if (mc->ssl.state != MBEDTLS_SSL_HANDSHAKE_OVER)
return 0;
+ ctx->flags |= TLS_CONN_F_HS_DONE;
+
/*
* Handshake complete
*/
return enq;
}
-static u8
-mbedtls_handshake_is_over (tls_ctx_t * ctx)
-{
- mbedtls_ctx_t *mc = (mbedtls_ctx_t *) ctx;
- return (mc->ssl.state == MBEDTLS_SSL_HANDSHAKE_OVER);
-}
-
static int
mbedtls_transport_close (tls_ctx_t * ctx)
{
- if (!mbedtls_handshake_is_over (ctx))
+ if (!(ctx->flags & TLS_CONN_F_HS_DONE))
{
session_close (session_get_from_handle (ctx->tls_session_handle));
return 0;
static int
mbedtls_transport_reset (tls_ctx_t *ctx)
{
- if (!mbedtls_handshake_is_over (ctx))
+ if (!(ctx->flags & TLS_CONN_F_HS_DONE))
{
session_close (session_get_from_handle (ctx->tls_session_handle));
return 0;
.ctx_init_client = mbedtls_ctx_init_client,
.ctx_write = mbedtls_ctx_write,
.ctx_read = mbedtls_ctx_read,
- .ctx_handshake_is_over = mbedtls_handshake_is_over,
.ctx_start_listen = mbedtls_start_listen,
.ctx_stop_listen = mbedtls_stop_listen,
.ctx_transport_close = mbedtls_transport_close,
return 0;
}
-static u8
-openssl_handshake_is_over (tls_ctx_t * ctx)
-{
- openssl_ctx_t *mc = (openssl_ctx_t *) ctx;
- if (!mc->ssl)
- return 0;
- return SSL_is_init_finished (mc->ssl);
-}
-
static int
openssl_transport_close (tls_ctx_t * ctx)
{
return 0;
#endif
- if (!openssl_handshake_is_over (ctx))
+ if (!(ctx->flags & TLS_CONN_F_HS_DONE))
{
openssl_handle_handshake_failure (ctx);
return 0;
static int
openssl_transport_reset (tls_ctx_t *ctx)
{
- if (!openssl_handshake_is_over (ctx))
+ if (!(ctx->flags & TLS_CONN_F_HS_DONE))
{
openssl_handle_handshake_failure (ctx);
return 0;
.ctx_init_client = openssl_ctx_init_client,
.ctx_write = openssl_ctx_write,
.ctx_read = openssl_ctx_read,
- .ctx_handshake_is_over = openssl_handshake_is_over,
.ctx_start_listen = openssl_start_listen,
.ctx_stop_listen = openssl_stop_listen,
.ctx_transport_close = openssl_transport_close,
return pool_elt_at_index (picotls_main.lctx_pool, lctx_index);
}
-static u8
-picotls_handshake_is_over (tls_ctx_t * ctx)
-{
- picotls_ctx_t *ptls_ctx = (picotls_ctx_t *) ctx;
- assert (ptls_ctx->tls);
- return ptls_handshake_is_complete (ptls_ctx->tls);
-}
-
static int
picotls_try_handshake_write (picotls_ctx_t * ptls_ctx,
session_t * tls_session, ptls_buffer_t * buf)
static int
picotls_transport_close (tls_ctx_t * ctx)
{
- if (!picotls_handshake_is_over (ctx))
+ if (!(ctx->flags & TLS_CONN_F_HS_DONE))
{
picotls_handle_handshake_failure (ctx);
return 0;
static int
picotls_transport_reset (tls_ctx_t *ctx)
{
- if (!picotls_handshake_is_over (ctx))
+ if (!(ctx->flags & TLS_CONN_F_HS_DONE))
{
picotls_handle_handshake_failure (ctx);
return 0;
if (PREDICT_FALSE (!ptls_handshake_is_complete (ptls_ctx->tls)))
{
picotls_do_handshake (ptls_ctx, tcp_session);
- if (picotls_handshake_is_over (ctx))
+ if (ctx->flags & TLS_CONN_F_HS_DONE)
{
if (ptls_is_server (ptls_ctx->tls))
{
.ctx_free = picotls_ctx_free,
.ctx_get = picotls_ctx_get,
.ctx_get_w_thread = picotls_ctx_get_w_thread,
- .ctx_handshake_is_over = picotls_handshake_is_over,
.ctx_start_listen = picotls_start_listen,
.ctx_stop_listen = picotls_stop_listen,
.ctx_init_server = picotls_ctx_init_server,
void
tls_notify_app_io_error (tls_ctx_t *ctx)
{
- ASSERT (tls_ctx_handshake_is_over (ctx));
+ ASSERT (ctx->flags & TLS_CONN_F_HS_DONE);
session_transport_reset_notify (&ctx->connection);
session_transport_closed_notify (&ctx->connection);
format_tls_ctx_state (u8 * s, va_list * args)
{
tls_ctx_t *ctx;
- session_t *ts;
+ session_t *as;
ctx = va_arg (*args, tls_ctx_t *);
- ts = session_get (ctx->c_s_index, ctx->c_thread_index);
- if (ts->session_state == SESSION_STATE_LISTENING)
+ as = session_get (ctx->c_s_index, ctx->c_thread_index);
+ if (as->session_state == SESSION_STATE_LISTENING)
s = format (s, "%s", "LISTEN");
else
{
- if (ts->session_state >= SESSION_STATE_TRANSPORT_CLOSED)
+ if (as->session_state == SESSION_STATE_READY)
+ s = format (s, "%s", "ESTABLISHED");
+ else if (as->session_state == SESSION_STATE_ACCEPTING)
+ s = format (s, "%s", "ACCEPTING");
+ else if (as->session_state == SESSION_STATE_CONNECTING)
+ s = format (s, "%s", "CONNECTING");
+ else if (as->session_state >= SESSION_STATE_TRANSPORT_CLOSED)
s = format (s, "%s", "CLOSED");
- else if (ts->session_state == SESSION_STATE_APP_CLOSED)
- s = format (s, "%s", "APP-CLOSED");
- else if (ts->session_state >= SESSION_STATE_TRANSPORT_CLOSING)
+ else if (as->session_state >= SESSION_STATE_TRANSPORT_CLOSING)
s = format (s, "%s", "CLOSING");
- else if (tls_ctx_handshake_is_over (ctx))
- s = format (s, "%s", "ESTABLISHED");
else
- s = format (s, "%s", "HANDSHAKE");
+ s = format (s, "UNHANDLED %u", as->session_state);
}
return s;
int (*ctx_init_client) (tls_ctx_t * ctx);
int (*ctx_init_server) (tls_ctx_t * ctx);
int (*ctx_read) (tls_ctx_t * ctx, session_t * tls_session);
- int (*ctx_write) (tls_ctx_t * ctx, session_t * app_session,
- transport_send_params_t * sp);
- u8 (*ctx_handshake_is_over) (tls_ctx_t * ctx);
+ int (*ctx_write) (tls_ctx_t *ctx, session_t *app_session,
+ transport_send_params_t *sp);
int (*ctx_start_listen) (tls_ctx_t * ctx);
int (*ctx_stop_listen) (tls_ctx_t * ctx);
int (*ctx_transport_close) (tls_ctx_t * ctx);
return tls_vfts[ctx->tls_ctx_engine].ctx_app_close (ctx);
}
-static inline u8
-tls_ctx_handshake_is_over (tls_ctx_t *ctx)
-{
- return tls_vfts[ctx->tls_ctx_engine].ctx_handshake_is_over (ctx);
-}
-
static inline int
tls_reinit_ca_chain (crypto_engine_type_t tls_engine_id)
{