Behaviours: gen_server.
cert() = #'Certificate'{} | #'OTPCertificate'{}
tls_socket() = #tlssock{tcpsock = inet:socket(), tlsport = port()}
| add_certfile/2 | |
| clear_cache/0 | Clears cached SSL_CTX structures You MUST call this function if you change content of your CA, DH or certificate files. |
| close/1 | |
| code_change/3 | |
| controlling_process/2 | |
| delete_certfile/1 | Returns true if element is deleted, false otherwise. |
| get_cert_verify_string/2 | |
| get_certfile/1 | This function is intended for tests only. |
| get_negotiated_cipher/1 | |
| get_negotiated_cipher_nif/1 | |
| get_peer_certificate/1 | |
| get_peer_certificate/2 | |
| get_peer_certificate_nif/1 | |
| get_verify_result/1 | |
| get_verify_result_nif/1 | |
| handle_call/3 | |
| handle_cast/2 | |
| handle_info/2 | |
| init/1 | |
| invalidate_nif/1 | |
| loop_nif/4 | |
| open_nif/8 | |
| peername/1 | |
| recv/2 | |
| recv/3 | |
| recv_data/2 | |
| send/2 | |
| setopts/2 | |
| sockname/1 | |
| start_link/0 | |
| tcp_to_tls/2 | |
| terminate/2 | |
| tls_to_tcp/1 |
add_certfile(Domain::iodata(), File::iodata()) -> ok
clear_cache() -> ok
Clears cached SSL_CTX structures You MUST call this function if you change content of your CA, DH or certificate files
close(Tlssock) -> any()
code_change(OldVsn, State, Extra) -> any()
controlling_process(Tlssock, Pid) -> any()
delete_certfile(Domain::iodata()) -> boolean()
Returns true if element is deleted, false otherwise
get_cert_verify_string(CertVerifyRes::number(), Cert::cert() | binary()) -> binary()
get_certfile(Domain::iodata()) -> {ok, binary()} | error
This function is intended for tests only
get_negotiated_cipher(Tlssock::tls_socket()) -> error | {ok, binary()}
get_negotiated_cipher_nif(Port) -> any()
get_peer_certificate(TLSSock::tls_socket()) -> {ok, cert()} | error
get_peer_certificate(Tlssock::tls_socket(), Type::otp | plain) -> {ok, cert()} | error
get_peer_certificate_nif(Port) -> any()
get_verify_result(Tlssock::tls_socket()) -> byte()
get_verify_result_nif(Port) -> any()
handle_call(X1, X2, State) -> any()
handle_cast(X1, State) -> any()
handle_info(X1, Port) -> any()
init(X1) -> any()
invalidate_nif(Port) -> any()
loop_nif(Port, ToSend, Received, ReceiveBytes) -> any()
open_nif(Flags, CertFile, Ciphers, ProtocolOpts, DHFile, CAFile, SNI, ALPN) -> any()
peername(Tlssock) -> any()
recv(Socket, Length) -> any()
recv(TLSSock::tls_socket(), Length::non_neg_integer(), Timeout::timeout()) -> {error, inet:posix()} | {error, binary()} | {ok, binary()}
recv_data(TLSSock::tls_socket(), Packet::binary()) -> {error, inet:posix() | binary()} | {ok, binary()}
send(Socket::tls_socket(), Packet::binary()) -> ok | {error, inet:posix() | binary() | timeout}
setopts(Tlssock::tls_socket(), Opts::list()) -> ok | {error, inet:posix()}
sockname(Tlssock::tls_socket()) -> {ok, {inet:ip_address(), inet:port_number()}} | {error, inet:posix()}
start_link() -> any()
tcp_to_tls(TCPSocket::inet:socket(), Options::[{atom(), any()}]) -> {error, no_certfile | binary()} | {ok, tls_socket()}
terminate(Reason, State) -> any()
tls_to_tcp(Tlssock::tls_socket()) -> inet:socket()
Generated by EDoc