Files
openssl/test/radix/quic_bindings.c
Bob Beck 2fab90bb5e 4.0-POST-CLANG-FORMAT-WEBKIT
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/29242)
2025-12-09 00:28:19 -07:00

846 lines
21 KiB
C

/*
* Copyright 2024-2025 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the Apache License 2.0 (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
* in the file LICENSE in the source distribution or at
* https://www.openssl.org/source/license.html
*/
#include <openssl/lhash.h>
#include <assert.h>
#include "internal/quic_engine.h"
#include "internal/quic_channel.h"
#include "internal/quic_ssl.h"
#include "internal/quic_error.h"
/*
* RADIX 6D QUIC Test Framework
* =============================================================================
*
* The radix test framework is a six-dimension script-driven facility to support
* execution of
*
* multi-stream
* multi-client
* multi-server
* multi-thread
* multi-process
* multi-node
*
* test vignettes for QUIC. Unlike the older multistream test framework, it does
* not assume a single client and a single server. Examples of vignettes
* designed to be supported by the radix test framework in future include:
*
* single client <-> single server
* multiple clients <-> single server
* single client <-> multiple servers
* multiple clients <-> multiple servers
*
* 'Multi-process' and 'multi-node' means there has been some consideration
* given to support of multi-process and multi-node testing in the future,
* though this is not currently supported.
*/
/*
* An object is something associated with a name in the process-level state. The
* process-level state primarily revolves around a global dictionary of SSL
* objects.
*/
typedef struct radix_obj_st {
char *name; /* owned, zero-terminated */
SSL *ssl; /* owns one reference */
unsigned int registered : 1; /* in LHASH? */
unsigned int active : 1; /* tick? */
} RADIX_OBJ;
DEFINE_LHASH_OF_EX(RADIX_OBJ);
/* Process-level state (i.e. "globals" in the normal sense of the word) */
typedef struct radix_process_st {
size_t node_idx;
size_t process_idx;
size_t next_thread_idx;
STACK_OF(RADIX_THREAD) *threads;
/* Process-global state. */
CRYPTO_MUTEX *gm; /* global mutex */
LHASH_OF(RADIX_OBJ) *objs; /* protected by gm */
OSSL_TIME time_slip; /* protected by gm */
BIO *keylog_out; /* protected by gm */
int done_join_all_threads;
/*
* Valid if done_join_all threads. Logical AND of all child worker results.
*/
int thread_composite_testresult;
} RADIX_PROCESS;
#define NUM_SLOTS 8
/* Thread-level state within a process */
typedef struct radix_thread_st {
RADIX_PROCESS *rp;
CRYPTO_THREAD *t;
unsigned char *tmp_buf;
size_t tmp_buf_offset;
size_t thread_idx; /* 0=main thread */
RADIX_OBJ *slot[NUM_SLOTS];
SSL *ssl[NUM_SLOTS];
/* child thread spawn arguments */
SCRIPT_INFO *child_script_info;
BIO *debug_bio;
/* m protects all of the below values */
CRYPTO_MUTEX *m;
int done;
int testresult; /* valid if done */
uint64_t scratch0;
} RADIX_THREAD;
DEFINE_STACK_OF(RADIX_THREAD)
/* ssl reference is transferred. name is copied and is required. */
static RADIX_OBJ *RADIX_OBJ_new(const char *name, SSL *ssl)
{
RADIX_OBJ *obj;
if (!TEST_ptr(name) || !TEST_ptr(ssl))
return NULL;
if (!TEST_ptr(obj = OPENSSL_zalloc(sizeof(*obj))))
return NULL;
if (!TEST_ptr(obj->name = OPENSSL_strdup(name))) {
OPENSSL_free(obj);
return NULL;
}
obj->ssl = ssl;
return obj;
}
static void RADIX_OBJ_free(RADIX_OBJ *obj)
{
if (obj == NULL)
return;
assert(!obj->registered);
SSL_free(obj->ssl);
OPENSSL_free(obj->name);
OPENSSL_free(obj);
}
static unsigned long RADIX_OBJ_hash(const RADIX_OBJ *obj)
{
return OPENSSL_LH_strhash(obj->name);
}
static int RADIX_OBJ_cmp(const RADIX_OBJ *a, const RADIX_OBJ *b)
{
return strcmp(a->name, b->name);
}
static int RADIX_PROCESS_init(RADIX_PROCESS *rp, size_t node_idx, size_t process_idx)
{
const char *keylog_path;
#if defined(OPENSSL_THREADS)
if (!TEST_ptr(rp->gm = ossl_crypto_mutex_new()))
goto err;
#endif
if (!TEST_ptr(rp->objs = lh_RADIX_OBJ_new(RADIX_OBJ_hash, RADIX_OBJ_cmp)))
goto err;
if (!TEST_ptr(rp->threads = sk_RADIX_THREAD_new(NULL)))
goto err;
rp->keylog_out = NULL;
keylog_path = ossl_safe_getenv("SSLKEYLOGFILE");
if (keylog_path != NULL && *keylog_path != '\0'
&& !TEST_ptr(rp->keylog_out = BIO_new_file(keylog_path, "a")))
goto err;
rp->node_idx = node_idx;
rp->process_idx = process_idx;
rp->done_join_all_threads = 0;
rp->next_thread_idx = 0;
return 1;
err:
lh_RADIX_OBJ_free(rp->objs);
rp->objs = NULL;
ossl_crypto_mutex_free(&rp->gm);
return 0;
}
static const char *stream_state_to_str(int state)
{
switch (state) {
case SSL_STREAM_STATE_NONE:
return "none";
case SSL_STREAM_STATE_OK:
return "OK";
case SSL_STREAM_STATE_WRONG_DIR:
return "wrong-dir";
case SSL_STREAM_STATE_FINISHED:
return "finished";
case SSL_STREAM_STATE_RESET_LOCAL:
return "reset-local";
case SSL_STREAM_STATE_RESET_REMOTE:
return "reset-remote";
case SSL_STREAM_STATE_CONN_CLOSED:
return "conn-closed";
default:
return "?";
}
}
static void report_ssl_state(BIO *bio, const char *pfx, int is_write,
int state, uint64_t ec)
{
const char *state_s = stream_state_to_str(state);
BIO_printf(bio, "%s%-15s%s(%d)", pfx, is_write ? "Write state: " : "Read state: ",
state_s, state);
if (ec != UINT64_MAX)
BIO_printf(bio, ", %llu", (unsigned long long)ec);
BIO_printf(bio, "\n");
}
static void report_ssl(SSL *ssl, BIO *bio, const char *pfx)
{
const char *type = "SSL";
int is_quic = SSL_is_quic(ssl), is_conn = 0, is_listener = 0;
SSL_CONN_CLOSE_INFO cc_info = { 0 };
const char *e_str, *f_str;
if (is_quic) {
is_conn = SSL_is_connection(ssl);
is_listener = SSL_is_listener(ssl);
if (is_listener)
type = "QLSO";
else if (is_conn)
type = "QCSO";
else
type = "QSSO";
}
BIO_printf(bio, "%sType: %s\n", pfx, type);
if (is_quic && is_conn
&& SSL_get_conn_close_info(ssl, &cc_info, sizeof(cc_info))) {
e_str = ossl_quic_err_to_string(cc_info.error_code);
f_str = ossl_quic_frame_type_to_string(cc_info.frame_type);
if (e_str == NULL)
e_str = "?";
if (f_str == NULL)
f_str = "?";
BIO_printf(bio, "%sConnection is closed: %s(%llu)/%s(%llu), "
"%s, %s, reason: \"%s\"\n",
pfx,
e_str,
(unsigned long long)cc_info.error_code,
f_str,
(unsigned long long)cc_info.frame_type,
(cc_info.flags & SSL_CONN_CLOSE_FLAG_LOCAL) != 0
? "local"
: "remote",
(cc_info.flags & SSL_CONN_CLOSE_FLAG_TRANSPORT) != 0
? "transport"
: "app",
cc_info.reason != NULL ? cc_info.reason : "-");
}
if (is_quic && !is_listener) {
uint64_t stream_id = SSL_get_stream_id(ssl), rec, wec;
int rstate, wstate;
if (stream_id != UINT64_MAX)
BIO_printf(bio, "%sStream ID: %llu\n", pfx,
(unsigned long long)stream_id);
rstate = SSL_get_stream_read_state(ssl);
wstate = SSL_get_stream_write_state(ssl);
if (SSL_get_stream_read_error_code(ssl, &rec) != 1)
rec = UINT64_MAX;
if (SSL_get_stream_write_error_code(ssl, &wec) != 1)
wec = UINT64_MAX;
report_ssl_state(bio, pfx, 0, rstate, rec);
report_ssl_state(bio, pfx, 1, wstate, wec);
}
}
static void report_obj(RADIX_OBJ *obj, void *arg)
{
BIO *bio = arg;
SSL *ssl = obj->ssl;
BIO_printf(bio, " - %-16s @ %p\n", obj->name, (void *)obj->ssl);
ERR_set_mark();
report_ssl(ssl, bio, " ");
ERR_pop_to_mark();
}
static void RADIX_THREAD_report_state(RADIX_THREAD *rt, BIO *bio)
{
size_t i;
BIO_printf(bio, " Slots:\n");
for (i = 0; i < NUM_SLOTS; ++i)
if (rt->slot[i] == NULL)
BIO_printf(bio, " %3zu) <NULL>\n", i);
else
BIO_printf(bio, " %3zu) '%s' (SSL: %p)\n", i,
rt->slot[i]->name,
(void *)rt->ssl[i]);
}
static void RADIX_PROCESS_report_state(RADIX_PROCESS *rp, BIO *bio,
int verbose)
{
BIO_printf(bio, "Final process state for node %zu, process %zu:\n",
rp->node_idx, rp->process_idx);
BIO_printf(bio, " Threads (incl. main): %zu\n",
rp->next_thread_idx);
BIO_printf(bio, " Time slip: %llu ms\n",
(unsigned long long)ossl_time2ms(rp->time_slip));
BIO_printf(bio, " Objects:\n");
lh_RADIX_OBJ_doall_arg(rp->objs, report_obj, bio);
if (verbose)
RADIX_THREAD_report_state(sk_RADIX_THREAD_value(rp->threads, 0),
bio_err);
BIO_printf(bio, "\n==========================================="
"===========================\n");
}
static void RADIX_PROCESS_report_thread_results(RADIX_PROCESS *rp, BIO *bio)
{
int i;
RADIX_THREAD *rt;
char *p;
long l;
char pfx_buf[64];
int rt_testresult;
for (i = 1; i < sk_RADIX_THREAD_num(rp->threads); ++i) {
rt = sk_RADIX_THREAD_value(rp->threads, i);
ossl_crypto_mutex_lock(rt->m);
assert(rt->done);
rt_testresult = rt->testresult;
ossl_crypto_mutex_unlock(rt->m);
BIO_printf(bio, "\n====(n%zu/p%zu/t%zu)============================"
"===========================\n"
"Result for child thread with index %zu:\n",
rp->node_idx, rp->process_idx, rt->thread_idx, rt->thread_idx);
BIO_snprintf(pfx_buf, sizeof(pfx_buf), "# -T-%2zu:\t# ", rt->thread_idx);
BIO_set_prefix(bio_err, pfx_buf);
l = BIO_get_mem_data(rt->debug_bio, &p);
BIO_write(bio, p, l);
BIO_printf(bio, "\n");
BIO_set_prefix(bio_err, "# ");
BIO_printf(bio, "==> Child thread with index %zu exited with %d\n",
rt->thread_idx, rt_testresult);
if (!rt_testresult)
RADIX_THREAD_report_state(rt, bio);
}
BIO_printf(bio, "\n==========================================="
"===========================\n");
}
static int RADIX_THREAD_join(RADIX_THREAD *rt);
static int RADIX_PROCESS_join_all_threads(RADIX_PROCESS *rp, int *testresult)
{
int ok = 1;
int i;
RADIX_THREAD *rt;
int composite_testresult = 1;
if (rp->done_join_all_threads) {
*testresult = rp->thread_composite_testresult;
return 1;
}
for (i = 1; i < sk_RADIX_THREAD_num(rp->threads); ++i) {
rt = sk_RADIX_THREAD_value(rp->threads, i);
BIO_printf(bio_err, "==> Joining thread %d\n", i);
if (!TEST_true(RADIX_THREAD_join(rt)))
ok = 0;
if (!rt->testresult)
composite_testresult = 0;
}
rp->thread_composite_testresult = composite_testresult;
*testresult = composite_testresult;
rp->done_join_all_threads = 1;
RADIX_PROCESS_report_thread_results(rp, bio_err);
return ok;
}
static void cleanup_one(RADIX_OBJ *obj)
{
obj->registered = 0;
RADIX_OBJ_free(obj);
}
static void RADIX_THREAD_free(RADIX_THREAD *rt);
static void RADIX_PROCESS_cleanup(RADIX_PROCESS *rp)
{
int i;
assert(rp->done_join_all_threads);
for (i = 0; i < sk_RADIX_THREAD_num(rp->threads); ++i)
RADIX_THREAD_free(sk_RADIX_THREAD_value(rp->threads, i));
sk_RADIX_THREAD_free(rp->threads);
rp->threads = NULL;
lh_RADIX_OBJ_doall(rp->objs, cleanup_one);
lh_RADIX_OBJ_free(rp->objs);
rp->objs = NULL;
BIO_free_all(rp->keylog_out);
rp->keylog_out = NULL;
ossl_crypto_mutex_free(&rp->gm);
}
static RADIX_OBJ *RADIX_PROCESS_get_obj(RADIX_PROCESS *rp, const char *name)
{
RADIX_OBJ key;
key.name = (char *)name;
return lh_RADIX_OBJ_retrieve(rp->objs, &key);
}
static int RADIX_PROCESS_set_obj(RADIX_PROCESS *rp,
const char *name, RADIX_OBJ *obj)
{
RADIX_OBJ *existing;
if (obj != NULL && !TEST_false(obj->registered))
return 0;
existing = RADIX_PROCESS_get_obj(rp, name);
if (existing != NULL && obj != existing) {
if (!TEST_true(existing->registered))
return 0;
lh_RADIX_OBJ_delete(rp->objs, existing);
existing->registered = 0;
RADIX_OBJ_free(existing);
}
if (obj != NULL) {
lh_RADIX_OBJ_insert(rp->objs, obj);
obj->registered = 1;
}
return 1;
}
static int RADIX_PROCESS_set_ssl(RADIX_PROCESS *rp, const char *name, SSL *ssl)
{
RADIX_OBJ *obj;
if (!TEST_ptr(obj = RADIX_OBJ_new(name, ssl)))
return 0;
if (!TEST_true(RADIX_PROCESS_set_obj(rp, name, obj))) {
RADIX_OBJ_free(obj);
return 0;
}
return 1;
}
static SSL *RADIX_PROCESS_get_ssl(RADIX_PROCESS *rp, const char *name)
{
RADIX_OBJ *obj = RADIX_PROCESS_get_obj(rp, name);
if (obj == NULL)
return NULL;
return obj->ssl;
}
static RADIX_THREAD *RADIX_THREAD_new(RADIX_PROCESS *rp)
{
RADIX_THREAD *rt;
if (!TEST_ptr(rp)
|| !TEST_ptr(rt = OPENSSL_zalloc(sizeof(*rt))))
return 0;
rt->rp = rp;
#if defined(OPENSSL_THREADS)
if (!TEST_ptr(rt->m = ossl_crypto_mutex_new())) {
OPENSSL_free(rt);
return 0;
}
#endif
if (!TEST_true(sk_RADIX_THREAD_push(rp->threads, rt))) {
OPENSSL_free(rt);
return 0;
}
rt->thread_idx = rp->next_thread_idx++;
assert(rt->thread_idx + 1 == (size_t)sk_RADIX_THREAD_num(rp->threads));
return rt;
}
static void RADIX_THREAD_free(RADIX_THREAD *rt)
{
if (rt == NULL)
return;
assert(rt->t == NULL);
BIO_free_all(rt->debug_bio);
OPENSSL_free(rt->tmp_buf);
ossl_crypto_mutex_free(&rt->m);
OPENSSL_free(rt);
}
static int RADIX_THREAD_join(RADIX_THREAD *rt)
{
CRYPTO_THREAD_RETVAL rv;
if (rt->t != NULL)
ossl_crypto_thread_native_join(rt->t, &rv);
ossl_crypto_thread_native_clean(rt->t);
rt->t = NULL;
if (!TEST_true(rt->done))
return 0;
return 1;
}
static RADIX_PROCESS radix_process;
static CRYPTO_THREAD_LOCAL radix_thread;
static void radix_thread_cleanup_tl(void *p)
{
/* Should already have been cleaned up. */
if (!TEST_ptr_null(p))
abort();
}
static RADIX_THREAD *radix_get_thread(void)
{
return CRYPTO_THREAD_get_local(&radix_thread);
}
static int radix_thread_init(RADIX_THREAD *rt)
{
if (!TEST_ptr(rt)
|| !TEST_ptr_null(CRYPTO_THREAD_get_local(&radix_thread)))
return 0;
if (!TEST_true(CRYPTO_THREAD_set_local(&radix_thread, rt)))
return 0;
set_override_bio_out(rt->debug_bio);
set_override_bio_err(rt->debug_bio);
return 1;
}
static void radix_thread_cleanup(void)
{
RADIX_THREAD *rt = radix_get_thread();
if (!TEST_ptr(rt))
return;
if (!TEST_true(CRYPTO_THREAD_set_local(&radix_thread, NULL)))
return;
}
static int bindings_process_init(size_t node_idx, size_t process_idx)
{
RADIX_THREAD *rt;
if (!TEST_true(RADIX_PROCESS_init(&radix_process, node_idx, process_idx)))
return 0;
if (!TEST_true(CRYPTO_THREAD_init_local(&radix_thread,
radix_thread_cleanup_tl)))
return 0;
if (!TEST_ptr(rt = RADIX_THREAD_new(&radix_process)))
return 0;
/* Allocate structures for main thread. */
return radix_thread_init(rt);
}
static int bindings_process_finish(int testresult_main)
{
int testresult, testresult_child;
if (!TEST_true(RADIX_PROCESS_join_all_threads(&radix_process,
&testresult_child)))
return 0;
testresult = testresult_main && testresult_child;
RADIX_PROCESS_report_state(&radix_process, bio_err,
/*verbose=*/!testresult);
radix_thread_cleanup(); /* cleanup main thread */
RADIX_PROCESS_cleanup(&radix_process);
if (testresult)
BIO_printf(bio_err, "==> OK\n\n");
else
BIO_printf(bio_err, "==> ERROR (main=%d, children=%d)\n\n",
testresult_main, testresult_child);
return testresult;
}
#define RP() (&radix_process)
#define RT() (radix_get_thread())
static OSSL_TIME get_time(void *arg)
{
OSSL_TIME time_slip;
ossl_crypto_mutex_lock(RP()->gm);
time_slip = RP()->time_slip;
ossl_crypto_mutex_unlock(RP()->gm);
return ossl_time_add(ossl_time_now(), time_slip);
}
ossl_unused static void radix_skip_time(OSSL_TIME t)
{
ossl_crypto_mutex_lock(RP()->gm);
RP()->time_slip = ossl_time_add(RP()->time_slip, t);
ossl_crypto_mutex_unlock(RP()->gm);
}
static void per_op_tick_obj(RADIX_OBJ *obj)
{
if (obj->active)
SSL_handle_events(obj->ssl);
}
static int do_per_op(TERP *terp, void *arg)
{
lh_RADIX_OBJ_doall(RP()->objs, per_op_tick_obj);
return 1;
}
static int bindings_adjust_terp_config(TERP_CONFIG *cfg)
{
cfg->now_cb = get_time;
cfg->per_op_cb = do_per_op;
return 1;
}
static int expect_slot_ssl(FUNC_CTX *fctx, size_t idx, SSL **p_ssl)
{
if (!TEST_size_t_lt(idx, NUM_SLOTS)
|| !TEST_ptr(*p_ssl = RT()->ssl[idx]))
return 0;
return 1;
}
#define REQUIRE_SSL_N(idx, ssl) \
do { \
(ssl) = NULL; /* quiet uninitialized warnings */ \
if (!TEST_true(expect_slot_ssl(fctx, (idx), &(ssl)))) \
goto err; \
} while (0)
#define REQUIRE_SSL(ssl) REQUIRE_SSL_N(0, (ssl))
#define REQUIRE_SSL_2(a, b) \
do { \
REQUIRE_SSL_N(0, (a)); \
REQUIRE_SSL_N(1, (b)); \
} while (0)
#define REQUIRE_SSL_3(a, b, c) \
do { \
REQUIRE_SSL_N(0, (a)); \
REQUIRE_SSL_N(1, (b)); \
REQUIRE_SSL_N(2, (c)); \
} while (0)
#define REQUIRE_SSL_4(a, b, c, d) \
do { \
REQUIRE_SSL_N(0, (a)); \
REQUIRE_SSL_N(1, (b)); \
REQUIRE_SSL_N(2, (c)); \
REQUIRE_SSL_N(3, (d)); \
} while (0)
#define REQUIRE_SSL_5(a, b, c, d, e) \
do { \
REQUIRE_SSL_N(0, (a)); \
REQUIRE_SSL_N(1, (b)); \
REQUIRE_SSL_N(2, (c)); \
REQUIRE_SSL_N(3, (d)); \
REQUIRE_SSL_N(4, (e)); \
} while (0)
#define C_BIDI_ID(ordinal) \
(((ordinal) << 2) | QUIC_STREAM_INITIATOR_CLIENT | QUIC_STREAM_DIR_BIDI)
#define S_BIDI_ID(ordinal) \
(((ordinal) << 2) | QUIC_STREAM_INITIATOR_SERVER | QUIC_STREAM_DIR_BIDI)
#define C_UNI_ID(ordinal) \
(((ordinal) << 2) | QUIC_STREAM_INITIATOR_CLIENT | QUIC_STREAM_DIR_UNI)
#define S_UNI_ID(ordinal) \
(((ordinal) << 2) | QUIC_STREAM_INITIATOR_SERVER | QUIC_STREAM_DIR_UNI)
#if defined(OPENSSL_THREADS)
static int RADIX_THREAD_worker_run(RADIX_THREAD *rt)
{
int ok = 0;
TERP_CONFIG cfg = { 0 };
cfg.debug_bio = rt->debug_bio;
if (!TEST_true(bindings_adjust_terp_config(&cfg)))
goto err;
if (!TERP_run(rt->child_script_info, &cfg))
goto err;
ok = 1;
err:
return ok;
}
static unsigned int RADIX_THREAD_worker_main(void *p)
{
int testresult = 0;
RADIX_THREAD *rt = p;
if (!TEST_true(radix_thread_init(rt)))
return 0;
/* Wait until thread-specific init is done (e.g. setting rt->t) */
ossl_crypto_mutex_lock(rt->m);
ossl_crypto_mutex_unlock(rt->m);
testresult = RADIX_THREAD_worker_run(rt);
ossl_crypto_mutex_lock(rt->m);
rt->testresult = testresult;
rt->done = 1;
ossl_crypto_mutex_unlock(rt->m);
radix_thread_cleanup();
return 1;
}
#endif
static void radix_activate_obj(RADIX_OBJ *obj)
{
if (obj != NULL)
obj->active = 1;
}
static void radix_activate_slot(size_t idx)
{
if (idx >= NUM_SLOTS)
return;
radix_activate_obj(RT()->slot[idx]);
}
DEF_FUNC(hf_spawn_thread)
{
int ok = 0;
RADIX_THREAD *child_rt = NULL;
SCRIPT_INFO *script_info = NULL;
F_POP(script_info);
if (!TEST_ptr(script_info))
goto err;
#if !defined(OPENSSL_THREADS)
TEST_skip("threading not supported, skipping");
F_SKIP_REST();
#else
if (!TEST_ptr(child_rt = RADIX_THREAD_new(&radix_process)))
return 0;
if (!TEST_ptr(child_rt->debug_bio = BIO_new(BIO_s_mem())))
goto err;
child_rt->child_script_info = script_info;
ossl_crypto_mutex_lock(child_rt->m);
if (!TEST_ptr(child_rt->t = ossl_crypto_thread_native_start(RADIX_THREAD_worker_main,
child_rt, 1))) {
ossl_crypto_mutex_unlock(child_rt->m);
goto err;
}
ossl_crypto_mutex_unlock(child_rt->m);
ok = 1;
#endif
err:
if (!ok)
RADIX_THREAD_free(child_rt);
return ok;
}
DEF_FUNC(hf_clear)
{
RADIX_THREAD *rt = RT();
size_t i;
ossl_crypto_mutex_lock(RP()->gm);
lh_RADIX_OBJ_doall(RP()->objs, cleanup_one);
lh_RADIX_OBJ_flush(RP()->objs);
for (i = 0; i < NUM_SLOTS; ++i) {
rt->slot[i] = NULL;
rt->ssl[i] = NULL;
}
ossl_crypto_mutex_unlock(RP()->gm);
return 1;
}
#define OP_SPAWN_THREAD(script_name) \
(OP_PUSH_P(SCRIPT(script_name)), OP_FUNC(hf_spawn_thread))
#define OP_CLEAR() \
(OP_FUNC(hf_clear))