-
Notifications
You must be signed in to change notification settings - Fork 722
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs: Documentation clean up #3329
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Also talked offline: I'm not sure about putting examples, especially large ones or ones involving multiple APIs, in the Doxygen documentation. I also worry that we've lost some of the actually useful "how APIs interact" documentation from the Usage guide.
7d96994
to
4e0aa5e
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't think this PR actually resolves #3314, it doesn't include the CSS changes.
I'll do a separate PR to introduce CSS changes |
api/s2n.h
Outdated
* @note Unlike OpenSSL, repeated calls to s2n_send() should not duplicate the original parameters, but should | ||
* update `buf` and `size` per the indication of size written. For example; | ||
* ```c |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think I was wrong about removing examples. This one seems pretty integral to this @note
.
Same for s2n_sendv_with_offset and s2n_recv.
api/s2n.h
Outdated
* | ||
* @warning The string "TLS_NULL_WITH_NULL_NULL" is returned before the TLS handshake has been performed. | ||
* This does not mean that the ciphersuite "TLS_NULL_WITH_NULL_NULL" will be used by the connection, | ||
* it is merely being used as a placeholder. | ||
* | ||
* @note This function is only accurate after the TLS handshake. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why is this being removed? Didn't another PR just add these notes?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That was an error on my part. I'll revert this change.
219dd6a
to
21bd600
Compare
21bd600
to
b21b9a9
Compare
|
||
**s2n_config_new** returns a new configuration object suitable for associating certs and keys. | ||
This object can (and should) be associated with many connection objects. | ||
Setting the `S2N_SELF_SERVICE_BLINDING` option with `s2n_connection_set_blinding()` turns off this behavior. This is useful for applications that are handling many connections in a single thread. In that case, if `s2n_recv()` or `s2n_negotiate()` return an error, self-service applications must call `s2n_connection_get_delay()` and pause activity on the connection for the specified number of nanoseconds before calling `close()` or `shutdown()`. `s2n_shutdown()` will fail if called before the blinding delay elapses. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nit: double space
Setting the `S2N_SELF_SERVICE_BLINDING` option with `s2n_connection_set_blinding()` turns off this behavior. This is useful for applications that are handling many connections in a single thread. In that case, if `s2n_recv()` or `s2n_negotiate()` return an error, self-service applications must call `s2n_connection_get_delay()` and pause activity on the connection for the specified number of nanoseconds before calling `close()` or `shutdown()`. `s2n_shutdown()` will fail if called before the blinding delay elapses. | |
Setting the `S2N_SELF_SERVICE_BLINDING` option with `s2n_connection_set_blinding()` turns off this behavior. This is useful for applications that are handling many connections in a single thread. In that case, if `s2n_recv()` or `s2n_negotiate()` return an error, self-service applications must call `s2n_connection_get_delay()` and pause activity on the connection for the specified number of nanoseconds before calling `close()` or `shutdown()`. `s2n_shutdown()` will fail if called before the blinding delay elapses. |
### Stacktraces | ||
s2n-tls has an mechanism to capture stacktraces when errors occur. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nit
### Stacktraces | |
s2n-tls has an mechanism to capture stacktraces when errors occur. | |
### Stacktraces | |
s2n-tls has a mechanism to capture stacktraces when errors occur. |
Re-write a portion of the USAGE GUIDE to move it towards being a guide vs an API reference.
Re-write a portion of the USAGE GUIDE to move it towards being a guide vs an API reference.
Resolved issues:
resolves 3314
Description of changes:
Call-outs:
Address any potentially confusing code. Is there code added that needs to be cleaned up later? Is there code that is missing because it’s still in development?
Testing:
How is this change tested (unit tests, fuzz tests, etc.)? Are there any testing steps to be verified by the reviewer?
Is this a refactor change? If so, how have you proved that the intended behavior hasn't changed?
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.