diff options
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libtls/tls_init.3 | 26 | 
1 files changed, 25 insertions, 1 deletions
| diff --git a/src/lib/libtls/tls_init.3 b/src/lib/libtls/tls_init.3 index 48974cb326..73234a427d 100644 --- a/src/lib/libtls/tls_init.3 +++ b/src/lib/libtls/tls_init.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: tls_init.3,v 1.9 2015/02/07 06:19:26 jsing Exp $ | 1 | .\" $OpenBSD: tls_init.3,v 1.10 2015/02/07 23:45:06 reyk Exp $ | 
| 2 | .\" | 2 | .\" | 
| 3 | .\" Copyright (c) 2014 Ted Unangst <tedu@openbsd.org> | 3 | .\" Copyright (c) 2014 Ted Unangst <tedu@openbsd.org> | 
| 4 | .\" | 4 | .\" | 
| @@ -38,6 +38,7 @@ | |||
| 38 | .Nm tls_config_insecure_noverifyhost , | 38 | .Nm tls_config_insecure_noverifyhost , | 
| 39 | .Nm tls_config_insecure_noverifycert , | 39 | .Nm tls_config_insecure_noverifycert , | 
| 40 | .Nm tls_config_verify , | 40 | .Nm tls_config_verify , | 
| 41 | .Nm tls_load_file , | ||
| 41 | .Nm tls_client , | 42 | .Nm tls_client , | 
| 42 | .Nm tls_server , | 43 | .Nm tls_server , | 
| 43 | .Nm tls_configure , | 44 | .Nm tls_configure , | 
| @@ -47,6 +48,7 @@ | |||
| 47 | .Nm tls_connect , | 48 | .Nm tls_connect , | 
| 48 | .Nm tls_connect_fds , | 49 | .Nm tls_connect_fds , | 
| 49 | .Nm tls_connect_socket , | 50 | .Nm tls_connect_socket , | 
| 51 | .Nm tls_accept_socket , | ||
| 50 | .Nm tls_read , | 52 | .Nm tls_read , | 
| 51 | .Nm tls_write | 53 | .Nm tls_write | 
| 52 | .Nd TLS client and server API | 54 | .Nd TLS client and server API | 
| @@ -92,6 +94,8 @@ | |||
| 92 | .Fn tls_config_insecure_noverifycert "struct tls_config *config" | 94 | .Fn tls_config_insecure_noverifycert "struct tls_config *config" | 
| 93 | .Ft "void" | 95 | .Ft "void" | 
| 94 | .Fn tls_config_verify "struct tls_config *config" | 96 | .Fn tls_config_verify "struct tls_config *config" | 
| 97 | .Ft "uint8_t *" | ||
| 98 | .Fn tls_load_file "const char *file" "size_t *len" "char *password" | ||
| 95 | .Ft "struct tls *" | 99 | .Ft "struct tls *" | 
| 96 | .Fn tls_client void | 100 | .Fn tls_client void | 
| 97 | .Ft "struct tls *" | 101 | .Ft "struct tls *" | 
| @@ -111,6 +115,8 @@ | |||
| 111 | .Ft "int" | 115 | .Ft "int" | 
| 112 | .Fn tls_connect_socket "struct tls *ctx" "int s" "const char *hostname" | 116 | .Fn tls_connect_socket "struct tls *ctx" "int s" "const char *hostname" | 
| 113 | .Ft "int" | 117 | .Ft "int" | 
| 118 | .Fn tls_accept_socket "struct tls *tls" "struct tls **cctx" "int socket" | ||
| 119 | .Ft "int" | ||
| 114 | .Fn tls_read "struct tls *ctx" "void *buf" "size_t buflen" "size_t *outlen" | 120 | .Fn tls_read "struct tls *ctx" "void *buf" "size_t buflen" "size_t *outlen" | 
| 115 | .Ft "int" | 121 | .Ft "int" | 
| 116 | .Fn tls_write "struct tls *ctx" "const void *buf" "size_t buflen" "size_t *outlen" | 122 | .Fn tls_write "struct tls *ctx" "const void *buf" "size_t buflen" "size_t *outlen" | 
| @@ -159,6 +165,10 @@ Alternatively, a secure connection can be established over a pair of existing | |||
| 159 | file descriptors by calling | 165 | file descriptors by calling | 
| 160 | .Fn tls_connect_fds . | 166 | .Fn tls_connect_fds . | 
| 161 | .Pp | 167 | .Pp | 
| 168 | A server can accept a new client connection by calling | ||
| 169 | .Fn tls_accept_socket | ||
| 170 | on an already established socket connection. | ||
| 171 | .Pp | ||
| 162 | Two functions are provided for input and output, | 172 | Two functions are provided for input and output, | 
| 163 | .Fn tls_read | 173 | .Fn tls_read | 
| 164 | and | 174 | and | 
| @@ -262,6 +272,17 @@ Be extremely careful when using this option. | |||
| 262 | .Fn tls_config_verify | 272 | .Fn tls_config_verify | 
| 263 | reenables hostname and certificate verification. | 273 | reenables hostname and certificate verification. | 
| 264 | .Em (Client) | 274 | .Em (Client) | 
| 275 | .It | ||
| 276 | .Fn tls_load_keys | ||
| 277 | loads a certificate or key from disk into memory to be loaded with | ||
| 278 | .Fn tls_config_set_ca_mem , | ||
| 279 | .Fn tls_config_set_cert_mem | ||
| 280 | or | ||
| 281 | .Fn tls_config_set_key_mem . | ||
| 282 | A private key will be decrypted if the optional | ||
| 283 | .Ar password | ||
| 284 | argument is specified. | ||
| 285 | .Em (Client and server) | ||
| 265 | .El | 286 | .El | 
| 266 | .Pp | 287 | .Pp | 
| 267 | The following functions create, prepare, and free a connection context. | 288 | The following functions create, prepare, and free a connection context. | 
| @@ -306,6 +327,9 @@ connects a client context to a pair of existing file descriptors. | |||
| 306 | .Fn tls_connect_socket | 327 | .Fn tls_connect_socket | 
| 307 | connects a client context to an already established socket connection. | 328 | connects a client context to an already established socket connection. | 
| 308 | .It | 329 | .It | 
| 330 | .Fn tls_accept_socket | ||
| 331 | accepts a client context on an already established socket connection. | ||
| 332 | .It | ||
| 309 | .Fn tls_read | 333 | .Fn tls_read | 
| 310 | reads | 334 | reads | 
| 311 | .Fa buflen | 335 | .Fa buflen | 
