aboutsummaryrefslogtreecommitdiff
path: root/src/supplemental/tls
diff options
context:
space:
mode:
authorGarrett D'Amore <garrett@damore.org>2019-01-05 16:09:10 -0800
committerGarrett D'Amore <garrett@damore.org>2019-01-06 12:12:27 -0800
commit68c6310ee83078d6ad6af0c9ccddef11b8f8b7c2 (patch)
treed03175dddb1142a5ac9fedf4a8643f27648db53e /src/supplemental/tls
parentf76f536742c7d0766244ff4b8d388586100384d5 (diff)
downloadnng-68c6310ee83078d6ad6af0c9ccddef11b8f8b7c2.tar.gz
nng-68c6310ee83078d6ad6af0c9ccddef11b8f8b7c2.tar.bz2
nng-68c6310ee83078d6ad6af0c9ccddef11b8f8b7c2.zip
fixes #847 Define public TLS API
Diffstat (limited to 'src/supplemental/tls')
-rw-r--r--src/supplemental/tls/CMakeLists.txt9
-rw-r--r--src/supplemental/tls/mbedtls/tls.c84
-rw-r--r--src/supplemental/tls/tls_api.h18
-rw-r--r--src/supplemental/tls/tls_common.c560
4 files changed, 627 insertions, 44 deletions
diff --git a/src/supplemental/tls/CMakeLists.txt b/src/supplemental/tls/CMakeLists.txt
index 8fed1df1..8f819ea8 100644
--- a/src/supplemental/tls/CMakeLists.txt
+++ b/src/supplemental/tls/CMakeLists.txt
@@ -1,6 +1,9 @@
#
# Copyright 2018 Capitar IT Group BV <info@capitar.com>
# Copyright 2018 Staysail Systems, Inc. <info@staysail.tech>
+# Copyright 2019 Devolutions <info@devolutions.net>
+#
+
#
# This software is supplied under the terms of the MIT License, a
# copy of which should be located in the distribution where this
@@ -8,12 +11,14 @@
# found online at https://opensource.org/licenses/MIT.
#
+set(_SRCS ${PROJECT_SOURCE_DIR}/include/nng/supplemental/tls/tls.h)
+
if (NNG_SUPP_TLS)
set(NNG_SUPP_TLS_MBEDTLS ON)
set(_DEFS -DNNG_SUPP_TLS)
-endif()
-set(_SRCS ${PROJECT_SOURCE_DIR}/include/nng/supplemental/tls/tls.h)
+ list(APPEND _SRCS supplemental/tls/tls_common.c)
+endif()
# For now we only support the ARM mbedTLS library.
if (NNG_SUPP_TLS_MBEDTLS)
diff --git a/src/supplemental/tls/mbedtls/tls.c b/src/supplemental/tls/mbedtls/tls.c
index 29f1873e..9f1e8f83 100644
--- a/src/supplemental/tls/mbedtls/tls.c
+++ b/src/supplemental/tls/mbedtls/tls.c
@@ -1,7 +1,7 @@
//
// Copyright 2018 Staysail Systems, Inc. <info@staysail.tech>
// Copyright 2018 Capitar IT Group BV <info@capitar.com>
-// Copyright 2018 Devolutions <info@devolutions.net>
+// Copyright 2019 Devolutions <info@devolutions.net>
//
// This software is supplied under the terms of the MIT License, a
// copy of which should be located in the distribution where this
@@ -158,32 +158,34 @@ nni_tls_config_fini(nng_tls_config *cfg)
{
nni_tls_certkey *ck;
- nni_mtx_lock(&cfg->lk);
- cfg->refcnt--;
- if (cfg->refcnt != 0) {
+ if (cfg != NULL) {
+ nni_mtx_lock(&cfg->lk);
+ cfg->refcnt--;
+ if (cfg->refcnt != 0) {
+ nni_mtx_unlock(&cfg->lk);
+ return;
+ }
nni_mtx_unlock(&cfg->lk);
- return;
- }
- nni_mtx_unlock(&cfg->lk);
- mbedtls_ssl_config_free(&cfg->cfg_ctx);
+ mbedtls_ssl_config_free(&cfg->cfg_ctx);
#ifdef NNG_TLS_USE_CTR_DRBG
- mbedtls_ctr_drbg_free(&cfg->rng_ctx);
+ mbedtls_ctr_drbg_free(&cfg->rng_ctx);
#endif
- mbedtls_x509_crt_free(&cfg->ca_certs);
- mbedtls_x509_crl_free(&cfg->crl);
- if (cfg->server_name) {
- nni_strfree(cfg->server_name);
- }
- while ((ck = nni_list_first(&cfg->certkeys))) {
- nni_list_remove(&cfg->certkeys, ck);
- mbedtls_x509_crt_free(&ck->crt);
- mbedtls_pk_free(&ck->key);
+ mbedtls_x509_crt_free(&cfg->ca_certs);
+ mbedtls_x509_crl_free(&cfg->crl);
+ if (cfg->server_name) {
+ nni_strfree(cfg->server_name);
+ }
+ while ((ck = nni_list_first(&cfg->certkeys))) {
+ nni_list_remove(&cfg->certkeys, ck);
+ mbedtls_x509_crt_free(&ck->crt);
+ mbedtls_pk_free(&ck->key);
- NNI_FREE_STRUCT(ck);
+ NNI_FREE_STRUCT(ck);
+ }
+ nni_mtx_fini(&cfg->lk);
+ NNI_FREE_STRUCT(cfg);
}
- nni_mtx_fini(&cfg->lk);
- NNI_FREE_STRUCT(cfg);
}
int
@@ -254,27 +256,29 @@ void
nni_tls_fini(nni_tls *tp)
{
// Shut it all down first.
- if (tp->tcp) {
- nni_tcp_conn_close(tp->tcp);
- }
- nni_aio_stop(tp->tcp_send);
- nni_aio_stop(tp->tcp_recv);
+ if (tp != NULL) {
+ if (tp->tcp) {
+ nni_tcp_conn_close(tp->tcp);
+ }
+ nni_aio_stop(tp->tcp_send);
+ nni_aio_stop(tp->tcp_recv);
- // And finalize / free everything.
- if (tp->tcp) {
- nni_tcp_conn_fini(tp->tcp);
- }
- nni_aio_fini(tp->tcp_send);
- nni_aio_fini(tp->tcp_recv);
- mbedtls_ssl_free(&tp->ctx);
- nni_mtx_fini(&tp->lk);
- nni_free(tp->recvbuf, NNG_TLS_MAX_RECV_SIZE);
- nni_free(tp->sendbuf, NNG_TLS_MAX_RECV_SIZE);
- if (tp->cfg != NULL) {
- // release the hold we got on it
- nni_tls_config_fini(tp->cfg);
+ // And finalize / free everything.
+ if (tp->tcp) {
+ nni_tcp_conn_fini(tp->tcp);
+ }
+ nni_aio_fini(tp->tcp_send);
+ nni_aio_fini(tp->tcp_recv);
+ mbedtls_ssl_free(&tp->ctx);
+ nni_mtx_fini(&tp->lk);
+ nni_free(tp->recvbuf, NNG_TLS_MAX_RECV_SIZE);
+ nni_free(tp->sendbuf, NNG_TLS_MAX_RECV_SIZE);
+ if (tp->cfg != NULL) {
+ // release the hold we got on it
+ nni_tls_config_fini(tp->cfg);
+ }
+ NNI_FREE_STRUCT(tp);
}
- NNI_FREE_STRUCT(tp);
}
// nni_tls_mkerr converts an mbed error to an NNG error. In all cases
diff --git a/src/supplemental/tls/tls_api.h b/src/supplemental/tls/tls_api.h
index 63424d5e..22dd68a0 100644
--- a/src/supplemental/tls/tls_api.h
+++ b/src/supplemental/tls/tls_api.h
@@ -1,7 +1,7 @@
//
// Copyright 2018 Staysail Systems, Inc. <info@staysail.tech>
// Copyright 2018 Capitar IT Group BV <info@capitar.com>
-// Copyright 2018 Devolutions <info@devolutions.net>
+// Copyright 2019 Devolutions <info@devolutions.net>
//
// This software is supplied under the terms of the MIT License, a
// copy of which should be located in the distribution where this
@@ -44,6 +44,20 @@ extern int nni_tls_setopt(
nni_tls *, const char *, const void *, size_t, nni_type);
extern int nni_tls_getopt(nni_tls *, const char *, void *, size_t *, nni_type);
-// TBD: getting additional peer certificate information...
+extern int nni_tls_set(
+ nng_tls *, const char *, const void *, size_t, nni_type);
+extern int nni_tls_get(nng_tls *, const char *, void *, size_t *, nni_type);
+
+extern int nni_tls_dialer_setopt(
+ nng_tls_dialer *, const char *, const void *, size_t, nni_type);
+
+extern int nni_tls_dialer_getopt(
+ nng_tls_dialer *, const char *, void *, size_t *, nni_type);
+
+extern int nni_tls_listener_setopt(
+ nng_tls_listener *, const char *, const void *, size_t, nni_type);
+
+extern int nni_tls_listener_getopt(
+ nng_tls_listener *, const char *, void *, size_t *, nni_type);
#endif // NNG_SUPPLEMENTAL_TLS_TLS_API_H
diff --git a/src/supplemental/tls/tls_common.c b/src/supplemental/tls/tls_common.c
new file mode 100644
index 00000000..95466558
--- /dev/null
+++ b/src/supplemental/tls/tls_common.c
@@ -0,0 +1,560 @@
+//
+// Copyright 2018 Staysail Systems, Inc. <info@staysail.tech>
+// Copyright 2018 Capitar IT Group BV <info@capitar.com>
+// Copyright 2019 Devolutions <info@devolutions.net>
+//
+// This software is supplied under the terms of the MIT License, a
+// copy of which should be located in the distribution where this
+// file was obtained (LICENSE.txt). A copy of the license may also be
+// found online at https://opensource.org/licenses/MIT.
+//
+
+#include <stdbool.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+
+#include "core/nng_impl.h"
+#include "supplemental/tls/tls_api.h"
+
+#include <nng/supplemental/tcp/tcp.h>
+#include <nng/supplemental/tls/tls.h>
+
+// This file contains common code for TLS, and is only compiled if we
+// have TLS configured in the system. In particular, this provides the
+// parts of TLS support that are invariant relative to different TLS
+// libraries, such as dialer and listener support.
+
+struct nng_tls_s {
+ nni_tls * c;
+ nni_aio * aio; // system aio for connect/accept
+ nni_aio * uaio; // user aio for connect/accept
+ nng_tls_config *cfg;
+};
+
+// We use a union and share an "endpoint" for both dialers and listeners.
+// This allows us to reuse the bulk of the code for things like option
+// handlers for both dialers and listeners.
+typedef union tls_tcp_ep_u {
+ nni_tcp_dialer * d;
+ nni_tcp_listener *l;
+} tls_tcp_ep;
+
+typedef struct nng_tls_ep_s {
+ tls_tcp_ep tcp;
+ nng_tls_config *cfg;
+ nni_mtx lk;
+} tls_ep;
+
+void
+nng_tls_close(nng_tls *tls)
+{
+ nni_tls_close(tls->c);
+}
+
+void
+nng_tls_free(nng_tls *tls)
+{
+ if (tls != NULL) {
+ nni_tls_fini(tls->c);
+ nni_aio_fini(tls->aio);
+ nng_tls_config_free(tls->cfg);
+ NNI_FREE_STRUCT(tls);
+ }
+}
+
+void
+nng_tls_send(nng_tls *tls, nng_aio *aio)
+{
+ nni_tls_send(tls->c, aio);
+}
+
+void
+nng_tls_recv(nng_tls *tls, nng_aio *aio)
+{
+ nni_tls_recv(tls->c, aio);
+}
+
+int
+nni_tls_get(nng_tls *tls, const char *name, void *buf, size_t *szp, nni_type t)
+{
+ return (nni_tls_getopt(tls->c, name, buf, szp, t));
+}
+
+int
+nni_tls_set(
+ nng_tls *tls, const char *name, const void *buf, size_t sz, nni_type t)
+{
+ return (nni_tls_setopt(tls->c, name, buf, sz, t));
+}
+
+int
+nng_tls_getopt(nng_tls *tls, const char *name, void *buf, size_t *szp)
+{
+ return (nni_tls_getopt(tls->c, name, buf, szp, NNI_TYPE_OPAQUE));
+}
+
+int
+nng_tls_setopt(nng_tls *tls, const char *name, const void *buf, size_t sz)
+{
+ return (nni_tls_setopt(tls->c, name, buf, sz, NNI_TYPE_OPAQUE));
+}
+
+int
+nng_tls_dialer_alloc(nng_tls_dialer **dp)
+{
+ tls_ep *ep;
+ int rv;
+
+ if ((rv = nni_init()) != 0) {
+ return (rv);
+ }
+ if ((ep = NNI_ALLOC_STRUCT(ep)) == NULL) {
+ return (NNG_ENOMEM);
+ }
+ nni_mtx_init(&ep->lk);
+
+ if ((rv = nni_tcp_dialer_init(&ep->tcp.d)) != 0) {
+ nni_mtx_fini(&ep->lk);
+ NNI_FREE_STRUCT(ep);
+ return (rv);
+ }
+ if ((rv = nng_tls_config_alloc(&ep->cfg, NNG_TLS_MODE_CLIENT)) != 0) {
+ nni_tcp_dialer_fini(ep->tcp.d);
+ nni_mtx_fini(&ep->lk);
+ NNI_FREE_STRUCT(ep);
+ return (rv);
+ }
+ *dp = (void *) ep;
+ return (rv);
+}
+
+void
+nng_tls_dialer_close(nng_tls_dialer *d)
+{
+ tls_ep *ep = (void *) d;
+ nni_tcp_dialer_close(ep->tcp.d);
+}
+
+void
+nng_tls_dialer_free(nng_tls_dialer *d)
+{
+ tls_ep *ep = (void *) d;
+ if (ep != NULL) {
+ nni_tcp_dialer_fini(ep->tcp.d);
+ nng_tls_config_free(ep->cfg);
+ nni_mtx_fini(&ep->lk);
+ NNI_FREE_STRUCT(ep);
+ }
+}
+
+// For dialing, we need to have our own completion callback, instead of
+// the user's completion callback.
+
+static void
+tls_conn_cb(void *arg)
+{
+ nng_tls * tls = arg;
+ nni_tcp_conn *tcp;
+ int rv;
+
+ if ((rv = nni_aio_result(tls->aio)) != 0) {
+ nni_aio_finish_error(tls->uaio, rv);
+ nng_tls_free(tls);
+ return;
+ }
+
+ tcp = nni_aio_get_output(tls->aio, 0);
+
+ rv = nni_tls_init(&tls->c, tls->cfg, tcp);
+ if (rv != 0) {
+ nni_aio_finish_error(tls->uaio, rv);
+ nni_tcp_conn_fini(tcp);
+ nng_tls_free(tls);
+ return;
+ }
+
+ nni_aio_set_output(tls->uaio, 0, tls);
+ nni_aio_finish(tls->uaio, 0, 0);
+}
+
+// Dialer cancel is called when the user has indicated that they no longer
+// want to wait for the connection to establish.
+static void
+tls_conn_cancel(nni_aio *aio, void *arg, int rv)
+{
+ nng_tls *tls = arg;
+ NNI_ASSERT(tls->uaio == aio);
+ // Just pass this down. If the connection is already done, this
+ // will have no effect.
+ nni_aio_abort(tls->aio, rv);
+}
+
+void
+nng_tls_dialer_dial(nng_tls_dialer *d, const nng_sockaddr *sa, nng_aio *aio)
+{
+ int rv;
+ nng_tls *tls;
+ tls_ep * ep = (void *) d;
+
+ if (nni_aio_begin(aio) != 0) {
+ return;
+ }
+ if ((tls = NNI_ALLOC_STRUCT(tls)) == NULL) {
+ nni_aio_finish_error(aio, NNG_ENOMEM);
+ return;
+ }
+ if ((rv = nni_aio_init(&tls->aio, tls_conn_cb, tls)) != 0) {
+ nni_aio_finish_error(aio, rv);
+ NNI_FREE_STRUCT(tls);
+ return;
+ }
+ tls->uaio = aio;
+
+ // Save a copy of the TLS configuration. This way we don't have
+ // to ensure that the dialer outlives the connection, because the
+ // only shared data is the configuration which is reference counted.
+ nni_mtx_lock(&ep->lk);
+ tls->cfg = ep->cfg;
+ nng_tls_config_hold(tls->cfg);
+ nni_mtx_unlock(&ep->lk);
+
+ if ((rv = nni_aio_schedule(aio, tls_conn_cancel, tls)) != 0) {
+ nni_aio_finish_error(aio, rv);
+ nng_tls_free(tls);
+ return;
+ }
+
+ nni_tcp_dialer_dial(ep->tcp.d, sa, tls->aio);
+}
+
+static int
+tls_check_string(const void *v, size_t sz, nni_opt_type t)
+{
+ if ((t != NNI_TYPE_OPAQUE) && (t != NNI_TYPE_STRING)) {
+ return (NNG_EBADTYPE);
+ }
+ if (nni_strnlen(v, sz) >= sz) {
+ return (NNG_EINVAL);
+ }
+ return (0);
+}
+
+static int
+tls_ep_set_config(void *arg, const void *buf, size_t sz, nni_type t)
+{
+ int rv;
+ nng_tls_config *cfg;
+ tls_ep * ep;
+
+ if ((rv = nni_copyin_ptr((void **) &cfg, buf, sz, t)) != 0) {
+ return (rv);
+ }
+ if (cfg == NULL) {
+ return (NNG_EINVAL);
+ }
+ if ((ep = arg) != NULL) {
+ nng_tls_config *old;
+
+ nni_mtx_lock(&ep->lk);
+ old = ep->cfg;
+ nng_tls_config_hold(cfg);
+ ep->cfg = cfg;
+ nni_mtx_unlock(&ep->lk);
+ if (old != NULL) {
+ nng_tls_config_free(old);
+ }
+ }
+ return (0);
+}
+
+static int
+tls_ep_get_config(void *arg, void *buf, size_t *szp, nni_type t)
+{
+ tls_ep * ep = arg;
+ nng_tls_config *cfg;
+ int rv;
+ nni_mtx_lock(&ep->lk);
+ if ((cfg = ep->cfg) != NULL) {
+ nng_tls_config_hold(cfg);
+ }
+ if ((rv = nni_copyout_ptr(cfg, buf, szp, t)) != 0) {
+ nng_tls_config_free(cfg);
+ }
+ nni_mtx_unlock(&ep->lk);
+ return (rv);
+}
+
+static int
+tls_ep_set_server_name(void *arg, const void *buf, size_t sz, nni_type t)
+{
+ tls_ep *ep = arg;
+ int rv;
+ if ((rv = tls_check_string(buf, sz, t)) != 0) {
+ return (rv);
+ }
+ if ((ep = arg) != NULL) {
+ nni_mtx_lock(&ep->lk);
+ rv = nng_tls_config_server_name(ep->cfg, buf);
+ nni_mtx_unlock(&ep->lk);
+ }
+ return (rv);
+}
+
+static int
+tls_ep_set_auth_mode(void *arg, const void *buf, size_t sz, nni_type t)
+{
+ int mode;
+ int rv;
+ tls_ep *ep;
+
+ rv = nni_copyin_int(&mode, buf, sz, NNG_TLS_AUTH_MODE_NONE,
+ NNG_TLS_AUTH_MODE_REQUIRED, t);
+ if ((rv == 0) && ((ep = arg) != NULL)) {
+ nni_mtx_lock(&ep->lk);
+ rv = nng_tls_config_auth_mode(ep->cfg, mode);
+ nni_mtx_unlock(&ep->lk);
+ }
+ return (rv);
+}
+
+static int
+tls_ep_set_ca_file(void *arg, const void *buf, size_t sz, nni_opt_type t)
+{
+ tls_ep *ep;
+ int rv;
+
+ if (((rv = tls_check_string(buf, sz, t)) == 0) &&
+ ((ep = arg) != NULL)) {
+ nni_mtx_lock(&ep->lk);
+ rv = nng_tls_config_ca_file(ep->cfg, buf);
+ nni_mtx_unlock(&ep->lk);
+ }
+ return (rv);
+}
+
+static int
+tls_ep_set_cert_key_file(void *arg, const void *buf, size_t sz, nni_opt_type t)
+{
+ tls_ep *ep;
+ int rv;
+
+ if (((rv = tls_check_string(buf, sz, t)) == 0) &&
+ ((ep = arg) != NULL)) {
+ nni_mtx_lock(&ep->lk);
+ rv = nng_tls_config_cert_key_file(ep->cfg, buf, NULL);
+ nni_mtx_unlock(&ep->lk);
+ }
+ return (rv);
+}
+
+static const nni_option tls_ep_opts[] = {
+ {
+ .o_name = NNG_OPT_TLS_CONFIG,
+ .o_get = tls_ep_get_config,
+ .o_set = tls_ep_set_config,
+ },
+ {
+ .o_name = NNG_OPT_TLS_SERVER_NAME,
+ .o_set = tls_ep_set_server_name,
+ },
+ {
+ .o_name = NNG_OPT_TLS_CA_FILE,
+ .o_set = tls_ep_set_ca_file,
+ },
+ {
+ .o_name = NNG_OPT_TLS_CERT_KEY_FILE,
+ .o_set = tls_ep_set_cert_key_file,
+ },
+ {
+ .o_name = NNG_OPT_TLS_AUTH_MODE,
+ .o_set = tls_ep_set_auth_mode,
+ },
+ {
+ .o_name = NULL,
+ },
+};
+
+// private version of getopt and setopt take the type
+int
+nni_tls_dialer_getopt(
+ nng_tls_dialer *d, const char *name, void *buf, size_t *szp, nni_type t)
+{
+ int rv;
+ tls_ep *ep = (void *) d;
+
+ rv = nni_tcp_dialer_getopt(ep->tcp.d, name, buf, szp, t);
+ if (rv == NNG_ENOTSUP) {
+ rv = nni_getopt(tls_ep_opts, name, ep, buf, szp, t);
+ }
+ return (rv);
+}
+
+int
+nni_tls_dialer_setopt(nng_tls_dialer *d, const char *name, const void *buf,
+ size_t sz, nni_type t)
+{
+ int rv;
+ tls_ep *ep = (void *) d;
+
+ rv = nni_tcp_dialer_setopt(
+ ep != NULL ? ep->tcp.d : NULL, name, buf, sz, t);
+ if (rv == NNG_ENOTSUP) {
+ rv = nni_setopt(tls_ep_opts, name, ep, buf, sz, t);
+ }
+ return (rv);
+}
+
+// public versions of option handlers here
+
+int
+nng_tls_dialer_getopt(
+ nng_tls_dialer *d, const char *name, void *buf, size_t *szp)
+{
+ return (nni_tls_dialer_getopt(d, name, buf, szp, NNI_TYPE_OPAQUE));
+}
+
+int
+nng_tls_dialer_setopt(
+ nng_tls_dialer *d, const char *name, const void *buf, size_t sz)
+{
+ return (nni_tls_dialer_setopt(d, name, buf, sz, NNI_TYPE_OPAQUE));
+}
+
+void
+nng_tls_listener_close(nng_tls_listener *l)
+{
+ tls_ep *ep = (void *) l;
+ nni_tcp_listener_close(ep->tcp.l);
+}
+
+void
+nng_tls_listener_free(nng_tls_listener *l)
+{
+ tls_ep *ep = (void *) l;
+ if (ep != NULL) {
+ nng_tls_listener_close(l);
+ nng_tls_config_free(ep->cfg);
+ nni_mtx_fini(&ep->lk);
+ NNI_FREE_STRUCT(ep);
+ }
+}
+
+int
+nng_tls_listener_alloc(nng_tls_listener **lp)
+{
+ tls_ep *ep;
+ int rv;
+
+ if ((rv = nni_init()) != 0) {
+ return (rv);
+ }
+ if ((ep = NNI_ALLOC_STRUCT(ep)) == NULL) {
+ return (NNG_ENOMEM);
+ }
+ nni_mtx_init(&ep->lk);
+
+ if ((rv = nni_tcp_listener_init(&ep->tcp.l)) != 0) {
+ nni_mtx_fini(&ep->lk);
+ NNI_FREE_STRUCT(ep);
+ return (rv);
+ }
+ if ((rv = nng_tls_config_alloc(&ep->cfg, NNG_TLS_MODE_SERVER)) != 0) {
+ nni_tcp_listener_fini(ep->tcp.l);
+ nni_mtx_fini(&ep->lk);
+ NNI_FREE_STRUCT(ep);
+ return (rv);
+ }
+ *lp = (void *) ep;
+ return (0);
+}
+
+int
+nng_tls_listener_listen(nng_tls_listener *l, nng_sockaddr *sa)
+{
+ tls_ep *ep = (void *) l;
+ return (nni_tcp_listener_listen(ep->tcp.l, sa));
+}
+
+void
+nng_tls_listener_accept(nng_tls_listener *l, nng_aio *aio)
+{
+ int rv;
+ nng_tls *tls;
+ tls_ep * ep = (void *) l;
+
+ if (nni_aio_begin(aio) != 0) {
+ return;
+ }
+ if ((tls = NNI_ALLOC_STRUCT(tls)) == NULL) {
+ nni_aio_finish_error(aio, NNG_ENOMEM);
+ return;
+ }
+ if ((rv = nni_aio_init(&tls->aio, tls_conn_cb, tls)) != 0) {
+ nni_aio_finish_error(aio, rv);
+ NNI_FREE_STRUCT(tls);
+ return;
+ }
+ tls->uaio = aio;
+
+ // Save a copy of the TLS configuration. This way we don't have
+ // to ensure that the dialer outlives the connection, because the
+ // only shared data is the configuration which is reference counted.
+ nni_mtx_lock(&ep->lk);
+ tls->cfg = ep->cfg;
+ nng_tls_config_hold(tls->cfg);
+ nni_mtx_unlock(&ep->lk);
+
+ if ((rv = nni_aio_schedule(aio, tls_conn_cancel, tls)) != 0) {
+ nni_aio_finish_error(aio, rv);
+ nng_tls_free(tls);
+ return;
+ }
+
+ nni_tcp_listener_accept(ep->tcp.l, tls->aio);
+}
+
+int
+nni_tls_listener_getopt(
+ nng_tls_listener *l, const char *name, void *buf, size_t *szp, nni_type t)
+{
+ int rv;
+ tls_ep *ep = (void *) l;
+
+ rv = nni_tcp_listener_getopt(ep->tcp.l, name, buf, szp, t);
+ if (rv == NNG_ENOTSUP) {
+ rv = nni_getopt(tls_ep_opts, name, ep, buf, szp, t);
+ }
+ return (rv);
+}
+
+int
+nni_tls_listener_setopt(nng_tls_listener *l, const char *name, const void *buf,
+ size_t sz, nni_type t)
+{
+ int rv;
+ tls_ep *ep = (void *) l;
+
+ rv = nni_tcp_listener_setopt(
+ ep != NULL ? ep->tcp.l : NULL, name, buf, sz, t);
+ if (rv == NNG_ENOTSUP) {
+ rv = nni_setopt(tls_ep_opts, name, ep, buf, sz, t);
+ }
+ return (rv);
+}
+
+// public versions of option handlers here
+
+int
+nng_tls_listener_getopt(
+ nng_tls_listener *l, const char *name, void *buf, size_t *szp)
+{
+ return (nni_tls_listener_getopt(l, name, buf, szp, NNI_TYPE_OPAQUE));
+}
+
+int
+nng_tls_listener_setopt(
+ nng_tls_listener *l, const char *name, const void *buf, size_t sz)
+{
+ return (nni_tls_listener_setopt(l, name, buf, sz, NNI_TYPE_OPAQUE));
+}