mirror of
				https://github.com/cuberite/polarssl.git
				synced 2025-11-03 20:22:59 -05:00 
			
		
		
		
	Update documentation
This commit is contained in:
		
							parent
							
								
									14c2574a9d
								
							
						
					
					
						commit
						3a2a4485d4
					
				@ -1170,6 +1170,11 @@ typedef int mbedtls_ssl_cookie_check_t( void *ctx,
 | 
				
			|||||||
 *                  the MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED that is expected
 | 
					 *                  the MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED that is expected
 | 
				
			||||||
 *                  on the first handshake attempt when this is enabled.
 | 
					 *                  on the first handshake attempt when this is enabled.
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 | 
					 * \note            This is also necessary to handle client reconnection from
 | 
				
			||||||
 | 
					 *                  the same port as described in RFC 6347 section 4.2.8 (only
 | 
				
			||||||
 | 
					 *                  the variant with cookies is supported currently). See
 | 
				
			||||||
 | 
					 *                  comments on \c mbedtls_ssl_read() for details.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 * \param conf              SSL configuration
 | 
					 * \param conf              SSL configuration
 | 
				
			||||||
 * \param f_cookie_write    Cookie write callback
 | 
					 * \param f_cookie_write    Cookie write callback
 | 
				
			||||||
 * \param f_cookie_check    Cookie check callback
 | 
					 * \param f_cookie_check    Cookie check callback
 | 
				
			||||||
@ -2139,7 +2144,23 @@ int mbedtls_ssl_renegotiate( mbedtls_ssl_context *ssl );
 | 
				
			|||||||
 *
 | 
					 *
 | 
				
			||||||
 * \return         the number of bytes read, or
 | 
					 * \return         the number of bytes read, or
 | 
				
			||||||
 *                 0 for EOF, or
 | 
					 *                 0 for EOF, or
 | 
				
			||||||
 *                 a negative error code.
 | 
					 *                 MBEDTLS_ERR_SSL_WANT_READ or MBEDTLS_ERR_SSL_WANT_WRITE, or
 | 
				
			||||||
 | 
					 *                 MBEDTLS_ERR_SSL_CLIENT_RECONNECT (see below), or
 | 
				
			||||||
 | 
					 *                 another negative error code.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \note           When this function return MBEDTLS_ERR_SSL_CLIENT_RECONNECT
 | 
				
			||||||
 | 
					 *                 (which can only happen server-side), it means that a client
 | 
				
			||||||
 | 
					 *                 is initiating a new connection using the same source port.
 | 
				
			||||||
 | 
					 *                 You can either treat that as a connection close and wait
 | 
				
			||||||
 | 
					 *                 for the client to resend a ClientHello, or directly
 | 
				
			||||||
 | 
					 *                 continue with \c mbedtls_ssl_handshake() with the same
 | 
				
			||||||
 | 
					 *                 context (as it has beeen reset internally). Either way, you
 | 
				
			||||||
 | 
					 *                 should make sure this is seen by the application as a new
 | 
				
			||||||
 | 
					 *                 connection: application state, if any, should be reset, and
 | 
				
			||||||
 | 
					 *                 most importantly the identity of the client must be checked
 | 
				
			||||||
 | 
					 *                 again. WARNING: not validating the identity of the client
 | 
				
			||||||
 | 
					 *                 again, or not transmitting the new identity to the
 | 
				
			||||||
 | 
					 *                 application layer, would allow authentication bypass!
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
int mbedtls_ssl_read( mbedtls_ssl_context *ssl, unsigned char *buf, size_t len );
 | 
					int mbedtls_ssl_read( mbedtls_ssl_context *ssl, unsigned char *buf, size_t len );
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
				
			|||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user