Branch
Hash :
7c13becc
Author :
Thomas de Grivel
Date :
2025-10-13T12:07:51
TLS: fix tests, switch to kc3s, and remove debug messages
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100
/* kc3
* Copyright from 2022 to 2025 kmx.io <contact@kmx.io>
*
* Permission is hereby granted to use this software granted the above
* copyright notice and this permission paragraph are included in all
* copies and substantial portions of this software.
*
* THIS SOFTWARE IS PROVIDED "AS-IS" WITHOUT ANY GUARANTEE OF
* PURPOSE AND PERFORMANCE. IN NO EVENT WHATSOEVER SHALL THE
* AUTHOR BE CONSIDERED LIABLE FOR THE USE AND PERFORMANCE OF
* THIS SOFTWARE.
*/
#include <unistd.h>
#include <tls.h>
#include "../libkc3/kc3.h"
#include "../socket/socket.h"
#include "../socket/socket_buf.h"
#include "tls_buf.h"
#include "tls_server.h"
void kc3_tls_server_clean (s_tls_server *tls_server)
{
s_tls_buf *tls_buf;
buf_flush(tls_server->socket_buf.buf_rw.w);
tls_buf = tls_server->socket_buf.buf_rw.w->user_ptr;
tls_close(tls_buf->ctx);
tls_buf_close(tls_server->socket_buf.buf_rw.r);
tls_buf_close(tls_server->socket_buf.buf_rw.w);
buf_rw_clean(&tls_server->socket_buf.buf_rw);
//TODO: avoid leaks in tests if this is removed
close(tls_server->socket_buf.sockfd);
}
s_tls_server * kc3_tls_server_init_accept (s_tls_server *tls_server,
p_socket socket,
p_tls *ctx)
{
sw r;
s_tls_server tmp = {0};
p_tls tmp_ctx = NULL;
assert(tls_server);
assert(ctx);
assert(*ctx);
if (! socket_buf_init_accept(&tmp.socket_buf, socket)) {
err_puts("kc3_tls_server_init_accept: socket_buf_init_accept");
assert(! "kc3_tls_server_init_accept: socket_buf_init_accept");
return NULL;
}
if (false)
err_puts("kc3_tls_server_init_accept: accept: OK");
if (tls_accept_socket(*ctx, &tmp_ctx, tmp.socket_buf.sockfd)) {
err_write_1("kc3_tls_server_init_accept: tls_accept_socket: ");
err_puts(tls_error(*ctx));
assert(! "kc3_tls_server_init_accept: tls_accept_socket");
return NULL;
}
if (false)
err_puts("kc3_tls_server_init_accept: tls_accept_socket: OK");
if (! (tmp.socket_buf.buf_rw.r = buf_new_alloc(BUF_SIZE))) {
err_puts("kc3_tls_server_init_accept: buf_new_alloc r");
assert(! "kc3_tls_server_init_accept: buf_new_alloc r");
return NULL;
}
if (! (tmp.socket_buf.buf_rw.w = buf_new_alloc(BUF_SIZE))) {
err_puts("kc3_tls_server_init_accept: buf_new_alloc w");
assert(! "kc3_tls_server_init_accept: buf_new_alloc w");
buf_delete(tmp.socket_buf.buf_rw.r);
return NULL;
}
if (! tls_buf_open_r(tmp.socket_buf.buf_rw.r, tmp_ctx)) {
err_puts("kc3_tls_server_init_accept: tls_buf_open_r");
assert(! "kc3_tls_server_init_accept: tls_buf_open_r");
buf_delete(tmp.socket_buf.buf_rw.w);
buf_delete(tmp.socket_buf.buf_rw.r);
return NULL;
}
if (! tls_buf_open_w(tmp.socket_buf.buf_rw.w, tmp_ctx)) {
err_puts("kc3_tls_server_init_accept: tls_buf_open_w");
assert(! "kc3_tls_server_init_accept: tls_buf_open_w");
tls_buf_close(tmp.socket_buf.buf_rw.r);
buf_delete(tmp.socket_buf.buf_rw.w);
buf_delete(tmp.socket_buf.buf_rw.r);
return NULL;
}
while ((r = tls_handshake(tmp_ctx)) == TLS_WANT_POLLIN ||
r == TLS_WANT_POLLOUT)
;
if (r) {
err_write_1("kc3_tls_server_init_accept: tls_handshake: ");
err_puts(tls_error(tmp_ctx));
assert(! "kc3_tls_server_init_accept: tls_handshake");
tls_buf_close(tmp.socket_buf.buf_rw.w);
tls_buf_close(tmp.socket_buf.buf_rw.r);
buf_delete(tmp.socket_buf.buf_rw.w);
buf_delete(tmp.socket_buf.buf_rw.r);
return NULL;
}
*tls_server = tmp;
return tls_server;
}