.. _internals: Internals ========= We ran into three main problems developing this: Exceptions, callbacks and accessing socket methods. This is what this chapter is about. .. _exceptions: Exceptions ---------- We realized early that most of the exceptions would be raised by the I/O functions of OpenSSL, so it felt natural to mimic OpenSSL's error code system, translating them into Python exceptions. This naturally gives us the exceptions :py:exc:`.SSL.ZeroReturnError`, :py:exc:`.SSL.WantReadError`, :py:exc:`.SSL.WantWriteError`, :py:exc:`.SSL.WantX509LookupError` and :py:exc:`.SSL.SysCallError`. For more information about this, see section :ref:`openssl-ssl`. .. _callbacks: Callbacks --------- There are a number of problems with callbacks. First of all, OpenSSL is written as a C library, it's not meant to have Python callbacks, so a way around that is needed. Another problem is thread support. A lot of the OpenSSL I/O functions can block if the socket is in blocking mode, and then you want other Python threads to be able to do other things. The real trouble is if you've released the global CPython interpreter lock to do a potentially blocking operation, and the operation calls a callback. Then we must take the GIL back, since calling Python APIs without holding it is not allowed. There are two solutions to the first problem, both of which are necessary. The first solution to use is if the C callback allows ''userdata'' to be passed to it (an arbitrary pointer normally). This is great! We can set our Python function object as the real userdata and emulate userdata for the Python function in another way. The other solution can be used if an object with an ''app_data'' system always is passed to the callback. For example, the SSL object in OpenSSL has app_data functions and in e.g. the verification callbacks, you can retrieve the related SSL object. What we do is to set our wrapper :py:class:`.Connection` object as app_data for the SSL object, and we can easily find the Python callback. The other problem is solved using thread local variables. Whenever the GIL is released before calling into an OpenSSL API, the PyThreadState pointer returned by :c:func:`PyEval_SaveState` is stored in a global thread local variable (using Python's own TLS API, :c:func:`PyThread_set_key_value`). When it is necessary to re-acquire the GIL, either after the OpenSSL API returns or in a C callback invoked by that OpenSSL API, the value of the thread local variable is retrieved (:c:func:`PyThread_get_key_value`) and used to re-acquire the GIL. This allows Python threads to execute while OpenSSL APIs are running and allows use of any particular pyOpenSSL object from any Python thread, since there is no per-thread state associated with any of these objects and since OpenSSL is threadsafe (as long as properly initialized, as pyOpenSSL initializes it). .. _socket-methods: Accessing Socket Methods ------------------------ We quickly saw the benefit of wrapping socket methods in the :py:class:`.SSL.Connection` class, for an easy transition into using SSL. The problem here is that the :py:mod:`socket` module lacks a C API, and all the methods are declared static. One approach would be to have :py:mod:`.OpenSSL` as a submodule to the :py:mod:`socket` module, placing all the code in ``socketmodule.c``, but this is obviously not a good solution, since you might not want to import tonnes of extra stuff you're not going to use when importing the :py:mod:`socket` module. The other approach is to somehow get a pointer to the method to be called, either the C function, or a callable Python object. This is not really a good solution either, since there's a lot of lookups involved. The way it works is that you have to supply a :py:class:`socket`- **like** transport object to the :py:class:`.SSL.Connection`. The only requirement of this object is that it has a :py:meth:`fileno()` method that returns a file descriptor that's valid at the C level (i.e. you can use the system calls read and write). If you want to use the :py:meth:`connect()` or :py:meth:`accept()` methods of the :py:class:`.SSL.Connection` object, the transport object has to supply such methods too. Apart from them, any method lookups in the :py:class:`.SSL.Connection` object that fail are passed on to the underlying transport object. Future changes might be to allow Python-level transport objects, that instead of having :py:meth:`fileno()` methods, have :py:meth:`read()` and :py:meth:`write()` methods, so more advanced features of Python can be used. This would probably entail some sort of OpenSSL **BIOs**, but converting Python strings back and forth is expensive, so this shouldn't be used unless necessary. Other nice things would be to be able to pass in different transport objects for reading and writing, but then the :py:meth:`fileno()` method of :py:class:`.SSL.Connection` becomes virtually useless. Also, should the method resolution be used on the read-transport or the write-transport?