Plan 9 from Bell Labs’s /usr/web/sources/contrib/fgb/root/sys/src/ape/lib/openssl/demos/tunala/sm.c

Copyright © 2021 Plan 9 Foundation.
Distributed under the MIT License.
Download the Plan 9 distribution.


#include "tunala.h"

#ifndef NO_TUNALA

void state_machine_init(state_machine_t *machine)
{
	machine->ssl = NULL;
	machine->bio_intossl = machine->bio_fromssl = NULL;
	buffer_init(&machine->clean_in);
	buffer_init(&machine->clean_out);
	buffer_init(&machine->dirty_in);
	buffer_init(&machine->dirty_out);
}

void state_machine_close(state_machine_t *machine)
{
	if(machine->ssl)
		SSL_free(machine->ssl);
/* SSL_free seems to decrement the reference counts already so doing this goes
 * kaboom. */
#if 0
	if(machine->bio_intossl)
		BIO_free(machine->bio_intossl);
	if(machine->bio_fromssl)
		BIO_free(machine->bio_fromssl);
#endif
	buffer_close(&machine->clean_in);
	buffer_close(&machine->clean_out);
	buffer_close(&machine->dirty_in);
	buffer_close(&machine->dirty_out);
	state_machine_init(machine);
}

buffer_t *state_machine_get_buffer(state_machine_t *machine, sm_buffer_t type)
{
	switch(type) {
	case SM_CLEAN_IN:
		return &machine->clean_in;
	case SM_CLEAN_OUT:
		return &machine->clean_out;
	case SM_DIRTY_IN:
		return &machine->dirty_in;
	case SM_DIRTY_OUT:
		return &machine->dirty_out;
	default:
		break;
	}
	/* Should never get here */
	abort();
	return NULL;
}

SSL *state_machine_get_SSL(state_machine_t *machine)
{
	return machine->ssl;
}

int state_machine_set_SSL(state_machine_t *machine, SSL *ssl, int is_server)
{
	if(machine->ssl)
		/* Shouldn't ever be set twice */
		abort();
	machine->ssl = ssl;
	/* Create the BIOs to handle the dirty side of the SSL */
	if((machine->bio_intossl = BIO_new(BIO_s_mem())) == NULL)
		abort();
	if((machine->bio_fromssl = BIO_new(BIO_s_mem())) == NULL)
		abort();
	/* Hook up the BIOs on the dirty side of the SSL */
	SSL_set_bio(machine->ssl, machine->bio_intossl, machine->bio_fromssl);
	if(is_server)
		SSL_set_accept_state(machine->ssl);
	else
		SSL_set_connect_state(machine->ssl);
	/* If we're the first one to generate traffic - do it now otherwise we
	 * go into the next select empty-handed and our peer will not send data
	 * but will similarly wait for us. */
	return state_machine_churn(machine);
}

/* Performs the data-IO loop and returns zero if the machine should close */
int state_machine_churn(state_machine_t *machine)
{
	unsigned int loop;
	if(machine->ssl == NULL) {
		if(buffer_empty(&machine->clean_out))
			/* Time to close this state-machine altogether */
			return 0;
		else
			/* Still buffered data on the clean side to go out */
			return 1;
	}
	/* Do this loop twice to cover any dependencies about which precise
	 * order of reads and writes is required. */
	for(loop = 0; loop < 2; loop++) {
		buffer_to_SSL(&machine->clean_in, machine->ssl);
		buffer_to_BIO(&machine->dirty_in, machine->bio_intossl);
		buffer_from_SSL(&machine->clean_out, machine->ssl);
		buffer_from_BIO(&machine->dirty_out, machine->bio_fromssl);
	}
	/* We close on the SSL side if the info callback noticed some problems
	 * or an SSL shutdown was underway and shutdown traffic had all been
	 * sent. */
	if(SSL_get_app_data(machine->ssl) || (SSL_get_shutdown(machine->ssl) &&
				buffer_empty(&machine->dirty_out))) {
		/* Great, we can seal off the dirty side completely */
		if(!state_machine_close_dirty(machine))
			return 0;
	}
	/* Either the SSL is alive and well, or the closing process still has
	 * outgoing data waiting to be sent */
	return 1;
}

/* Called when the clean side of the SSL has lost its connection */
int state_machine_close_clean(state_machine_t *machine)
{
	/* Well, first thing to do is null out the clean-side buffers - they're
	 * no use any more. */
	buffer_close(&machine->clean_in);
	buffer_close(&machine->clean_out);
	/* And start an SSL shutdown */
	if(machine->ssl)
		SSL_shutdown(machine->ssl);
	/* This is an "event", so flush the SSL of any generated traffic */
	state_machine_churn(machine);
	if(buffer_empty(&machine->dirty_in) &&
			buffer_empty(&machine->dirty_out))
		return 0;
	return 1;
}

/* Called when the dirty side of the SSL has lost its connection. This is pretty
 * terminal as all that can be left to do is send any buffered output on the
 * clean side - after that, we're done. */
int state_machine_close_dirty(state_machine_t *machine)
{
	buffer_close(&machine->dirty_in);
	buffer_close(&machine->dirty_out);
	buffer_close(&machine->clean_in);
	if(machine->ssl)
		SSL_free(machine->ssl);
	machine->ssl = NULL;
	machine->bio_intossl = machine->bio_fromssl = NULL;
	if(buffer_empty(&machine->clean_out))
		return 0;
	return 1;
}

#endif /* !defined(NO_TUNALA) */


Bell Labs OSI certified Powered by Plan 9

(Return to Plan 9 Home Page)

Copyright © 2021 Plan 9 Foundation. All Rights Reserved.
Comments to [email protected].