static ssize_t pn_output_write_sasl(pn_transport_t* transport, unsigned int layer, char* bytes, size_t available) { pni_sasl_t *sasl = transport->sasl; // this accounts for when pn_do_error is invoked, e.g. by idle timeout if (transport->close_sent) return PN_EOS; pni_sasl_start_server_if_needed(transport); pni_post_sasl_frame(transport); if (transport->available != 0 || !pni_sasl_is_final_output_state(sasl)) { return pn_dispatcher_output(transport, bytes, available); } // We only get here if there is nothing to output and we're a final output state if (sasl->outcome != PN_SASL_OK && pni_sasl_is_final_input_state(sasl)) { return PN_EOS; } // We know that auth succeeded or we're not in final input state if (pni_sasl_impl_can_encrypt(transport)) { sasl->max_encrypt_size = pni_sasl_impl_max_encrypt_size(transport); if (transport->trace & PN_TRACE_DRV) pn_transport_logf(transport, "SASL Encryption enabled: buffer=%d", sasl->max_encrypt_size); transport->io_layers[layer] = &sasl_encrypt_layer; } else if (sasl->client) { return pni_passthru_layer.process_output(transport, layer, bytes, available ); } else { transport->io_layers[layer] = &pni_passthru_layer; } return transport->io_layers[layer]->process_output(transport, layer, bytes, available); }
ssize_t pn_sasl_output(pn_sasl_t *sasl, char *bytes, size_t size) { pn_sasl_process(sasl); if (sasl->disp->available == 0 && sasl->sent_done) { if (pn_sasl_state(sasl) == PN_SASL_PASS) { return PN_EOS; } else { // XXX: should probably do something better here return PN_ERR; } } else { return pn_dispatcher_output(sasl->disp, bytes, size); } }