_IO;
  308. }
  309. QadrtConvertA2E(ia.keyringFileName, init->keyringFileName, i, i);
  310. ia.keyringFileName[i] = '\0';
  311. }
  312. if(ia.keyringPassword) {
  313. i = strlen(ia.keyringPassword);
  314. if(!(ia.keyringPassword = malloc(i + 1))) {
  315. if(ia.keyringFileName)
  316. free(ia.keyringFileName);
  317. errno = ENOMEM;
  318. return SSL_ERROR_IO;
  319. }
  320. QadrtConvertA2E(ia.keyringPassword, init->keyringPassword, i, i);
  321. ia.keyringPassword[i] = '\0';
  322. }
  323. rc = SSL_Init(&ia);
  324. if(ia.keyringFileName)
  325. free(ia.keyringFileName);
  326. if(ia.keyringPassword)
  327. free(ia.keyringPassword);
  328. return rc;
  329. }
  330. char *
  331. Curl_SSL_Strerror_a(int sslreturnvalue, SSLErrorMsg * serrmsgp)
  332. {
  333. return set_thread_string(LK_SSL_ERROR,
  334. SSL_Strerror(sslreturnvalue, serrmsgp));
  335. }
  336. #endif /* USE_QSOSSL */
  337. #ifdef USE_GSKIT
  338. /* ASCII wrappers for the GSKit procedures. */
  339. /*
  340. * EBCDIC --> ASCII string mapping table.
  341. * Some strings returned by GSKit are dynamically allocated and automatically
  342. * released when closing the handle.
  343. * To provide the same functionality, we use a "private" handle that
  344. * holds the GSKit handle and a list of string mappings. This will allow
  345. * avoid conversion of already converted strings and releasing them upon
  346. * close time.
  347. */
  348. struct gskstrlist {
  349. struct gskstrlist * next;
  350. const char * ebcdicstr;
  351. const char * asciistr;
  352. };
  353. struct Curl_gsk_descriptor {
  354. gsk_handle h;
  355. struct gskstrlist * strlist;
  356. };
  357. int
  358. Curl_gsk_environment_open(gsk_handle * my_env_handle)
  359. {
  360. struct Curl_gsk_descriptor * p;
  361. gsk_handle h;
  362. int rc;
  363. if(!my_env_handle)
  364. return GSK_OS400_ERROR_INVALID_POINTER;
  365. if(!(p = (struct Curl_gsk_descriptor *) malloc(sizeof *p)))
  366. return GSK_INSUFFICIENT_STORAGE;
  367. p->strlist = (struct gskstrlist *) NULL;
  368. if((rc = gsk_environment_open(&p->h)) != GSK_OK)
  369. free(p);
  370. else
  371. *my_env_handle = (gsk_handle) p;
  372. return rc;
  373. }
  374. int
  375. Curl_gsk_secure_soc_open(gsk_handle my_env_handle,
  376. gsk_handle * my_session_handle)
  377. {
  378. struct Curl_gsk_descriptor * p;
  379. gsk_handle h;
  380. int rc;
  381. if(!my_env_handle)
  382. return GSK_INVALID_HANDLE;
  383. if(!my_session_handle)
  384. return GSK_OS400_ERROR_INVALID_POINTER;
  385. h = ((struct Curl_gsk_descriptor *) my_env_handle)->h;
  386. if(!(p = (struct Curl_gsk_descriptor *) malloc(sizeof *p)))
  387. return GSK_INSUFFICIENT_STORAGE;
  388. p->strlist = (struct gskstrlist *) NULL;
  389. if((rc = gsk_secure_soc_open(h, &p->h)) != GSK_OK)
  390. free(p);
  391. else
  392. *my_session_handle = (gsk_handle) p;
  393. return rc;
  394. }
  395. static void
  396. gsk_free_handle(struct Curl_gsk_descriptor * p)
  397. {
  398. struct gskstrlist * q;
  399. while((q = p->strlist)) {
  400. p->strlist = q;
  401. free((void *) q->asciistr);
  402. free(q);
  403. }
  404. free(p);
  405. }
  406. int
  407. Curl_gsk_environment_close(gsk_handle * my_env_handle)
  408. {
  409. struct Curl_gsk_descriptor * p;
  410. int rc;
  411. if(!my_env_handle)
  412. return GSK_OS400_ERROR_INVALID_POINTER;
  413. if(!*my_env_handle)
  414. return GSK_INVALID_HANDLE;
  415. p = (struct Curl_gsk_descriptor *) *my_env_handle;
  416. if((rc = gsk_environment_close(&p->h)) == GSK_OK) {
  417. gsk_free_handle(p);
  418. *my_env_handle = (gsk_handle) NULL;
  419. }
  420. return rc;
  421. }
  422. int
  423. Curl_gsk_secure_soc_close(gsk_handle * my_session_handle)
  424. {
  425. struct Curl_gsk_descriptor * p;
  426. int rc;
  427. if(!my_session_handle)
  428. return GSK_OS400_ERROR_INVALID_POINTER;
  429. if(!*my_session_handle)
  430. return GSK_INVALID_HANDLE;
  431. p = (struct Curl_gsk_descriptor *) *my_session_handle;
  432. if((rc = gsk_secure_soc_close(&p->h)) == GSK_OK) {
  433. gsk_free_handle(p);
  434. *my_session_handle = (gsk_handle) NULL;
  435. }
  436. return rc;
  437. }
  438. int
  439. Curl_gsk_environment_init(gsk_handle my_env_handle)
  440. {
  441. struct Curl_gsk_descriptor * p;
  442. if(!my_env_handle)
  443. return GSK_INVALID_HANDLE;
  444. p = (struct Curl_gsk_descriptor *) my_env_handle;
  445. return gsk_environment_init(p->h);
  446. }
  447. int
  448. Curl_gsk_secure_soc_init(gsk_handle my_session_handle)
  449. {
  450. struct Curl_gsk_descriptor * p;
  451. if(!my_session_handle)
  452. return GSK_INVALID_HANDLE;
  453. p = (struct Curl_gsk_descriptor *) my_session_handle;
  454. return gsk_secure_soc_init(p->h);
  455. }
  456. int
  457. Curl_gsk_attribute_set_buffer_a(gsk_handle my_gsk_handle, GSK_BUF_ID bufID,
  458. const char * buffer, int bufSize)
  459. {
  460. struct Curl_gsk_descriptor * p;
  461. char * ebcdicbuf;
  462. int rc;
  463. if(!my_gsk_handle)
  464. return GSK_INVALID_HANDLE;
  465. if(!buffer)
  466. return GSK_OS400_ERROR_INVALID_POINTER;
  467. if(bufSize < 0)
  468. return GSK_ATTRIBUTE_INVALID_LENGTH;
  469. p = (struct Curl_gsk_descriptor *) my_gsk_handle;
  470. if(!bufSize)
  471. bufSize = strlen(buffer);
  472. if(!(ebcdicbuf = malloc(bufSize + 1)))
  473. return GSK_INSUFFICIENT_STORAGE;
  474. QadrtConvertA2E(ebcdicbuf, buffer, bufSize, bufSize);
  475. ebcdicbuf[bufSize] = '\0';
  476. rc = gsk_attribute_set_buffer(p->h, bufID, ebcdicbuf, bufSize);
  477. free(ebcdicbuf);
  478. return rc;
  479. }
  480. int
  481. Curl_gsk_attribute_set_enum(gsk_handle my_gsk_handle, GSK_ENUM_ID enumID,
  482. GSK_ENUM_VALUE enumValue)
  483. {
  484. struct Curl_gsk_descriptor * p;
  485. if(!my_gsk_handle)
  486. return GSK_INVALID_HANDLE;
  487. p = (struct Curl_gsk_descriptor *) my_gsk_handle;
  488. return gsk_attribute_set_enum(p->h, enumID, enumValue);
  489. }
  490. int
  491. Curl_gsk_attribute_set_numeric_value(gsk_handle my_gsk_handle,
  492. GSK_NUM_ID numID, int numValue)
  493. {
  494. struct Curl_gsk_descriptor * p;
  495. if(!my_gsk_handle)
  496. return GSK_INVALID_HANDLE;
  497. p = (struct Curl_gsk_descriptor *) my_gsk_handle;
  498. return gsk_attribute_set_numeric_value(p->h, numID, numValue);
  499. }
  500. int
  501. Curl_gsk_attribute_set_callback(gsk_handle my_gsk_handle,
  502. GSK_CALLBACK_ID callBackID,
  503. void * callBackAreaPtr)
  504. {
  505. struct Curl_gsk_descriptor * p;
  506. if(!my_gsk_handle)
  507. return GSK_INVALID_HANDLE;
  508. p = (struct Curl_gsk_descriptor *) my_gsk_handle;
  509. return gsk_attribute_set_callback(p->h, callBackID, callBackAreaPtr);
  510. }
  511. static int
  512. cachestring(struct Curl_gsk_descriptor * p,
  513. const char * ebcdicbuf, int bufsize, const char * * buffer)
  514. {
  515. int rc;
  516. char * asciibuf;
  517. struct gskstrlist * sp;
  518. for(sp = p->strlist; sp; sp = sp->next)
  519. if(sp->ebcdicstr == ebcdicbuf)
  520. break;
  521. if(!sp) {
  522. if(!(sp = (struct gskstrlist *) malloc(sizeof *sp)))
  523. return GSK_INSUFFICIENT_STORAGE;
  524. if(!(asciibuf = malloc(bufsize + 1))) {
  525. free(sp);
  526. return GSK_INSUFFICIENT_STORAGE;
  527. }
  528. QadrtConvertE2A(asciibuf, ebcdicbuf, bufsize, bufsize);
  529. asciibuf[bufsize] = '\0';
  530. sp->ebcdicstr = ebcdicbuf;
  531. sp->asciistr = asciibuf;
  532. sp->next = p->strlist;
  533. p->strlist = sp;
  534. }
  535. *buffer = sp->asciistr;
  536. return GSK_OK;
  537. }
  538. int
  539. Curl_gsk_attribute_get_buffer_a(gsk_handle my_gsk_handle, GSK_BUF_ID bufID,
  540. const char * * buffer, int * bufSize)
  541. {
  542. struct Curl_gsk_descriptor * p;
  543. int rc;
  544. const char * mybuf;
  545. int mylen;
  546. if(!my_gsk_handle)
  547. return GSK_INVALID_HANDLE;
  548. if(!buffer || !bufSize)
  549. return GSK_OS400_ERROR_INVALID_POINTER;
  550. p = (struct Curl_gsk_descriptor *) my_gsk_handle;
  551. if((rc = gsk_attribute_get_buffer(p->h, bufID, &mybuf, &mylen)) != GSK_OK)
  552. return rc;
  553. if((rc = cachestring(p, mybuf, mylen, buffer)) == GSK_OK)
  554. *bufSize = mylen;
  555. return rc;
  556. }
  557. int
  558. Curl_gsk_attribute_get_enum(gsk_handle my_gsk_handle, GSK_ENUM_ID enumID,
  559. GSK_ENUM_VALUE * enumValue)
  560. {
  561. struct Curl_gsk_descriptor * p;
  562. if(!my_gsk_handle)
  563. return GSK_INVALID_HANDLE;
  564. p = (struct Curl_gsk_descriptor *) my_gsk_handle;
  565. return gsk_attribute_get_enum(p->h, enumID, enumValue);
  566. }
  567. int
  568. Curl_gsk_attribute_get_numeric_value(gsk_handle my_gsk_handle,
  569. GSK_NUM_ID numID, int * numValue)
  570. {
  571. struct Curl_gsk_descriptor * p;
  572. if(!my_gsk_handle)
  573. return GSK_INVALID_HANDLE;
  574. p = (struct Curl_gsk_descriptor *) my_gsk_handle;
  575. return gsk_attribute_get_numeric_value(p->h, numID, numValue);
  576. }
  577. int
  578. Curl_gsk_attribute_get_cert_info(gsk_handle my_gsk_handle,
  579. GSK_CERT_ID certID,
  580. const gsk_cert_data_elem * * certDataElem,
  581. int * certDataElementCount)
  582. {
  583. struct Curl_gsk_descriptor * p;
  584. if(!my_gsk_handle)
  585. return GSK_INVALID_HANDLE;
  586. p = (struct Curl_gsk_descriptor *) my_gsk_handle;
  587. /* No need to convert code: text results are already in ASCII. */
  588. return gsk_attribute_get_cert_info(p->h, certID,
  589. certDataElem, certDataElementCount);
  590. }
  591. int
  592. Curl_gsk_secure_soc_misc(gsk_handle my_session_handle, GSK_MISC_ID miscID)
  593. {
  594. struct Curl_gsk_descriptor * p;
  595. if(!my_session_handle)
  596. return GSK_INVALID_HANDLE;
  597. p = (struct Curl_gsk_descriptor *) my_session_handle;
  598. return gsk_secure_soc_misc(p->h, miscID);
  599. }
  600. int
  601. Curl_gsk_secure_soc_read(gsk_handle my_session_handle, char * readBuffer,
  602. int readBufSize, int * amtRead)
  603. {
  604. struct Curl_gsk_descriptor * p;
  605. if(!my_session_handle)
  606. return GSK_INVALID_HANDLE;
  607. p = (struct Curl_gsk_descriptor *) my_session_handle;
  608. return gsk_secure_soc_read(p->h, readBuffer, readBufSize, amtRead);
  609. }
  610. int
  611. Curl_gsk_secure_soc_write(gsk_handle my_session_handle, char * writeBuffer,
  612. int writeBufSize, int * amtWritten)
  613. {
  614. struct Curl_gsk_descriptor * p;
  615. if(!my_session_handle)
  616. return GSK_INVALID_HANDLE;
  617. p = (struct Curl_gsk_descriptor *) my_session_handle;
  618. return gsk_secure_soc_write(p->h, writeBuffer, writeBufSize, amtWritten);
  619. }
  620. const char *
  621. Curl_gsk_strerror_a(int gsk_return_value)
  622. {
  623. return set_thread_string(LK_GSK_ERROR, gsk_strerror(gsk_return_value));
  624. }
  625. int
  626. Curl_gsk_secure_soc_startInit(gsk_handle my_session_handle,
  627. int IOCompletionPort,
  628. Qso_OverlappedIO_t * communicationsArea)
  629. {
  630. struct Curl_gsk_descriptor * p;
  631. if(!my_session_handle)
  632. return GSK_INVALID_HANDLE;
  633. p = (struct Curl_gsk_descriptor *) my_session_handle;
  634. return gsk_secure_soc_startInit(p->h, IOCompletionPort, communicationsArea);
  635. }
  636. #endif /* USE_GSKIT */
  637. #ifdef HAVE_GSSAPI
  638. /* ASCII wrappers for the GSSAPI procedures. */
  639. static int
  640. Curl_gss_convert_in_place(OM_uint32 * minor_status, gss_buffer_t buf)
  641. {
  642. unsigned int i;
  643. char * t;
  644. /* Convert `buf' in place, from EBCDIC to ASCII.
  645. If error, release the buffer and return -1. Else return 0. */
  646. i = buf->length;
  647. if(i) {
  648. if(!(t = malloc(i))) {
  649. gss_release_buffer(minor_status, buf);
  650. if(minor_status)
  651. *minor_status = ENOMEM;
  652. return -1;
  653. }
  654. QadrtConvertE2A(t, buf->value, i, i);
  655. memcpy(buf->value, t, i);
  656. free(t);
  657. }
  658. return 0;
  659. }
  660. OM_uint32
  661. Curl_gss_import_name_a(OM_uint32 * minor_status, gss_buffer_t in_name,
  662. gss_OID in_name_type, gss_name_t * out_name)
  663. {
  664. int rc;
  665. unsigned int i;
  666. gss_buffer_desc in;
  667. if(!in_name || !in_name->value || !in_name->length)
  668. return gss_import_name(minor_status, in_name, in_name_type, out_name);
  669. memcpy((char *) &in, (char *) in_name, sizeof in);
  670. i = in.length;
  671. if(!(in.value = malloc(i + 1))) {
  672. if(minor_status)
  673. *minor_status = ENOMEM;
  674. return GSS_S_FAILURE;
  675. }
  676. QadrtConvertA2E(in.value, in_name->value, i, i);
  677. ((char *) in.value)[i] = '\0';
  678. rc = gss_import_name(minor_status, &in, in_name_type, out_name);
  679. free(in.value);
  680. return rc;
  681. }
  682. OM_uint32
  683. Curl_gss_display_status_a(OM_uint32 * minor_status, OM_uint32 status_value,
  684. int status_type, gss_OID mech_type,
  685. gss_msg_ctx_t * message_context, gss_buffer_t status_string)
  686. {
  687. int rc;
  688. rc = gss_display_status(minor_status, status_value, status_type,
  689. mech_type, message_context, status_string);
  690. if(rc != GSS_S_COMPLETE || !status_string ||
  691. !status_string->length || !status_string->value)
  692. return rc;
  693. /* No way to allocate a buffer here, because it will be released by
  694. gss_release_buffer(). The solution is to overwrite the EBCDIC buffer
  695. with ASCII to return it. */
  696. if(Curl_gss_convert_in_place(minor_status, status_string))
  697. return GSS_S_FAILURE;
  698. return rc;
  699. }
  700. OM_uint32
  701. Curl_gss_init_sec_context_a(OM_uint32 * minor_status,
  702. gss_cred_id_t cred_handle,
  703. gss_ctx_id_t * context_handle,
  704. gss_name_t target_name, gss_OID mech_type,
  705. gss_flags_t req_flags, OM_uint32 time_req,
  706. gss_channel_bindings_t input_chan_bindings,
  707. gss_buffer_t input_token,
  708. gss_OID * actual_mech_type,
  709. gss_buffer_t output_token, gss_flags_t * ret_flags,
  710. OM_uint32 * time_rec)
  711. {
  712. int rc;
  713. unsigned int i;
  714. gss_buffer_desc in;
  715. gss_buffer_t inp;
  716. in.value = NULL;
  717. if((inp = input_token))
  718. if(inp->length && inp->value) {
  719. i = inp->length;
  720. if(!(in.value = malloc(i + 1))) {
  721. if(minor_status)
  722. *minor_status = ENOMEM;
  723. return GSS_S_FAILURE;
  724. }
  725. QadrtConvertA2E(in.value, input_token->value, i, i);
  726. ((char *) in.value)[i] = '\0';
  727. in.length = i;
  728. inp = &in;
  729. }
  730. rc = gss_init_sec_context(minor_status, cred_handle, context_handle,
  731. target_name, mech_type, req_flags, time_req,
  732. input_chan_bindings, inp, actual_mech_type,
  733. output_token, ret_flags, time_rec);
  734. if(in.value)
  735. free(in.value);
  736. if(rc != GSS_S_COMPLETE || !output_token ||
  737. !output_token->length || !output_token->value)
  738. return rc;
  739. /* No way to allocate a buffer here, because it will be released by
  740. gss_release_buffer(). The solution is to overwrite the EBCDIC buffer
  741. with ASCII to return it. */
  742. if(Curl_gss_convert_in_place(minor_status, output_token))
  743. return GSS_S_FAILURE;
  744. return rc;
  745. }
  746. OM_uint32
  747. Curl_gss_delete_sec_context_a(OM_uint32 * minor_status,
  748. gss_ctx_id_t * context_handle,
  749. gss_buffer_t output_token)
  750. {
  751. int rc;
  752. rc = gss_delete_sec_context(minor_status, context_handle, output_token);
  753. if(rc != GSS_S_COMPLETE || !output_token ||
  754. !output_token->length || !output_token->value)
  755. return rc;
  756. /* No way to allocate a buffer here, because it will be released by
  757. gss_release_buffer(). The solution is to overwrite the EBCDIC buffer
  758. with ASCII to return it. */
  759. if(Curl_gss_convert_in_place(minor_status, output_token))
  760. return GSS_S_FAILURE;
  761. return rc;
  762. }
  763. #endif /* HAVE_GSSAPI */
  764. #ifndef CURL_DISABLE_LDAP
  765. /* ASCII wrappers for the LDAP procedures. */
  766. void *
  767. Curl_ldap_init_a(char * host, int port)
  768. {
  769. unsigned int i;
  770. char * ehost;
  771. void * result;
  772. if(!host)
  773. return (void *) ldap_init(host, port);
  774. i = strlen(host);
  775. if(!(ehost = malloc(i + 1)))
  776. return (void *) NULL;
  777. QadrtConvertA2E(ehost, host, i, i);
  778. ehost[i] = '\0';
  779. result = (void *) ldap_init(ehost, port);
  780. free(ehost);
  781. return result;
  782. }
  783. int
  784. Curl_ldap_simple_bind_s_a(void * ld, char * dn, char * passwd)
  785. {
  786. int i;
  787. char * edn;
  788. char * epasswd;
  789. edn = (char *) NULL;
  790. epasswd = (char *) NULL;
  791. if(dn) {
  792. i = strlen(dn);
  793. if(!(edn = malloc(i + 1)))
  794. return LDAP_NO_MEMORY;
  795. QadrtConvertA2E(edn, dn, i, i);
  796. edn[i] = '\0';
  797. }
  798. if(passwd) {
  799. i = strlen(passwd);
  800. if(!(epasswd = malloc(i + 1))) {
  801. if(edn)
  802. free(edn);
  803. return LDAP_NO_MEMORY;
  804. }
  805. QadrtConvertA2E(epasswd, passwd, i, i);
  806. epasswd[i] = '\0';
  807. }
  808. i = ldap_simple_bind_s(ld, edn, epasswd);
  809. if(epasswd)
  810. free(epasswd);
  811. if(edn)
  812. free(edn);
  813. return i;
  814. }
  815. int
  816. Curl_ldap_search_s_a(void * ld, char * base, int scope, char * filter,
  817. char * * attrs, int attrsonly, LDAPMessage * * res)
  818. {
  819. int i;
  820. int j;
  821. char * ebase;
  822. char * efilter;
  823. char * * eattrs;
  824. int status;
  825. ebase = (char *) NULL;
  826. efilter = (char *) NULL;
  827. eattrs = (char * *) NULL;
  828. status = LDAP_SUCCESS;
  829. if(base) {
  830. i = strlen(base);
  831. if(!(ebase = malloc(i + 1)))
  832. status = LDAP_NO_MEMORY;
  833. else {
  834. QadrtConvertA2E(ebase, base, i, i);
  835. ebase[i] = '\0';
  836. }
  837. }
  838. if(filter && status == LDAP_SUCCESS) {
  839. i = strlen(filter);
  840. if(!(efilter = malloc(i + 1)))
  841. status = LDAP_NO_MEMORY;
  842. else {
  843. QadrtConvertA2E(efilter, filter, i, i);
  844. efilter[i] = '\0';
  845. }
  846. }
  847. if(attrs && status == LDAP_SUCCESS) {
  848. for(i = 0; attrs[i++];)
  849. ;
  850. if(!(eattrs = calloc(i, sizeof *eattrs)))
  851. status = LDAP_NO_MEMORY;
  852. else {
  853. for(j = 0; attrs[j]; j++) {
  854. i = strlen(attrs[j]);
  855. if(!(eattrs[j] = malloc(i + 1))) {
  856. status = LDAP_NO_MEMORY;
  857. break;
  858. }
  859. QadrtConvertA2E(eattrs[j], attrs[j], i, i);
  860. eattrs[j][i] = '\0';
  861. }
  862. }
  863. }
  864. if(status == LDAP_SUCCESS)
  865. status = ldap_search_s(ld, ebase? ebase: "", scope,
  866. efilter? efilter: "(objectclass=*)",
  867. eattrs, attrsonly, res);
  868. if(eattrs) {
  869. for(j = 0; eattrs[j]; j++)
  870. free(eattrs[j]);
  871. free(eattrs);
  872. }
  873. if(efilter)
  874. free(efilter);
  875. if(ebase)
  876. free(ebase);
  877. return status;
  878. }
  879. struct berval * *
  880. Curl_ldap_get_values_len_a(void * ld, LDAPMessage * entry, const char * attr)
  881. {
  882. int i;
  883. char * cp;
  884. struct berval * * result;
  885. cp = (char *) NULL;
  886. if(attr) {
  887. i = strlen(attr);
  888. if(!(cp = malloc(i + 1))) {
  889. ldap_set_lderrno(ld, LDAP_NO_MEMORY, NULL,
  890. ldap_err2string(LDAP_NO_MEMORY));
  891. return (struct berval * *) NULL;
  892. }
  893. QadrtConvertA2E(cp, attr, i, i);
  894. cp[i] = '\0';
  895. }
  896. result = ldap_get_values_len(ld, entry, cp);
  897. if(cp)
  898. free(cp);
  899. /* Result data are binary in nature, so they haven't been
  900. converted to EBCDIC. Therefore do not convert. */
  901. return result;
  902. }
  903. char *
  904. Curl_ldap_err2string_a(int error)
  905. {
  906. return set_thread_string(LK_LDAP_ERROR, ldap_err2string(error));
  907. }
  908. char *
  909. Curl_ldap_get_dn_a(void * ld, LDAPMessage * entry)
  910. {
  911. int i;
  912. char * cp;
  913. char * cp2;
  914. cp = ldap_get_dn(ld, entry);
  915. if(!cp)
  916. return cp;
  917. i = strlen(cp);
  918. if(!(cp2 = malloc(i + 1)))
  919. return cp2;
  920. QadrtConvertE2A(cp2, cp, i, i);
  921. cp2[i] = '\0';
  922. /* No way to allocate a buffer here, because it will be released by
  923. ldap_memfree() and ldap_memalloc() does not exist. The solution is to
  924. overwrite the EBCDIC buffer with ASCII to return it. */
  925. strcpy(cp, cp2);
  926. free(cp2);
  927. return cp;
  928. }
  929. char *
  930. Curl_ldap_first_attribute_a(void * ld,
  931. LDAPMessage * entry, BerElement * * berptr)
  932. {
  933. int i;
  934. char * cp;
  935. char * cp2;
  936. cp = ldap_first_attribute(ld, entry, berptr);
  937. if(!cp)
  938. return cp;
  939. i = strlen(cp);
  940. if(!(cp2 = malloc(i + 1)))
  941. return cp2;
  942. QadrtConvertE2A(cp2, cp, i, i);
  943. cp2[i] = '\0';
  944. /* No way to allocate a buffer here, because it will be released by
  945. ldap_memfree() and ldap_memalloc() does not exist. The solution is to
  946. overwrite the EBCDIC buffer with ASCII to return it. */
  947. strcpy(cp, cp2);
  948. free(cp2);
  949. return cp;
  950. }
  951. char *
  952. Curl_ldap_next_attribute_a(void * ld,
  953. LDAPMessage * entry, BerElement * berptr)
  954. {
  955. int i;
  956. char * cp;
  957. char * cp2;
  958. cp = ldap_next_attribute(ld, entry, berptr);
  959. if(!cp)
  960. return cp;
  961. i = strlen(cp);
  962. if(!(cp2 = malloc(i + 1)))
  963. return cp2;
  964. QadrtConvertE2A(cp2, cp, i, i);
  965. cp2[i] = '\0';
  966. /* No way to allocate a buffer here, because it will be released by
  967. ldap_memfree() and ldap_memalloc() does not exist. The solution is to
  968. overwrite the EBCDIC buffer with ASCII to return it. */
  969. strcpy(cp, cp2);
  970. free(cp2);
  971. return cp;
  972. }
  973. #endif /* CURL_DISABLE_LDAP */
  974. static int
  975. convert_sockaddr(struct sockaddr_storage * dstaddr,
  976. const struct sockaddr * srcaddr, int srclen)
  977. {
  978. const struct sockaddr_un * srcu;
  979. struct sockaddr_un * dstu;
  980. unsigned int i;
  981. unsigned int dstsize;
  982. /* Convert a socket address into job CCSID, if needed. */
  983. if(!srcaddr || srclen < offsetof(struct sockaddr, sa_family) +
  984. sizeof srcaddr->sa_family || srclen > sizeof *dstaddr) {
  985. errno = EINVAL;
  986. return -1;
  987. }
  988. memcpy((char *) dstaddr, (char *) srcaddr, srclen);
  989. switch (srcaddr->sa_family) {
  990. case AF_UNIX:
  991. srcu = (const struct sockaddr_un *) srcaddr;
  992. dstu = (struct sockaddr_un *) dstaddr;
  993. dstsize = sizeof *dstaddr - offsetof(struct sockaddr_un, sun_path);
  994. srclen -= offsetof(struct sockaddr_un, sun_path);
  995. i = QadrtConvertA2E(dstu->sun_path, srcu->sun_path, dstsize - 1, srclen);
  996. dstu->sun_path[i] = '\0';
  997. i += offsetof(struct sockaddr_un, sun_path);
  998. srclen = i;
  999. }
  1000. return srclen;
  1001. }
  1002. int
  1003. Curl_os400_connect(int sd, struct sockaddr * destaddr, int addrlen)
  1004. {
  1005. int i;
  1006. struct sockaddr_storage laddr;
  1007. i = convert_sockaddr(&laddr, destaddr, addrlen);
  1008. if(i < 0)
  1009. return -1;
  1010. return connect(sd, (struct sockaddr *) &laddr, i);
  1011. }
  1012. int
  1013. Curl_os400_bind(int sd, struct sockaddr * localaddr, int addrlen)
  1014. {
  1015. int i;
  1016. struct sockaddr_storage laddr;
  1017. i = convert_sockaddr(&laddr, localaddr, addrlen);
  1018. if(i < 0)
  1019. return -1;
  1020. return bind(sd, (struct sockaddr *) &laddr, i);
  1021. }
  1022. int
  1023. Curl_os400_sendto(int sd, char * buffer, int buflen, int flags,
  1024. struct sockaddr * dstaddr, int addrlen)
  1025. {
  1026. int i;
  1027. struct sockaddr_storage laddr;
  1028. i = convert_sockaddr(&laddr, dstaddr, addrlen);
  1029. if(i < 0)
  1030. return -1;
  1031. return sendto(sd, buffer, buflen, flags, (struct sockaddr *) &laddr, i);
  1032. }
  1033. int
  1034. Curl_os400_recvfrom(int sd, char * buffer, int buflen, int flags,
  1035. struct sockaddr * fromaddr, int * addrlen)
  1036. {
  1037. int i;
  1038. int rcvlen;
  1039. int laddrlen;
  1040. const struct sockaddr_un * srcu;
  1041. struct sockaddr_un * dstu;
  1042. struct sockaddr_storage laddr;
  1043. if(!fromaddr || !addrlen || *addrlen <= 0)
  1044. return recvfrom(sd, buffer, buflen, flags, fromaddr, addrlen);
  1045. laddrlen = sizeof laddr;
  1046. laddr.ss_family = AF_UNSPEC; /* To detect if unused. */
  1047. rcvlen = recvfrom(sd, buffer, buflen, flags,
  1048. (struct sockaddr *) &laddr, &laddrlen);
  1049. if(rcvlen < 0)
  1050. return rcvlen;
  1051. switch (laddr.ss_family) {
  1052. case AF_UNIX:
  1053. srcu = (const struct sockaddr_un *) &laddr;
  1054. dstu = (struct sockaddr_un *) fromaddr;
  1055. i = *addrlen - offsetof(struct sockaddr_un, sun_path);
  1056. laddrlen -= offsetof(struct sockaddr_un, sun_path);
  1057. i = QadrtConvertE2A(dstu->sun_path, srcu->sun_path, i, laddrlen);
  1058. laddrlen = i + offsetof(struct sockaddr_un, sun_path);
  1059. if(laddrlen < *addrlen)
  1060. dstu->sun_path[i] = '\0';
  1061. break;
  1062. case AF_UNSPEC:
  1063. break;
  1064. default:
  1065. if(laddrlen > *addrlen)
  1066. laddrlen = *addrlen;
  1067. if(laddrlen)
  1068. memcpy((char *) fromaddr, (char *) &laddr, laddrlen);
  1069. break;
  1070. }
  1071. *addrlen = laddrlen;
  1072. return rcvlen;
  1073. }
  1074. #ifdef HAVE_LIBZ
  1075. const char *
  1076. Curl_os400_zlibVersion(void)
  1077. {
  1078. return set_thread_string(LK_ZLIB_VERSION, zlibVersion());
  1079. }
  1080. int
  1081. Curl_os400_inflateInit_(z_streamp strm, const char * version, int stream_size)
  1082. {
  1083. z_const char * msgb4 = strm->msg;
  1084. int ret;
  1085. ret = inflateInit(strm);
  1086. if(strm->msg != msgb4)
  1087. strm->msg = set_thread_string(LK_ZLIB_MSG, strm->msg);
  1088. return ret;
  1089. }
  1090. int
  1091. Curl_os400_inflateInit2_(z_streamp strm, int windowBits,
  1092. const char * version, int stream_size)
  1093. {
  1094. z_const char * msgb4 = strm->msg;
  1095. int ret;
  1096. ret = inflateInit2(strm, windowBits);
  1097. if(strm->msg != msgb4)
  1098. strm->msg = set_thread_string(LK_ZLIB_MSG, strm->msg);
  1099. return ret;
  1100. }
  1101. int
  1102. Curl_os400_inflate(z_streamp strm, int flush)
  1103. {
  1104. z_const char * msgb4 = strm->msg;
  1105. int ret;
  1106. ret = inflate(strm, flush);
  1107. if(strm->msg != msgb4)
  1108. strm->msg = set_thread_string(LK_ZLIB_MSG, strm->msg);
  1109. return ret;
  1110. }
  1111. int
  1112. Curl_os400_inflateEnd(z_streamp strm)
  1113. {
  1114. z_const char * msgb4 = strm->msg;
  1115. int ret;
  1116. ret = inflateEnd(strm);
  1117. if(strm->msg != msgb4)
  1118. strm->msg = set_thread_string(LK_ZLIB_MSG, strm->msg);
  1119. return ret;
  1120. }
  1121. #endif