@@ -85,7 +85,7 @@ int _mbedtls_ssl_send(void *ctx, const byte *buf, size_t len) {
85
85
86
86
int out_sz = sock_stream -> write (sock , buf , len , & err );
87
87
if (out_sz == MP_STREAM_ERROR ) {
88
- if (mp_is_nonblocking_error (err )) {
88
+ if (mp_is_nonblocking_error (err )) {
89
89
return MBEDTLS_ERR_SSL_WANT_WRITE ;
90
90
}
91
91
return - err ;
@@ -101,28 +101,15 @@ int _mbedtls_ssl_recv(void *ctx, byte *buf, size_t len) {
101
101
int err ;
102
102
int out_sz = sock_stream -> read (sock , buf , len , & err );
103
103
if (out_sz == MP_STREAM_ERROR ) {
104
- if (mp_is_nonblocking_error (err )) {
104
+ if (mp_is_nonblocking_error (err )) {
105
105
return MBEDTLS_ERR_SSL_WANT_READ ;
106
106
}
107
107
return - err ;
108
108
}
109
109
return out_sz ;
110
110
}
111
111
112
- STATIC mp_obj_t socket_setblocking (mp_obj_t self_in , mp_obj_t flag_in ) {
113
- mp_obj_ssl_socket_t * o = MP_OBJ_TO_PTR (self_in );
114
- mp_obj_t sock = o -> sock ;
115
- mp_obj_t dest [3 ];
116
-
117
- mp_load_method_maybe (sock , MP_QSTR_setblocking , dest );
118
- if (dest [0 ] == MP_OBJ_NULL || dest [1 ] == MP_OBJ_NULL ) {
119
- mp_raise_msg (& mp_type_RuntimeError , "wrapped socket must implement setblocking()" );
120
- }
121
112
122
- dest [2 ] = flag_in ;
123
- return mp_call_method_n_kw (1 , 0 , dest );
124
- }
125
- STATIC MP_DEFINE_CONST_FUN_OBJ_2 (socket_setblocking_obj , socket_setblocking );
126
113
127
114
STATIC mp_obj_ssl_socket_t * socket_new (mp_obj_t sock , struct ssl_args * args ) {
128
115
mp_obj_ssl_socket_t * o = m_new_obj (mp_obj_ssl_socket_t );
@@ -147,9 +134,9 @@ STATIC mp_obj_ssl_socket_t *socket_new(mp_obj_t sock, struct ssl_args *args) {
147
134
}
148
135
149
136
ret = mbedtls_ssl_config_defaults (& o -> conf ,
150
- MBEDTLS_SSL_IS_CLIENT ,
151
- MBEDTLS_SSL_TRANSPORT_STREAM ,
152
- MBEDTLS_SSL_PRESET_DEFAULT );
137
+ MBEDTLS_SSL_IS_CLIENT ,
138
+ MBEDTLS_SSL_TRANSPORT_STREAM ,
139
+ MBEDTLS_SSL_PRESET_DEFAULT );
153
140
if (ret != 0 ) {
154
141
assert (0 );
155
142
}
@@ -223,7 +210,7 @@ STATIC mp_uint_t socket_read(mp_obj_t o_in, void *buf, mp_uint_t size, int *errc
223
210
return 0 ;
224
211
}
225
212
226
- if (ret == MBEDTLS_ERR_SSL_WANT_READ ) {
213
+ if (ret == MBEDTLS_ERR_SSL_WANT_READ ) {
227
214
* errcode = EWOULDBLOCK ;
228
215
return 0 ;
229
216
}
@@ -243,7 +230,7 @@ STATIC mp_uint_t socket_write(mp_obj_t o_in, const void *buf, mp_uint_t size, in
243
230
return ret ;
244
231
}
245
232
246
- if (ret == MBEDTLS_ERR_SSL_WANT_WRITE ) {
233
+ if (ret == MBEDTLS_ERR_SSL_WANT_WRITE ) {
247
234
* errcode = EWOULDBLOCK ;
248
235
return 0 ;
249
236
}
@@ -252,6 +239,20 @@ STATIC mp_uint_t socket_write(mp_obj_t o_in, const void *buf, mp_uint_t size, in
252
239
return MP_STREAM_ERROR ;
253
240
}
254
241
242
+ STATIC mp_obj_t socket_setblocking (mp_obj_t self_in , mp_obj_t flag_in ) {
243
+ mp_obj_ssl_socket_t * o = MP_OBJ_TO_PTR (self_in );
244
+ mp_obj_t sock = o -> sock ;
245
+ mp_obj_t dest [3 ];
246
+
247
+ mp_load_method_maybe (sock , MP_QSTR_setblocking , dest );
248
+ if (dest [0 ] == MP_OBJ_NULL || dest [1 ] == MP_OBJ_NULL ) {
249
+ mp_raise_msg (& mp_type_RuntimeError , "wrapped socket must implement setblocking()" );
250
+ }
251
+
252
+ dest [2 ] = flag_in ;
253
+ return mp_call_method_n_kw (1 , 0 , dest );
254
+ }
255
+ STATIC MP_DEFINE_CONST_FUN_OBJ_2 (socket_setblocking_obj , socket_setblocking );
255
256
256
257
STATIC mp_obj_t socket_close (mp_obj_t self_in ) {
257
258
mp_obj_ssl_socket_t * self = MP_OBJ_TO_PTR (self_in );
@@ -309,7 +310,7 @@ STATIC mp_obj_t mod_ssl_wrap_socket(size_t n_args, const mp_obj_t *pos_args, mp_
309
310
310
311
struct ssl_args args ;
311
312
mp_arg_parse_all (n_args - 1 , pos_args + 1 , kw_args ,
312
- MP_ARRAY_SIZE (allowed_args ), allowed_args , (mp_arg_val_t * )& args );
313
+ MP_ARRAY_SIZE (allowed_args ), allowed_args , (mp_arg_val_t * )& args );
313
314
314
315
return MP_OBJ_FROM_PTR (socket_new (sock , & args ));
315
316
}
0 commit comments