aboutsummaryrefslogtreecommitdiffstats
path: root/contrib/restricted/aws/s2n/tls/s2n_async_pkey.h
diff options
context:
space:
mode:
authorthegeorg <thegeorg@yandex-team.ru>2022-05-10 22:16:03 +0300
committerthegeorg <thegeorg@yandex-team.ru>2022-05-10 22:16:03 +0300
commit09c71d918d4d0b0ebf67e1ab41aa90ddf587a3f2 (patch)
treedd44d2cb68e2845c2d4c367b66893f3e043a6e8e /contrib/restricted/aws/s2n/tls/s2n_async_pkey.h
parent5eb4a8a2d487411924e1d1b27c454223dcf35005 (diff)
downloadydb-09c71d918d4d0b0ebf67e1ab41aa90ddf587a3f2.tar.gz
Update contrib/restricted/aws/s2n to 1.3.12
ref:f8279d764b4c00974a63543a1364c91e2b81b7a6
Diffstat (limited to 'contrib/restricted/aws/s2n/tls/s2n_async_pkey.h')
-rw-r--r--contrib/restricted/aws/s2n/tls/s2n_async_pkey.h22
1 files changed, 14 insertions, 8 deletions
diff --git a/contrib/restricted/aws/s2n/tls/s2n_async_pkey.h b/contrib/restricted/aws/s2n/tls/s2n_async_pkey.h
index 2ef8386d2f..631a186a9a 100644
--- a/contrib/restricted/aws/s2n/tls/s2n_async_pkey.h
+++ b/contrib/restricted/aws/s2n/tls/s2n_async_pkey.h
@@ -32,19 +32,17 @@ struct s2n_async_pkey_op;
#define S2N_ASYNC_PKEY_GUARD(conn) \
do { \
__typeof(conn) __tmp_conn = (conn); \
- GUARD_NONNULL(__tmp_conn); \
+ POSIX_GUARD_PTR(__tmp_conn); \
switch (conn->handshake.async_state) { \
case S2N_ASYNC_NOT_INVOKED: \
break; \
\
- case S2N_ASYNC_INVOKING_CALLBACK: \
- case S2N_ASYNC_INVOKED_WAITING: \
- BAIL_POSIX(S2N_ERR_ASYNC_BLOCKED); \
+ case S2N_ASYNC_INVOKED: \
+ POSIX_BAIL(S2N_ERR_ASYNC_BLOCKED); \
\
- case S2N_ASYNC_INVOKED_COMPLETE: \
+ case S2N_ASYNC_COMPLETE: \
/* clean up state and return a success from handler */ \
__tmp_conn->handshake.async_state = S2N_ASYNC_NOT_INVOKED; \
- GUARD(s2n_conn_clear_handshake_read_block(__tmp_conn)); \
return S2N_SUCCESS; \
} \
} while (0)
@@ -56,15 +54,23 @@ struct s2n_async_pkey_op;
* call, we use a macro which directly returns the result of s2n_async* operation forcing compiler to error out on
* unreachable code and forcing developer to use on_complete function instead */
#define S2N_ASYNC_PKEY_DECRYPT(conn, encrypted, init_decrypted, on_complete) \
- return S2N_RESULT_TO_POSIX(s2n_async_pkey_decrypt(conn, encrypted, init_decrypted, on_complete));
+ return s2n_result_is_ok(s2n_async_pkey_decrypt(conn, encrypted, init_decrypted, on_complete)) ? S2N_SUCCESS : S2N_FAILURE;
#define S2N_ASYNC_PKEY_SIGN(conn, sig_alg, digest, on_complete) \
- return S2N_RESULT_TO_POSIX(s2n_async_pkey_sign(conn, sig_alg, digest, on_complete));
+ return s2n_result_is_ok(s2n_async_pkey_sign(conn, sig_alg, digest, on_complete)) ? S2N_SUCCESS : S2N_FAILURE;
int s2n_async_pkey_op_perform(struct s2n_async_pkey_op *op, s2n_cert_private_key *key);
int s2n_async_pkey_op_apply(struct s2n_async_pkey_op *op, struct s2n_connection *conn);
int s2n_async_pkey_op_free(struct s2n_async_pkey_op *op);
+int s2n_async_pkey_op_get_op_type(struct s2n_async_pkey_op *op, s2n_async_pkey_op_type *type);
+int s2n_async_pkey_op_get_input_size(struct s2n_async_pkey_op *op, uint32_t *data_len);
+int s2n_async_pkey_op_get_input(struct s2n_async_pkey_op *op, uint8_t *data, uint32_t data_len);
+int s2n_async_pkey_op_set_output(struct s2n_async_pkey_op *op, const uint8_t *data, uint32_t data_len);
+int s2n_async_pkey_op_set_validation_mode(struct s2n_async_pkey_op *op, s2n_async_pkey_validation_mode mode);
+
+S2N_RESULT s2n_async_pkey_verify_signature(struct s2n_connection *conn, s2n_signature_algorithm sig_alg,
+ struct s2n_hash_state *digest, struct s2n_blob *signature);
S2N_RESULT s2n_async_pkey_decrypt(struct s2n_connection *conn, struct s2n_blob *encrypted, struct s2n_blob *init_decrypted,
s2n_async_pkey_decrypt_complete on_complete);
S2N_RESULT s2n_async_pkey_sign(struct s2n_connection *conn, s2n_signature_algorithm sig_alg, struct s2n_hash_state *digest,