2000-09-16 09:32:42 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2016-06-21 19:03:34 +08:00
|
|
|
BIO_do_handshake,
|
|
|
|
BIO_f_ssl, BIO_set_ssl, BIO_get_ssl, BIO_set_ssl_mode,
|
|
|
|
BIO_set_ssl_renegotiate_bytes,
|
2000-09-16 09:32:42 +08:00
|
|
|
BIO_get_num_renegotiates, BIO_set_ssl_renegotiate_timeout, BIO_new_ssl,
|
|
|
|
BIO_new_ssl_connect, BIO_new_buffer_ssl_connect, BIO_ssl_copy_session_id,
|
|
|
|
BIO_ssl_shutdown - SSL BIO
|
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
2019-09-29 23:10:59 +08:00
|
|
|
=for openssl multiple includes
|
2016-11-11 16:33:09 +08:00
|
|
|
|
2000-09-16 09:32:42 +08:00
|
|
|
#include <openssl/bio.h>
|
|
|
|
#include <openssl/ssl.h>
|
|
|
|
|
2016-03-20 00:32:14 +08:00
|
|
|
const BIO_METHOD *BIO_f_ssl(void);
|
2000-09-16 09:32:42 +08:00
|
|
|
|
2016-07-19 21:27:53 +08:00
|
|
|
long BIO_set_ssl(BIO *b, SSL *ssl, long c);
|
2016-07-09 00:55:45 +08:00
|
|
|
long BIO_get_ssl(BIO *b, SSL **sslp);
|
|
|
|
long BIO_set_ssl_mode(BIO *b, long client);
|
|
|
|
long BIO_set_ssl_renegotiate_bytes(BIO *b, long num);
|
|
|
|
long BIO_set_ssl_renegotiate_timeout(BIO *b, long seconds);
|
|
|
|
long BIO_get_num_renegotiates(BIO *b);
|
|
|
|
|
|
|
|
BIO *BIO_new_ssl(SSL_CTX *ctx, int client);
|
2000-09-16 09:32:42 +08:00
|
|
|
BIO *BIO_new_ssl_connect(SSL_CTX *ctx);
|
|
|
|
BIO *BIO_new_buffer_ssl_connect(SSL_CTX *ctx);
|
2016-07-09 00:55:45 +08:00
|
|
|
int BIO_ssl_copy_session_id(BIO *to, BIO *from);
|
2000-09-16 09:32:42 +08:00
|
|
|
void BIO_ssl_shutdown(BIO *bio);
|
|
|
|
|
2016-07-09 00:55:45 +08:00
|
|
|
long BIO_do_handshake(BIO *b);
|
2000-09-17 05:21:01 +08:00
|
|
|
|
2000-09-16 09:32:42 +08:00
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
|
|
|
BIO_f_ssl() returns the SSL BIO method. This is a filter BIO which
|
2000-09-17 00:00:38 +08:00
|
|
|
is a wrapper round the OpenSSL SSL routines adding a BIO "flavour" to
|
2016-05-20 20:11:46 +08:00
|
|
|
SSL I/O.
|
2000-09-16 09:32:42 +08:00
|
|
|
|
|
|
|
I/O performed on an SSL BIO communicates using the SSL protocol with
|
2000-09-17 05:21:01 +08:00
|
|
|
the SSLs read and write BIOs. If an SSL connection is not established
|
|
|
|
then an attempt is made to establish one on the first I/O call.
|
2000-09-16 09:32:42 +08:00
|
|
|
|
|
|
|
If a BIO is appended to an SSL BIO using BIO_push() it is automatically
|
|
|
|
used as the SSL BIOs read and write BIOs.
|
|
|
|
|
|
|
|
Calling BIO_reset() on an SSL BIO closes down any current SSL connection
|
|
|
|
by calling SSL_shutdown(). BIO_reset() is then sent to the next BIO in
|
|
|
|
the chain: this will typically disconnect the underlying transport.
|
|
|
|
The SSL BIO is then reset to the initial accept or connect state.
|
|
|
|
|
|
|
|
If the close flag is set when an SSL BIO is freed then the internal
|
|
|
|
SSL structure is also freed using SSL_free().
|
|
|
|
|
|
|
|
BIO_set_ssl() sets the internal SSL pointer of BIO B<b> to B<ssl> using
|
|
|
|
the close flag B<c>.
|
|
|
|
|
|
|
|
BIO_get_ssl() retrieves the SSL pointer of BIO B<b>, it can then be
|
|
|
|
manipulated using the standard SSL library functions.
|
|
|
|
|
|
|
|
BIO_set_ssl_mode() sets the SSL BIO mode to B<client>. If B<client>
|
|
|
|
is 1 client mode is set. If B<client> is 0 server mode is set.
|
|
|
|
|
|
|
|
BIO_set_ssl_renegotiate_bytes() sets the renegotiate byte count
|
2016-05-20 20:11:46 +08:00
|
|
|
to B<num>. When set after every B<num> bytes of I/O (read and write)
|
2000-09-16 09:32:42 +08:00
|
|
|
the SSL session is automatically renegotiated. B<num> must be at
|
|
|
|
least 512 bytes.
|
|
|
|
|
|
|
|
BIO_set_ssl_renegotiate_timeout() sets the renegotiate timeout to
|
2000-09-16 23:39:28 +08:00
|
|
|
B<seconds>. When the renegotiate timeout elapses the session is
|
2000-09-16 09:32:42 +08:00
|
|
|
automatically renegotiated.
|
|
|
|
|
|
|
|
BIO_get_num_renegotiates() returns the total number of session
|
|
|
|
renegotiations due to I/O or timeout.
|
|
|
|
|
|
|
|
BIO_new_ssl() allocates an SSL BIO using SSL_CTX B<ctx> and using
|
|
|
|
client mode if B<client> is non zero.
|
|
|
|
|
|
|
|
BIO_new_ssl_connect() creates a new BIO chain consisting of an
|
|
|
|
SSL BIO (using B<ctx>) followed by a connect BIO.
|
|
|
|
|
|
|
|
BIO_new_buffer_ssl_connect() creates a new BIO chain consisting
|
|
|
|
of a buffering BIO, an SSL BIO (using B<ctx>) and a connect
|
|
|
|
BIO.
|
|
|
|
|
2016-05-20 20:11:46 +08:00
|
|
|
BIO_ssl_copy_session_id() copies an SSL session id between
|
2000-09-16 09:32:42 +08:00
|
|
|
BIO chains B<from> and B<to>. It does this by locating the
|
|
|
|
SSL BIOs in each chain and calling SSL_copy_session_id() on
|
|
|
|
the internal SSL pointer.
|
|
|
|
|
|
|
|
BIO_ssl_shutdown() closes down an SSL connection on BIO
|
|
|
|
chain B<bio>. It does this by locating the SSL BIO in the
|
|
|
|
chain and calling SSL_shutdown() on its internal SSL
|
|
|
|
pointer.
|
|
|
|
|
2000-09-17 05:21:01 +08:00
|
|
|
BIO_do_handshake() attempts to complete an SSL handshake on the
|
2020-06-02 19:02:42 +08:00
|
|
|
-supplied BIO and establish the SSL connection.
|
|
|
|
For non-SSL BIOs the connection is done typically at TCP level.
|
|
|
|
If domain name resolution yields multiple IP addresses all of them are tried
|
|
|
|
after connect() failures.
|
|
|
|
The function returns 1 if the connection was established successfully.
|
|
|
|
A zero or negative value is returned if the connection could not be established.
|
2020-07-17 18:31:26 +08:00
|
|
|
The call BIO_should_retry() should be used for nonblocking connect BIOs
|
2020-06-02 19:02:42 +08:00
|
|
|
to determine if the call should be retried.
|
|
|
|
If a connection has already been established this call has no effect.
|
2000-09-17 05:21:01 +08:00
|
|
|
|
2000-09-16 09:32:42 +08:00
|
|
|
=head1 NOTES
|
|
|
|
|
|
|
|
SSL BIOs are exceptional in that if the underlying transport
|
|
|
|
is non blocking they can still request a retry in exceptional
|
|
|
|
circumstances. Specifically this will happen if a session
|
2016-10-20 16:56:18 +08:00
|
|
|
renegotiation takes place during a BIO_read_ex() operation, one
|
2014-10-24 09:36:13 +08:00
|
|
|
case where this happens is when step up occurs.
|
2000-09-16 09:32:42 +08:00
|
|
|
|
2015-10-28 01:40:11 +08:00
|
|
|
The SSL flag SSL_AUTO_RETRY can be
|
2000-09-17 00:00:38 +08:00
|
|
|
set to disable this behaviour. That is when this flag is set
|
2000-09-16 09:32:42 +08:00
|
|
|
an SSL BIO using a blocking transport will never request a
|
|
|
|
retry.
|
|
|
|
|
|
|
|
Since unknown BIO_ctrl() operations are sent through filter
|
|
|
|
BIOs the servers name and port can be set using BIO_set_host()
|
|
|
|
on the BIO returned by BIO_new_ssl_connect() without having
|
|
|
|
to locate the connect BIO first.
|
|
|
|
|
2000-09-17 05:21:01 +08:00
|
|
|
Applications do not have to call BIO_do_handshake() but may wish
|
|
|
|
to do so to separate the handshake process from other I/O
|
|
|
|
processing.
|
|
|
|
|
2016-07-09 00:55:45 +08:00
|
|
|
BIO_set_ssl(), BIO_get_ssl(), BIO_set_ssl_mode(),
|
|
|
|
BIO_set_ssl_renegotiate_bytes(), BIO_set_ssl_renegotiate_timeout(),
|
|
|
|
BIO_get_num_renegotiates(), and BIO_do_handshake() are implemented as macros.
|
|
|
|
|
2019-08-16 01:52:41 +08:00
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
|
|
|
BIO_f_ssl() returns the SSL B<BIO_METHOD> structure.
|
|
|
|
|
|
|
|
BIO_set_ssl(), BIO_get_ssl(), BIO_set_ssl_mode(), BIO_set_ssl_renegotiate_bytes(),
|
|
|
|
BIO_set_ssl_renegotiate_timeout() and BIO_get_num_renegotiates() return 1 on
|
|
|
|
success or a value which is less than or equal to 0 if an error occurred.
|
|
|
|
|
|
|
|
BIO_new_ssl(), BIO_new_ssl_connect() and BIO_new_buffer_ssl_connect() return
|
|
|
|
a valid B<BIO> structure on success or B<NULL> if an error occurred.
|
|
|
|
|
|
|
|
BIO_ssl_copy_session_id() returns 1 on success or 0 on error.
|
|
|
|
|
|
|
|
BIO_do_handshake() returns 1 if the connection was established successfully.
|
|
|
|
A zero or negative value is returned if the connection could not be established.
|
|
|
|
|
|
|
|
=head1 EXAMPLES
|
2000-09-16 09:32:42 +08:00
|
|
|
|
2019-08-16 01:52:41 +08:00
|
|
|
This SSL/TLS client example attempts to retrieve a page from an
|
2000-09-16 09:32:42 +08:00
|
|
|
SSL/TLS web server. The I/O routines are identical to those of the
|
2015-08-18 03:21:33 +08:00
|
|
|
unencrypted example in L<BIO_s_connect(3)>.
|
2000-09-16 09:32:42 +08:00
|
|
|
|
|
|
|
BIO *sbio, *out;
|
|
|
|
int len;
|
|
|
|
char tmpbuf[1024];
|
|
|
|
SSL_CTX *ctx;
|
|
|
|
SSL *ssl;
|
|
|
|
|
2016-05-21 08:52:46 +08:00
|
|
|
/* XXX Seed the PRNG if needed. */
|
2000-09-17 05:21:01 +08:00
|
|
|
|
2015-03-31 21:29:53 +08:00
|
|
|
ctx = SSL_CTX_new(TLS_client_method());
|
2000-09-16 09:32:42 +08:00
|
|
|
|
2016-05-21 08:52:46 +08:00
|
|
|
/* XXX Set verify paths and mode here. */
|
2000-09-16 09:32:42 +08:00
|
|
|
|
|
|
|
sbio = BIO_new_ssl_connect(ctx);
|
|
|
|
BIO_get_ssl(sbio, &ssl);
|
2016-05-21 08:52:46 +08:00
|
|
|
if (ssl == NULL) {
|
|
|
|
fprintf(stderr, "Can't locate SSL pointer\n");
|
|
|
|
ERR_print_errors_fp(stderr);
|
|
|
|
exit(1);
|
2000-09-16 09:32:42 +08:00
|
|
|
}
|
|
|
|
|
2016-05-21 08:52:46 +08:00
|
|
|
/* XXX We might want to do other things with ssl here */
|
2000-09-16 09:32:42 +08:00
|
|
|
|
2016-02-03 06:40:34 +08:00
|
|
|
/* An empty host part means the loopback address */
|
|
|
|
BIO_set_conn_hostname(sbio, ":https");
|
2000-09-16 09:32:42 +08:00
|
|
|
|
|
|
|
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
2016-05-21 08:52:46 +08:00
|
|
|
if (BIO_do_connect(sbio) <= 0) {
|
|
|
|
fprintf(stderr, "Error connecting to server\n");
|
|
|
|
ERR_print_errors_fp(stderr);
|
|
|
|
exit(1);
|
2000-09-17 05:21:01 +08:00
|
|
|
}
|
2000-09-16 09:32:42 +08:00
|
|
|
|
2016-05-21 08:52:46 +08:00
|
|
|
/* XXX Could examine ssl here to get connection info */
|
2000-09-16 09:32:42 +08:00
|
|
|
|
|
|
|
BIO_puts(sbio, "GET / HTTP/1.0\n\n");
|
2016-11-19 07:10:05 +08:00
|
|
|
for (;;) {
|
2016-05-21 08:52:46 +08:00
|
|
|
len = BIO_read(sbio, tmpbuf, 1024);
|
2016-06-29 06:19:46 +08:00
|
|
|
if (len <= 0)
|
2016-05-21 08:52:46 +08:00
|
|
|
break;
|
|
|
|
BIO_write(out, tmpbuf, len);
|
2000-09-16 09:32:42 +08:00
|
|
|
}
|
|
|
|
BIO_free_all(sbio);
|
|
|
|
BIO_free(out);
|
|
|
|
|
2000-09-17 05:21:01 +08:00
|
|
|
Here is a simple server example. It makes use of a buffering
|
|
|
|
BIO to allow lines to be read from the SSL BIO using BIO_gets.
|
|
|
|
It creates a pseudo web page containing the actual request from
|
|
|
|
a client and also echoes the request to standard output.
|
|
|
|
|
|
|
|
BIO *sbio, *bbio, *acpt, *out;
|
|
|
|
int len;
|
|
|
|
char tmpbuf[1024];
|
|
|
|
SSL_CTX *ctx;
|
|
|
|
SSL *ssl;
|
|
|
|
|
2016-05-21 08:52:46 +08:00
|
|
|
/* XXX Seed the PRNG if needed. */
|
2000-09-17 05:21:01 +08:00
|
|
|
|
2015-03-31 21:29:53 +08:00
|
|
|
ctx = SSL_CTX_new(TLS_server_method());
|
2016-05-21 08:52:46 +08:00
|
|
|
if (!SSL_CTX_use_certificate_file(ctx, "server.pem", SSL_FILETYPE_PEM)
|
|
|
|
|| !SSL_CTX_use_PrivateKey_file(ctx, "server.pem", SSL_FILETYPE_PEM)
|
|
|
|
|| !SSL_CTX_check_private_key(ctx)) {
|
|
|
|
fprintf(stderr, "Error setting up SSL_CTX\n");
|
|
|
|
ERR_print_errors_fp(stderr);
|
|
|
|
exit(1);
|
2000-09-17 05:21:01 +08:00
|
|
|
}
|
|
|
|
|
2016-05-21 08:52:46 +08:00
|
|
|
/* XXX Other things like set verify locations, EDH temp callbacks. */
|
2000-09-17 05:21:01 +08:00
|
|
|
|
|
|
|
/* New SSL BIO setup as server */
|
2016-07-19 21:27:53 +08:00
|
|
|
sbio = BIO_new_ssl(ctx, 0);
|
2000-09-17 05:21:01 +08:00
|
|
|
BIO_get_ssl(sbio, &ssl);
|
2016-05-21 08:52:46 +08:00
|
|
|
if (ssl == NULL) {
|
|
|
|
fprintf(stderr, "Can't locate SSL pointer\n");
|
|
|
|
ERR_print_errors_fp(stderr);
|
|
|
|
exit(1);
|
2000-09-17 05:21:01 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
bbio = BIO_new(BIO_f_buffer());
|
|
|
|
sbio = BIO_push(bbio, sbio);
|
2016-05-21 08:52:46 +08:00
|
|
|
acpt = BIO_new_accept("4433");
|
2000-09-17 05:21:01 +08:00
|
|
|
|
2016-05-21 08:52:46 +08:00
|
|
|
/*
|
|
|
|
* By doing this when a new connection is established
|
2000-09-17 05:21:01 +08:00
|
|
|
* we automatically have sbio inserted into it. The
|
|
|
|
* BIO chain is now 'swallowed' by the accept BIO and
|
2016-05-20 20:11:46 +08:00
|
|
|
* will be freed when the accept BIO is freed.
|
2000-09-17 05:21:01 +08:00
|
|
|
*/
|
2016-05-21 08:52:46 +08:00
|
|
|
BIO_set_accept_bios(acpt, sbio);
|
2000-09-17 05:21:01 +08:00
|
|
|
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
|
|
|
|
|
|
|
/* Setup accept BIO */
|
2016-05-21 08:52:46 +08:00
|
|
|
if (BIO_do_accept(acpt) <= 0) {
|
|
|
|
fprintf(stderr, "Error setting up accept BIO\n");
|
|
|
|
ERR_print_errors_fp(stderr);
|
|
|
|
exit(1);
|
2000-09-17 05:21:01 +08:00
|
|
|
}
|
|
|
|
|
2016-05-21 08:52:46 +08:00
|
|
|
/* We only want one connection so remove and free accept BIO */
|
2000-09-17 05:21:01 +08:00
|
|
|
sbio = BIO_pop(acpt);
|
|
|
|
BIO_free_all(acpt);
|
|
|
|
|
2016-05-21 08:52:46 +08:00
|
|
|
if (BIO_do_handshake(sbio) <= 0) {
|
|
|
|
fprintf(stderr, "Error in SSL handshake\n");
|
|
|
|
ERR_print_errors_fp(stderr);
|
|
|
|
exit(1);
|
2000-09-17 05:21:01 +08:00
|
|
|
}
|
|
|
|
|
2003-11-28 22:32:31 +08:00
|
|
|
BIO_puts(sbio, "HTTP/1.0 200 OK\r\nContent-type: text/plain\r\n\r\n");
|
|
|
|
BIO_puts(sbio, "\r\nConnection Established\r\nRequest headers:\r\n");
|
2000-09-17 05:21:01 +08:00
|
|
|
BIO_puts(sbio, "--------------------------------------------------\r\n");
|
|
|
|
|
2016-11-19 07:10:05 +08:00
|
|
|
for (;;) {
|
2016-05-21 08:52:46 +08:00
|
|
|
len = BIO_gets(sbio, tmpbuf, 1024);
|
|
|
|
if (len <= 0)
|
|
|
|
break;
|
|
|
|
BIO_write(sbio, tmpbuf, len);
|
|
|
|
BIO_write(out, tmpbuf, len);
|
|
|
|
/* Look for blank line signifying end of headers*/
|
|
|
|
if (tmpbuf[0] == '\r' || tmpbuf[0] == '\n')
|
|
|
|
break;
|
2000-09-17 05:21:01 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
BIO_puts(sbio, "--------------------------------------------------\r\n");
|
2003-11-28 22:32:31 +08:00
|
|
|
BIO_puts(sbio, "\r\n");
|
2000-09-17 05:21:01 +08:00
|
|
|
BIO_flush(sbio);
|
|
|
|
BIO_free_all(sbio);
|
|
|
|
|
2017-07-15 21:39:45 +08:00
|
|
|
=head1 HISTORY
|
2009-06-25 19:29:30 +08:00
|
|
|
|
2017-07-15 21:39:45 +08:00
|
|
|
In OpenSSL before 1.0.0 the BIO_pop() call was handled incorrectly,
|
2009-06-25 19:29:30 +08:00
|
|
|
the I/O BIO reference count was incorrectly incremented (instead of
|
|
|
|
decremented) and dissociated with the SSL BIO even if the SSL BIO was not
|
|
|
|
explicitly being popped (e.g. a pop higher up the chain). Applications which
|
|
|
|
included workarounds for this bug (e.g. freeing BIOs more than once) should
|
|
|
|
be modified to handle this fix or they may free up an already freed BIO.
|
|
|
|
|
2016-05-18 23:44:05 +08:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2021-04-08 20:04:41 +08:00
|
|
|
Copyright 2000-2021 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 23:44:05 +08:00
|
|
|
|
2018-12-06 21:04:44 +08:00
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 23:44:05 +08:00
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|