/*! \brief This function is the receive embedded callback. \return Success This function returns the number of bytes read. \return WOLFSSL_CBIO_ERR_WANT_READ returned with a “Would block” message if the last error was SOCKET_EWOULDBLCOK or SOCKET_EAGAIN. \return WOLFSSL_CBIO_ERR_TIMEOUT returned with a “Socket timeout” message. \return WOLFSSL_CBIO_ERR_CONN_RST returned with a “Connection reset” message if the last error was SOCKET_ECONNRESET. \return WOLFSSL_CBIO_ERR_ISR returned with a “Socket interrupted” message if the last error was SOCKET_EINTR. \return WOLFSSL_CBIO_ERR_WANT_READ returned with a “Connection refused” message if the last error was SOCKET_ECONNREFUSED. \return WOLFSSL_CBIO_ERR_CONN_CLOSE returned with a “Connection aborted” message if the last error was SOCKET_ECONNABORTED. \return WOLFSSL_CBIO_ERR_GENERAL returned with a “General error” message if the last error was not specified. \param ssl a pointer to a WOLFSSL structure, created using wolfSSL_new(). \param buf a char pointer representation of the buffer. \param sz the size of the buffer. \param ctx a void pointer to user registered context. In the default case the ctx is a socket descriptor pointer. _Example_ \code WOLFSSL_CTX* ctx = wolfSSL_CTX_new( protocol method ); WOLFSSL* ssl = wolfSSL_new(ctx); char* buf; int sz; void* ctx; int bytesRead = EmbedReceive(ssl, buf, sz, ctx); if(bytesRead <= 0){ // There were no bytes read. Failure case. } \endcode \sa EmbedSend \sa wolfSSL_CTX_SetIORecv \sa wolfSSL_SSLSetIORecv */ int EmbedReceive(WOLFSSL* ssl, char* buf, int sz, void* ctx); /*! \brief This function is the send embedded callback. \return Success This function returns the number of bytes sent. \return WOLFSSL_CBIO_ERR_WANT_WRITE returned with a “Would block” message if the last error was SOCKET_EWOULDBLOCK or SOCKET_EAGAIN. \return WOLFSSL_CBIO_ERR_CONN_RST returned with a “Connection reset” message if the last error was SOCKET_ECONNRESET. \return WOLFSSL_CBIO_ERR_ISR returned with a “Socket interrupted” message if the last error was SOCKET_EINTR. \return WOLFSSL_CBIO_ERR_CONN_CLOSE returned with a “Socket EPIPE” message if the last error was SOCKET_EPIPE. \return WOLFSSL_CBIO_ERR_GENERAL returned with a “General error” message if the last error was not specified. \param ssl a pointer to a WOLFSSL structure, created using wolfSSL_new(). \param buf a char pointer representing the buffer. \param sz the size of the buffer. \param ctx a void pointer to user registered context. _Example_ \code WOLFSSL* ssl = wolfSSL_new(ctx); char* buf; int sz; void* ctx; int dSent = EmbedSend(ssl, buf, sz, ctx); if(dSent <= 0){ // No byes sent. Failure case. } \endcode \sa EmbedReceive \sa wolfSSL_CTX_SetIOSend \sa wolfSSL_SSLSetIOSend */ int EmbedSend(WOLFSSL* ssl, char* buf, int sz, void* ctx); /*! \brief This function is the receive embedded callback. \return Success This function returns the nb bytes read if the execution was successful. \return WOLFSSL_CBIO_ERR_WANT_READ if the connection refused or if a ‘would block’ error was thrown in the function. \return WOLFSSL_CBIO_ERR_TIMEOUT returned if the socket timed out. \return WOLFSSL_CBIO_ERR_CONN_RST returned if the connection reset. \return WOLFSSL_CBIO_ERR_ISR returned if the socket was interrupted. \return WOLFSSL_CBIO_ERR_GENERAL returned if there was a general error. \param ssl a pointer to a WOLFSSL structure, created using wolfSSL_new(). \param buf a constant char pointer to the buffer. \param sz an int type representing the size of the buffer. \param ctx a void pointer to the WOLFSSL_CTX context. _Example_ \code WOLFSSL_CTX* ctx = wolfSSL_CTX_new( protocol method ); WOLFSSL* ssl = WOLFSSL_new(ctx); char* buf; int sz = sizeof(buf)/sizeof(char); (void*)ctx; … int nb = EmbedReceiveFrom(ssl, buf, sz, ctx); if(nb > 0){ // nb is the number of bytes written and is positive } \endcode \sa EmbedSendTo \sa wolfSSL_CTX_SetIORecv \sa wolfSSL_SSLSetIORecv \sa wolfSSL_dtls_get_current_timeout */ int EmbedReceiveFrom(WOLFSSL* ssl, char* buf, int sz, void* ctx); /*! \brief This function is the send embedded callback. \return Success This function returns the number of bytes sent. \return WOLFSSL_CBIO_ERR_WANT_WRITE returned with a “Would Block” message if the last error was either SOCKET_EWOULDBLOCK or SOCKET_EAGAIN error. \return WOLFSSL_CBIO_ERR_CONN_RST returned with a “Connection reset” message if the last error was SOCKET_ECONNRESET. \return WOLFSSL_CBIO_ERR_ISR returned with a “Socket interrupted” message if the last error was SOCKET_EINTR. \return WOLFSSL_CBIO_ERR_CONN_CLOSE returned with a “Socket EPIPE” message if the last error was WOLFSSL_CBIO_ERR_CONN_CLOSE. \return WOLFSSL_CBIO_ERR_GENERAL returned with a “General error” message if the last error was not specified. \param ssl a pointer to a WOLFSSL structure, created using wolfSSL_new(). \param buf a char pointer representing the buffer. \param sz the size of the buffer. \param ctx a void pointer to the user registered context. The default case is a WOLFSSL_DTLS_CTX structure. _Example_ \code WOLFSSL* ssl; … char* buf; int sz; void* ctx; int sEmbed = EmbedSendto(ssl, buf, sz, ctx); if(sEmbed <= 0){ // No bytes sent. Failure case. } \endcode \sa EmbedReceiveFrom \sa wolfSSL_CTX_SetIOSend \sa wolfSSL_SSLSetIOSend */ int EmbedSendTo(WOLFSSL* ssl, char* buf, int sz, void* ctx); /*! \brief This function is the DTLS Generate Cookie callback. \return Success This function returns the number of bytes copied into the buffer. \return GEN_COOKIE_E returned if the getpeername failed in EmbedGenerateCookie. \param ssl a pointer to a WOLFSSL structure, created using wolfSSL_new(). \param buf byte pointer representing the buffer. It is the destination from XMEMCPY(). \param sz the size of the buffer. \param ctx a void pointer to user registered context. _Example_ \code WOLFSSL_CTX* ctx = wolfSSL_CTX_new( method ); WOLFSSL* ssl = wolfSSL_new(ctx); byte buffer[BUFFER_SIZE]; int sz = sizeof(buffer)/sizeof(byte); void* ctx; … int ret = EmbedGenerateCookie(ssl, buffer, sz, ctx); if(ret > 0){ // EmbedGenerateCookie code block for success } \endcode \sa wolfSSL_CTX_SetGenCookie */ int EmbedGenerateCookie(WOLFSSL* ssl, byte* buf, int sz, void* ctx); /*! \brief This function frees the response buffer. \return none No returns. \param ctx a void pointer to heap hint. \param resp a byte pointer representing the response. _Example_ \code void* ctx; byte* resp; // Response buffer. … EmbedOcspRespFree(ctx, resp); \endcode \sa wolfSSL_CertManagerSetOCSP_Cb \sa wolfSSL_CertManagerEnableOCSPStapling \sa wolfSSL_CertManagerEnableOCSP */ void EmbedOcspRespFree(void* ctx, byte* resp); /*! \brief This function registers a receive callback for wolfSSL to get input data. By default, wolfSSL uses EmbedReceive() as the callback which uses the system’s TCP recv() function. The user can register a function to get input from memory, some other network module, or from anywhere. Please see the EmbedReceive() function in src/io.c as a guide for how the function should work and for error codes. In particular, IO_ERR_WANT_READ should be returned for non blocking receive when no data is ready. \return none no Returns. \param ctx pointer to the SSL context, created with wolfSSL_CTX_new(). \param callback function to be registered as the receive callback for the wolfSSL context, ctx. The signature of this function must follow that as shown above in the Synopsis section. _Example_ \code WOLFSSL_CTX* ctx = 0; // Receive callback prototype int MyEmbedReceive(WOLFSSL* ssl, char* buf, int sz, void* ctx); // Register the custom receive callback with wolfSSL wolfSSL_CTX_SetIORecv(ctx, MyEmbedReceive); int MyEmbedReceive(WOLFSSL* ssl, char* buf, int sz, void* ctx) { // custom EmbedReceive function } \endcode \sa wolfSSL_CTX_SetIOSend \sa wolfSSL_SetIOReadCtx \sa wolfSSL_SetIOWriteCtx */ void wolfSSL_CTX_SetIORecv(WOLFSSL_CTX* ctx, CallbackIORecv CBIORecv); /*! \brief This function registers a context for the SSL session’s receive callback function. By default, wolfSSL sets the file descriptor passed to wolfSSL_set_fd() as the context when wolfSSL is using the system’s TCP library. If you’ve registered your own receive callback you may want to set a specific context for the session. For example, if you’re using memory buffers the context may be a pointer to a structure describing where and how to access the memory buffers. \return none No returns. \param ssl pointer to the SSL session, created with wolfSSL_new(). \param rctx pointer to the context to be registered with the SSL session’s (ssl) receive callback function. _Example_ \code int sockfd; WOLFSSL* ssl = 0; ... // Manually setting the socket fd as the receive CTX, for example wolfSSL_SetIOReadCtx(ssl, &sockfd); ... \endcode \sa wolfSSL_CTX_SetIORecv \sa wolfSSL_CTX_SetIOSend \sa wolfSSL_SetIOWriteCtx */ void wolfSSL_SetIOReadCtx( WOLFSSL* ssl, void *ctx); /*! \brief This function registers a context for the SSL session’s send callback function. By default, wolfSSL sets the file descriptor passed to wolfSSL_set_fd() as the context when wolfSSL is using the system’s TCP library. If you’ve registered your own send callback you may want to set a specific context for the session. For example, if you’re using memory buffers the context may be a pointer to a structure describing where and how to access the memory buffers. \return none No returns. \param ssl pointer to the SSL session, created with wolfSSL_new(). \param wctx pointer to the context to be registered with the SSL session’s (ssl) send callback function. _Example_ \code int sockfd; WOLFSSL* ssl = 0; ... // Manually setting the socket fd as the send CTX, for example wolfSSL_SetIOWriteCtx(ssl, &sockfd); ... \endcode \sa wolfSSL_CTX_SetIORecv \sa wolfSSL_CTX_SetIOSend \sa wolfSSL_SetIOReadCtx */ void wolfSSL_SetIOWriteCtx(WOLFSSL* ssl, void *ctx); /*! \ingroup IO \brief This function returns the IOCB_ReadCtx member of the WOLFSSL struct. \return pointer This function returns a void pointer to the IOCB_ReadCtx member of the WOLFSSL structure. \return NULL returned if the WOLFSSL struct is NULL. \param ssl a pointer to a WOLFSSL structure, created using wolfSSL_new(). _Example_ \code WOLFSSL* ssl = wolfSSL_new(ctx); void* ioRead; ... ioRead = wolfSSL_GetIOReadCtx(ssl); if(ioRead == NULL){ // Failure case. The ssl object was NULL. } \endcode \sa wolfSSL_GetIOWriteCtx \sa wolfSSL_SetIOReadFlags \sa wolfSSL_SetIOWriteCtx \sa wolfSSL_SetIOReadCtx \sa wolfSSL_CTX_SetIOSend */ void* wolfSSL_GetIOReadCtx( WOLFSSL* ssl); /*! \ingroup IO \brief This function returns the IOCB_WriteCtx member of the WOLFSSL structure. \return pointer This function returns a void pointer to the IOCB_WriteCtx member of the WOLFSSL structure. \return NULL returned if the WOLFSSL struct is NULL. \param ssl a pointer to a WOLFSSL structure, created using wolfSSL_new(). _Example_ \code WOLFSSL* ssl; void* ioWrite; ... ioWrite = wolfSSL_GetIOWriteCtx(ssl); if(ioWrite == NULL){ // The function returned NULL. } \endcode \sa wolfSSL_GetIOReadCtx \sa wolfSSL_SetIOWriteCtx \sa wolfSSL_SetIOReadCtx \sa wolfSSL_CTX_SetIOSend */ void* wolfSSL_GetIOWriteCtx(WOLFSSL* ssl); /*! \brief This function sets the flags for the receive callback to use for the given SSL session. The receive callback could be either the default wolfSSL EmbedReceive callback, or a custom callback specified by the user (see wolfSSL_CTX_SetIORecv). The default flag value is set internally by wolfSSL to the value of 0. The default wolfSSL receive callback uses the recv() function to receive data from the socket. From the recv() man page: “The flags argument to a recv() function is formed by or'ing one or more of the values: MSG_OOB process out-of-band data, MSG_PEEK peek at incoming message, MSG_WAITALL wait for full request or error. The MSG_OOB flag requests receipt of out-of-band data that would not be received in the normal data stream. Some protocols place expedited data at the head of the normal data queue, and thus this flag cannot be used with such protocols. The MSG_PEEK flag causes the receive operation to return data from the beginning of the receive queue without removing that data from the queue. Thus, a subsequent receive call will return the same data. The MSG_WAITALL flag requests that the operation block until the full request is satisfied. However, the call may still return less data than requested if a signal is caught, an error or disconnect occurs, or the next data to be received is of a different type than that returned.” \return none No returns. \param ssl pointer to the SSL session, created with wolfSSL_new(). \param flags value of the I/O read flags for the specified SSL session (ssl). _Example_ \code WOLFSSL* ssl = 0; ... // Manually setting recv flags to 0 wolfSSL_SetIOReadFlags(ssl, 0); ... \endcode \sa wolfSSL_CTX_SetIORecv \sa wolfSSL_CTX_SetIOSend \sa wolfSSL_SetIOReadCtx */ void wolfSSL_SetIOReadFlags( WOLFSSL* ssl, int flags); /*! \brief This function sets the flags for the send callback to use for the given SSL session. The send callback could be either the default wolfSSL EmbedSend callback, or a custom callback specified by the user (see wolfSSL_CTX_SetIOSend). The default flag value is set internally by wolfSSL to the value of 0. The default wolfSSL send callback uses the send() function to send data from the socket. From the send() man page: “The flags parameter may include one or more of the following: #define MSG_OOB 0x1 // process out-of-band data, #define MSG_DONTROUTE 0x4 // bypass routing, use direct interface. The flag MSG_OOB is used to send 'out-of-band' data on sockets that support this notion (e.g. SOCK_STREAM); the underlying protocol must also support 'out-of-band' data. MSG_DONTROUTE is usually used only by diagnostic or routing programs.” \return none No returns. \param ssl pointer to the SSL session, created with wolfSSL_new(). \param flags value of the I/O send flags for the specified SSL session (ssl). _Example_ \code WOLFSSL* ssl = 0; ... // Manually setting send flags to 0 wolfSSL_SetIOWriteFlags(ssl, 0); ... \endcode \sa wolfSSL_CTX_SetIORecv \sa wolfSSL_CTX_SetIOSend \sa wolfSSL_SetIOReadCtx */ void wolfSSL_SetIOWriteFlags(WOLFSSL* ssl, int flags); /*! \ingroup IO \brief This function sets the nxSocket and nxWait members of the nxCtx struct within the WOLFSSL structure. \return none No returns. \param ssl a pointer to a WOLFSSL structure, created using wolfSSL_new(). \param nxSocket a pointer to type NX_TCP_SOCKET that is set to the nxSocket member of the nxCTX structure. \param waitOption a ULONG type that is set to the nxWait member of the nxCtx structure. _Example_ \code WOLFSSL* ssl = wolfSSL_new(ctx); NX_TCP_SOCKET* nxSocket; ULONG waitOption; … if(ssl != NULL || nxSocket != NULL || waitOption <= 0){ wolfSSL_SetIO_NetX(ssl, nxSocket, waitOption); } else { // You need to pass in good parameters. } \endcode \sa set_fd \sa NetX_Send \sa NetX_Receive */ void wolfSSL_SetIO_NetX(WOLFSSL* ssl, NX_TCP_SOCKET* nxsocket, ULONG waitoption); /*! \brief This function sets the callback for the CBIOCookie member of the WOLFSSL_CTX structure. The CallbackGenCookie type is a function pointer and has the signature: int (*CallbackGenCookie)(WOLFSSL* ssl, unsigned char* buf, int sz, void* ctx); \return none No returns. \param ssl a pointer to a WOLFSSL structure, created using wolfSSL_new(). \param cb a CallbackGenCookie type function pointer with the signature of CallbackGenCookie. _Example_ \code WOLFSSL_CTX* ctx = wolfSSL_CTX_new( method ); WOLFSSL* ssl = wolfSSL_new(ctx); … int SetGenCookieCB(WOLFSSL* ssl, unsigned char* buf, int sz, void* ctx){ // Callback function body. } … wolfSSL_CTX_SetGenCookie(ssl->ctx, SetGenCookieCB); \endcode \sa CallbackGenCookie */ void wolfSSL_CTX_SetGenCookie(WOLFSSL_CTX* ctx, CallbackGenCookie cb); /*! \ingroup Setup \brief This function returns the IOCB_CookieCtx member of the WOLFSSL structure. \return pointer The function returns a void pointer value stored in the IOCB_CookieCtx. \return NULL if the WOLFSSL struct is NULL \param ssl a pointer to a WOLFSSL structure, created using wolfSSL_new(). _Example_ \code WOLFSSL_CTX* ctx = wolfSSL_CTX_new( method ); WOLFSSL* ssl = wolfSSL_new(ctx); void* cookie; ... cookie = wolfSSL_GetCookieCtx(ssl); if(cookie != NULL){ // You have the cookie } \endcode \sa wolfSSL_SetCookieCtx \sa wolfSSL_CTX_SetGenCookie */ void* wolfSSL_GetCookieCtx(WOLFSSL* ssl); /*! \ingroup Setup \brief This function sets up the ISO-TP context if wolfSSL, for use when wolfSSL is compiled with WOLFSSL_ISOTP \return 0 on success, WOLFSSL_CBIO_ERR_GENERAL on failure \param ssl the wolfSSL context \param ctx a user created ISOTP context which this function initializes \param recv_fn a user CAN bus receive callback \param send_fn a user CAN bus send callback \param delay_fn a user microsecond granularity delay function \param receive_delay a set amount of microseconds to delay each CAN bus packet \param receive_buffer a user supplied buffer to receive data, recommended that is allocated to ISOTP_DEFAULT_BUFFER_SIZE bytes \param receive_buffer_size - The size of receive_buffer \param arg an arbitrary pointer sent to recv_fn and send_fn _Example_ \code struct can_info can_con_info; isotp_wolfssl_ctx isotp_ctx; char *receive_buffer = malloc(ISOTP_DEFAULT_BUFFER_SIZE); WOLFSSL_CTX* ctx = wolfSSL_CTX_new(method); WOLFSSL* ssl = wolfSSL_new(ctx); ... wolfSSL_SetIO_ISOTP(ssl, &isotp_ctx, can_receive, can_send, can_delay, 0, receive_buffer, ISOTP_DEFAULT_BUFFER_SIZE, &can_con_info); \endcode */ int wolfSSL_SetIO_ISOTP(WOLFSSL *ssl, isotp_wolfssl_ctx *ctx, can_recv_fn recv_fn, can_send_fn send_fn, can_delay_fn delay_fn, word32 receive_delay, char *receive_buffer, int receive_buffer_size, void *arg); /*! \ingroup Setup \brief This function disables reading from the IO layer. \param ssl the wolfSSL context _Example_ \code WOLFSSL_CTX* ctx = wolfSSL_CTX_new(method); WOLFSSL* ssl = wolfSSL_new(ctx); wolfSSL_SSLDisableRead(ssl); \endcode \sa wolfSSL_CTX_SetIORecv \sa wolfSSL_SSLSetIORecv \sa wolfSSL_SSLEnableRead */ void wolfSSL_SSLDisableRead(WOLFSSL *ssl); /*! \ingroup Setup \brief This function enables reading from the IO layer. Reading is enabled by default and should be used to undo wolfSSL_SSLDisableRead(); \param ssl the wolfSSL context _Example_ \code WOLFSSL_CTX* ctx = wolfSSL_CTX_new(method); WOLFSSL* ssl = wolfSSL_new(ctx); wolfSSL_SSLDisableRead(ssl); ... wolfSSL_SSLEnableRead(ssl); \endcode \sa wolfSSL_CTX_SetIORecv \sa wolfSSL_SSLSetIORecv \sa wolfSSL_SSLEnableRead */ void wolfSSL_SSLEnableRead(WOLFSSL *ssl); /*! \brief Set a custom DTLS recvfrom callback for a WOLFSSL session. This function allows you to specify a custom callback function for receiving datagrams (DTLS) using the `recvfrom`-style interface. The callback must match the WolfSSLRecvFrom function pointer type and is expected to behave like the POSIX `recvfrom()` function, including its return values and error handling. \param ssl A pointer to a WOLFSSL structure, created using wolfSSL_new(). \param recvFrom The custom callback function to use for DTLS datagram receive. _Example_ \code wolfSSL_SetRecvFrom(ssl, my_recvfrom_cb); \endcode \sa WolfSSLRecvFrom \sa wolfSSL_SetSendTo \sa EmbedReceiveFrom \sa wolfSSL_CTX_SetIORecv \sa wolfSSL_SSLSetIORecv */ WOLFSSL_API void wolfSSL_SetRecvFrom(WOLFSSL* ssl, WolfSSLRecvFrom recvFrom); /*! \brief Set a custom DTLS sendto callback for a WOLFSSL session. This function allows you to specify a custom callback function for sending datagrams (DTLS) using the `sendto`-style interface. The callback must match the WolfSSLSento function pointer type and is expected to behave like the POSIX `sendto()` function, including its return values and error handling. \param ssl A pointer to a WOLFSSL structure, created using wolfSSL_new(). \param sendTo The custom callback function to use for DTLS datagram send. _Example_ \code wolfSSL_SetSendTo(ssl, my_sendto_cb); \endcode \sa WolfSSLSento \sa wolfSSL_SetRecvFrom \sa EmbedSendTo \sa wolfSSL_CTX_SetIOSend \sa wolfSSL_SSLSetIOSend */ WOLFSSL_API void wolfSSL_SetSendTo(WOLFSSL* ssl, WolfSSLSento sendTo); /*! \ingroup IO \brief Waits for socket to be ready for I/O with timeout. \return 0 on success \return negative on error \param sockfd Socket file descriptor \param to_sec Timeout in seconds _Example_ \code SOCKET_T sockfd; int ret = wolfIO_Select(sockfd, 5); \endcode \sa wolfIO_TcpConnect */ int wolfIO_Select(SOCKET_T sockfd, int to_sec); /*! \ingroup IO \brief Connects to TCP server with timeout. \return 0 on success \return negative on error \param sockfd Pointer to socket file descriptor \param ip IP address string \param port Port number \param to_sec Timeout in seconds _Example_ \code SOCKET_T sockfd; int ret = wolfIO_TcpConnect(&sockfd, "127.0.0.1", 443, 5); \endcode \sa wolfIO_TcpBind */ int wolfIO_TcpConnect(SOCKET_T* sockfd, const char* ip, unsigned short port, int to_sec); /*! \ingroup IO \brief Accepts TCP connection. \return Socket descriptor on success \return negative on error \param sockfd Socket file descriptor \param peer_addr Peer address structure \param peer_len Peer address length _Example_ \code SOCKET_T sockfd; SOCKADDR peer; XSOCKLENT len = sizeof(peer); int ret = wolfIO_TcpAccept(sockfd, &peer, &len); \endcode \sa wolfIO_TcpBind */ int wolfIO_TcpAccept(SOCKET_T sockfd, SOCKADDR* peer_addr, XSOCKLENT* peer_len); /*! \ingroup IO \brief Binds TCP socket to port. \return 0 on success \return negative on error \param sockfd Pointer to socket file descriptor \param port Port number _Example_ \code SOCKET_T sockfd; int ret = wolfIO_TcpBind(&sockfd, 443); \endcode \sa wolfIO_TcpAccept */ int wolfIO_TcpBind(SOCKET_T* sockfd, word16 port); /*! \ingroup IO \brief Sends data on socket. \return Number of bytes sent on success \return negative on error \param sd Socket descriptor \param buf Buffer to send \param sz Buffer size \param wrFlags Write flags _Example_ \code SOCKET_T sd; char buf[100]; int ret = wolfIO_Send(sd, buf, sizeof(buf), 0); \endcode \sa wolfIO_Recv */ int wolfIO_Send(SOCKET_T sd, char *buf, int sz, int wrFlags); /*! \ingroup IO \brief Receives data from socket. \return Number of bytes received on success \return negative on error \param sd Socket descriptor \param buf Buffer to receive into \param sz Buffer size \param rdFlags Read flags _Example_ \code SOCKET_T sd; char buf[100]; int ret = wolfIO_Recv(sd, buf, sizeof(buf), 0); \endcode \sa wolfIO_Send */ int wolfIO_Recv(SOCKET_T sd, char *buf, int sz, int rdFlags); /*! \ingroup IO \brief Sends datagram to address. \return Number of bytes sent on success \return negative on error \param sd Socket descriptor \param addr Destination address \param buf Buffer to send \param sz Buffer size \param wrFlags Write flags _Example_ \code SOCKET_T sd; WOLFSSL_BIO_ADDR addr; char buf[100]; int ret = wolfIO_SendTo(sd, &addr, buf, sizeof(buf), 0); \endcode \sa wolfIO_RecvFrom */ int wolfIO_SendTo(SOCKET_T sd, WOLFSSL_BIO_ADDR *addr, char *buf, int sz, int wrFlags); /*! \ingroup IO \brief Receives datagram from address. \return Number of bytes received on success \return negative on error \param sd Socket descriptor \param addr Source address \param buf Buffer to receive into \param sz Buffer size \param rdFlags Read flags _Example_ \code SOCKET_T sd; WOLFSSL_BIO_ADDR addr; char buf[100]; int ret = wolfIO_RecvFrom(sd, &addr, buf, sizeof(buf), 0); \endcode \sa wolfIO_SendTo */ int wolfIO_RecvFrom(SOCKET_T sd, WOLFSSL_BIO_ADDR *addr, char *buf, int sz, int rdFlags); /*! \ingroup IO \brief BIO send callback. \return Number of bytes sent on success \return negative on error \param ssl SSL object \param buf Buffer to send \param sz Buffer size \param ctx Context pointer _Example_ \code WOLFSSL* ssl; char buf[100]; int ret = wolfSSL_BioSend(ssl, buf, sizeof(buf), NULL); \endcode \sa wolfSSL_BioReceive */ int wolfSSL_BioSend(WOLFSSL* ssl, char *buf, int sz, void *ctx); /*! \ingroup IO \brief BIO receive callback. \return Number of bytes received on success \return negative on error \param ssl SSL object \param buf Buffer to receive into \param sz Buffer size \param ctx Context pointer _Example_ \code WOLFSSL* ssl; char buf[100]; int ret = wolfSSL_BioReceive(ssl, buf, sizeof(buf), NULL); \endcode \sa wolfSSL_BioSend */ int wolfSSL_BioReceive(WOLFSSL* ssl, char* buf, int sz, void* ctx); /*! \ingroup IO \brief Receives multicast datagram. \return Number of bytes received on success \return negative on error \param ssl SSL object \param buf Buffer to receive into \param sz Buffer size \param ctx Context pointer _Example_ \code WOLFSSL* ssl; char buf[100]; int ret = EmbedReceiveFromMcast(ssl, buf, sizeof(buf), NULL); \endcode \sa EmbedReceiveFrom */ int EmbedReceiveFromMcast(WOLFSSL *ssl, char *buf, int sz, void *ctx); /*! \ingroup IO \brief Builds HTTP OCSP request. \return Request size on success \return negative on error \param domainName Domain name \param path URL path \param ocspReqSz OCSP request size \param buf Output buffer \param bufSize Buffer size _Example_ \code char buf[1024]; int ret = wolfIO_HttpBuildRequestOcsp("example.com", "/ocsp", 100, (unsigned char*)buf, sizeof(buf)); \endcode \sa wolfIO_HttpProcessResponseOcsp */ int wolfIO_HttpBuildRequestOcsp(const char* domainName, const char* path, int ocspReqSz, unsigned char* buf, int bufSize); /*! \ingroup IO \brief Processes HTTP OCSP response with generic I/O. \return 0 on success \return negative on error \param ioCb I/O callback \param ioCbCtx I/O callback context \param respBuf Response buffer pointer \param httpBuf HTTP buffer \param httpBufSz HTTP buffer size \param heap Heap hint _Example_ \code unsigned char* resp = NULL; unsigned char httpBuf[1024]; int ret = wolfIO_HttpProcessResponseOcspGenericIO(myIoCb, ctx, &resp, httpBuf, sizeof(httpBuf), NULL); \endcode \sa wolfIO_HttpProcessResponseOcsp */ int wolfIO_HttpProcessResponseOcspGenericIO(WolfSSLGenericIORecvCb ioCb, void* ioCbCtx, unsigned char** respBuf, unsigned char* httpBuf, int httpBufSz, void* heap); /*! \ingroup IO \brief Processes HTTP OCSP response. \return 0 on success \return negative on error \param sfd Socket file descriptor \param respBuf Response buffer pointer \param httpBuf HTTP buffer \param httpBufSz HTTP buffer size \param heap Heap hint _Example_ \code int sfd; unsigned char* resp = NULL; unsigned char httpBuf[1024]; int ret = wolfIO_HttpProcessResponseOcsp(sfd, &resp, httpBuf, sizeof(httpBuf), NULL); \endcode \sa wolfIO_HttpBuildRequestOcsp */ int wolfIO_HttpProcessResponseOcsp(int sfd, unsigned char** respBuf, unsigned char* httpBuf, int httpBufSz, void* heap); /*! \ingroup IO \brief OCSP lookup callback. \return 0 on success \return negative on error \param ctx Context pointer \param url URL string \param urlSz URL size \param ocspReqBuf OCSP request buffer \param ocspReqSz OCSP request size \param ocspRespBuf OCSP response buffer pointer _Example_ \code byte* resp = NULL; byte req[100]; int ret = EmbedOcspLookup(NULL, "http://example.com/ocsp", 25, req, sizeof(req), &resp); \endcode \sa EmbedOcspRespFree */ int EmbedOcspLookup(void* ctx, const char* url, int urlSz, byte* ocspReqBuf, int ocspReqSz, byte** ocspRespBuf); /*! \ingroup IO \brief Builds HTTP CRL request. \return Request size on success \return negative on error \param url URL string \param urlSz URL size \param domainName Domain name \param buf Output buffer \param bufSize Buffer size _Example_ \code char buf[1024]; int ret = wolfIO_HttpBuildRequestCrl("http://example.com/crl", 22, "example.com", (unsigned char*)buf, sizeof(buf)); \endcode \sa wolfIO_HttpProcessResponseCrl */ int wolfIO_HttpBuildRequestCrl(const char* url, int urlSz, const char* domainName, unsigned char* buf, int bufSize); /*! \ingroup IO \brief Processes HTTP CRL response. \return 0 on success \return negative on error \param crl CRL object \param sfd Socket file descriptor \param httpBuf HTTP buffer \param httpBufSz HTTP buffer size _Example_ \code WOLFSSL_CRL crl; int sfd; unsigned char httpBuf[1024]; int ret = wolfIO_HttpProcessResponseCrl(&crl, sfd, httpBuf, sizeof(httpBuf)); \endcode \sa wolfIO_HttpBuildRequestCrl */ int wolfIO_HttpProcessResponseCrl(WOLFSSL_CRL* crl, int sfd, unsigned char* httpBuf, int httpBufSz); /*! \ingroup IO \brief CRL lookup callback. \return 0 on success \return negative on error \param crl CRL object \param url URL string \param urlSz URL size _Example_ \code WOLFSSL_CRL crl; int ret = EmbedCrlLookup(&crl, "http://example.com/crl", 22); \endcode \sa wolfIO_HttpBuildRequestCrl */ int EmbedCrlLookup(WOLFSSL_CRL* crl, const char* url, int urlSz); /*! \ingroup IO \brief Decodes URL into components. \return 0 on success \return negative on error \param url URL string \param urlSz URL size \param outName Output domain name \param outPath Output path \param outPort Output port _Example_ \code char name[256], path[256]; unsigned short port; int ret = wolfIO_DecodeUrl("http://example.com:443/path", 28, name, path, &port); \endcode \sa wolfIO_HttpBuildRequest */ int wolfIO_DecodeUrl(const char* url, int urlSz, char* outName, char* outPath, unsigned short* outPort); /*! \ingroup IO \brief Builds generic HTTP request. \return Request size on success \return negative on error \param reqType Request type (GET, POST, etc.) \param domainName Domain name \param path URL path \param pathLen Path length \param reqSz Request body size \param contentType Content type \param buf Output buffer \param bufSize Buffer size _Example_ \code char buf[1024]; int ret = wolfIO_HttpBuildRequest("POST", "example.com", "/api", 4, 100, "application/json", (unsigned char*)buf, sizeof(buf)); \endcode \sa wolfIO_HttpProcessResponse */ int wolfIO_HttpBuildRequest(const char* reqType, const char* domainName, const char* path, int pathLen, int reqSz, const char* contentType, unsigned char* buf, int bufSize); /*! \ingroup IO \brief Processes HTTP response with generic I/O. \return 0 on success \return negative on error \param ioCb I/O callback \param ioCbCtx I/O callback context \param appStrList Application string list \param respBuf Response buffer pointer \param httpBuf HTTP buffer \param httpBufSz HTTP buffer size \param dynType Dynamic type \param heap Heap hint _Example_ \code unsigned char* resp = NULL; unsigned char httpBuf[1024]; const char* appStrs[] = {"200 OK", NULL}; int ret = wolfIO_HttpProcessResponseGenericIO(myIoCb, ctx, appStrs, &resp, httpBuf, sizeof(httpBuf), 0, NULL); \endcode \sa wolfIO_HttpProcessResponse */ int wolfIO_HttpProcessResponseGenericIO(WolfSSLGenericIORecvCb ioCb, void* ioCbCtx, const char** appStrList, unsigned char** respBuf, unsigned char* httpBuf, int httpBufSz, int dynType, void* heap); /*! \ingroup IO \brief Processes HTTP response. \return 0 on success \return negative on error \param sfd Socket file descriptor \param appStrList Application string list \param respBuf Response buffer pointer \param httpBuf HTTP buffer \param httpBufSz HTTP buffer size \param dynType Dynamic type \param heap Heap hint _Example_ \code int sfd; unsigned char* resp = NULL; unsigned char httpBuf[1024]; const char* appStrs[] = {"200 OK", NULL}; int ret = wolfIO_HttpProcessResponse(sfd, appStrs, &resp, httpBuf, sizeof(httpBuf), 0, NULL); \endcode \sa wolfIO_HttpBuildRequest */ int wolfIO_HttpProcessResponse(int sfd, const char** appStrList, unsigned char** respBuf, unsigned char* httpBuf, int httpBufSz, int dynType, void* heap); /*! \ingroup IO \brief Sets I/O send callback for context. \return none No returns \param ctx SSL context \param CBIOSend Send callback _Example_ \code WOLFSSL_CTX* ctx; wolfSSL_CTX_SetIOSend(ctx, mySendCallback); \endcode \sa wolfSSL_SSLSetIOSend */ void wolfSSL_CTX_SetIOSend(WOLFSSL_CTX *ctx, CallbackIOSend CBIOSend); /*! \ingroup IO \brief Sets I/O receive callback for SSL object. \return none No returns \param ssl SSL object \param CBIORecv Receive callback _Example_ \code WOLFSSL* ssl; wolfSSL_SSLSetIORecv(ssl, myRecvCallback); \endcode \sa wolfSSL_CTX_SetIORecv */ void wolfSSL_SSLSetIORecv(WOLFSSL *ssl, CallbackIORecv CBIORecv); /*! \ingroup IO \brief Sets I/O send callback for SSL object. \return none No returns \param ssl SSL object \param CBIOSend Send callback _Example_ \code WOLFSSL* ssl; wolfSSL_SSLSetIOSend(ssl, mySendCallback); \endcode \sa wolfSSL_CTX_SetIOSend */ void wolfSSL_SSLSetIOSend(WOLFSSL *ssl, CallbackIOSend CBIOSend); /*! \ingroup IO \brief Sets I/O for Mynewt platform. \return none No returns \param ssl SSL object \param mnSocket Mynewt socket \param mnSockAddrIn Mynewt socket address _Example_ \code WOLFSSL* ssl; struct mn_socket sock; struct mn_sockaddr_in addr; wolfSSL_SetIO_Mynewt(ssl, &sock, &addr); \endcode \sa wolfSSL_SetIO_LwIP */ void wolfSSL_SetIO_Mynewt(WOLFSSL* ssl, struct mn_socket* mnSocket, struct mn_sockaddr_in* mnSockAddrIn); /*! \ingroup IO \brief Sets I/O for LwIP platform. \return 0 on success \return negative on error \param ssl SSL object \param pcb Protocol control block \param recv Receive callback \param sent Sent callback \param arg Argument pointer _Example_ \code WOLFSSL* ssl; struct tcp_pcb* pcb; int ret = wolfSSL_SetIO_LwIP(ssl, pcb, myRecv, mySent, NULL); \endcode \sa wolfSSL_SetIO_Mynewt */ int wolfSSL_SetIO_LwIP(WOLFSSL* ssl, void *pcb, tcp_recv_fn recv, tcp_sent_fn sent, void *arg); /*! \ingroup IO \brief Sets cookie context for DTLS. \return none No returns \param ssl SSL object \param ctx Cookie context _Example_ \code WOLFSSL* ssl; void* ctx; wolfSSL_SetCookieCtx(ssl, ctx); \endcode \sa wolfSSL_GetCookieCtx */ void wolfSSL_SetCookieCtx(WOLFSSL* ssl, void *ctx); /*! \ingroup IO \brief Gets cookie context for DTLS. \return Cookie context pointer \param ssl SSL object _Example_ \code WOLFSSL* ssl; void* ctx = wolfSSL_GetCookieCtx(ssl); \endcode \sa wolfSSL_SetCookieCtx */ void* wolfSSL_GetCookieCtx(WOLFSSL* ssl); /*! \ingroup IO \brief Sets get peer callback for context. \return none No returns \param ctx SSL context \param cb Get peer callback _Example_ \code WOLFSSL_CTX* ctx; wolfSSL_CTX_SetIOGetPeer(ctx, myGetPeerCallback); \endcode \sa wolfSSL_CTX_SetIOSetPeer */ void wolfSSL_CTX_SetIOGetPeer(WOLFSSL_CTX* ctx, CallbackGetPeer cb); /*! \ingroup IO \brief Sets set peer callback for context. \return none No returns \param ctx SSL context \param cb Set peer callback _Example_ \code WOLFSSL_CTX* ctx; wolfSSL_CTX_SetIOSetPeer(ctx, mySetPeerCallback); \endcode \sa wolfSSL_CTX_SetIOGetPeer */ void wolfSSL_CTX_SetIOSetPeer(WOLFSSL_CTX* ctx, CallbackSetPeer cb); /*! \ingroup IO \brief Gets peer information. \return 0 on success \return negative on error \param ssl SSL object \param ip IP address buffer \param ipSz IP address buffer size pointer \param port Port number pointer \param fam Address family pointer _Example_ \code WOLFSSL* ssl; char ip[46]; int ipSz = sizeof(ip); unsigned short port; int fam; int ret = EmbedGetPeer(ssl, ip, &ipSz, &port, &fam); \endcode \sa EmbedSetPeer */ int EmbedGetPeer(WOLFSSL* ssl, char* ip, int* ipSz, unsigned short* port, int* fam); /*! \ingroup IO \brief Sets peer information. \return 0 on success \return negative on error \param ssl SSL object \param ip IP address string \param ipSz IP address string size \param port Port number \param fam Address family _Example_ \code WOLFSSL* ssl; int ret = EmbedSetPeer(ssl, "127.0.0.1", 9, 443, AF_INET); \endcode \sa EmbedGetPeer */ int EmbedSetPeer(WOLFSSL* ssl, char* ip, int ipSz, unsigned short port, int fam);