2000-09-14 21:11:56 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2000-09-16 23:39:28 +08:00
|
|
|
SSL_shutdown - shut down a TLS/SSL connection
|
2000-09-14 21:11:56 +08:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/ssl.h>
|
|
|
|
|
|
|
|
int SSL_shutdown(SSL *ssl);
|
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
2001-02-13 22:00:09 +08:00
|
|
|
SSL_shutdown() shuts down an active TLS/SSL connection. It sends the
|
|
|
|
"close notify" shutdown alert to the peer.
|
|
|
|
|
|
|
|
=head1 NOTES
|
|
|
|
|
|
|
|
SSL_shutdown() tries to send the "close notify" shutdown alert to the peer.
|
|
|
|
Whether the operation succeeds or not, the SSL_SENT_SHUTDOWN flag is set and
|
|
|
|
a currently open session is considered closed and good and will be kept in the
|
|
|
|
session cache for further reuse.
|
|
|
|
|
2001-08-16 22:27:55 +08:00
|
|
|
The shutdown procedure consists of 2 steps: the sending of the "close notify"
|
2001-08-17 17:08:32 +08:00
|
|
|
shutdown alert and the reception of the peer's "close notify" shutdown
|
|
|
|
alert. According to the TLS standard, it is acceptable for an application
|
|
|
|
to only send its shutdown alert and then close the underlying connection
|
|
|
|
without waiting for the peer's response (this way resources can be saved,
|
|
|
|
as the process can already terminate or serve another connection).
|
|
|
|
When the underlying connection shall be used for more communications, the
|
|
|
|
complete shutdown procedure (bidirectional "close notify" alerts) must be
|
|
|
|
performed, so that the peers stay synchronized.
|
|
|
|
|
|
|
|
SSL_shutdown() supports both uni- and bidirectional shutdown by its 2 step
|
|
|
|
behaviour.
|
2001-08-16 22:27:55 +08:00
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
|
|
|
=item When the application is the first party to send the "close notify"
|
2004-11-14 21:55:16 +08:00
|
|
|
alert, SSL_shutdown() will only send the alert and then set the
|
2001-08-16 22:27:55 +08:00
|
|
|
SSL_SENT_SHUTDOWN flag (so that the session is considered good and will
|
2001-08-17 17:08:32 +08:00
|
|
|
be kept in cache). SSL_shutdown() will then return with 0. If a unidirectional
|
|
|
|
shutdown is enough (the underlying connection shall be closed anyway), this
|
|
|
|
first call to SSL_shutdown() is sufficient. In order to complete the
|
|
|
|
bidirectional shutdown handshake, SSL_shutdown() must be called again.
|
2001-08-16 22:27:55 +08:00
|
|
|
The second call will make SSL_shutdown() wait for the peer's "close notify"
|
|
|
|
shutdown alert. On success, the second call to SSL_shutdown() will return
|
|
|
|
with 1.
|
|
|
|
|
|
|
|
=item If the peer already sent the "close notify" alert B<and> it was
|
2001-08-20 22:34:16 +08:00
|
|
|
already processed implicitly inside another function
|
|
|
|
(L<SSL_read(3)|SSL_read(3)>), the SSL_RECEIVED_SHUTDOWN flag is set.
|
|
|
|
SSL_shutdown() will send the "close notify" alert, set the SSL_SENT_SHUTDOWN
|
|
|
|
flag and will immediately return with 1.
|
|
|
|
Whether SSL_RECEIVED_SHUTDOWN is already set can be checked using the
|
|
|
|
SSL_get_shutdown() (see also L<SSL_set_shutdown(3)|SSL_set_shutdown(3)> call.
|
2001-08-16 22:27:55 +08:00
|
|
|
|
|
|
|
=back
|
|
|
|
|
|
|
|
It is therefore recommended, to check the return value of SSL_shutdown()
|
|
|
|
and call SSL_shutdown() again, if the bidirectional shutdown is not yet
|
2014-11-30 22:35:22 +08:00
|
|
|
complete (return value of the first call is 0).
|
2001-08-16 22:27:55 +08:00
|
|
|
|
|
|
|
The behaviour of SSL_shutdown() additionally depends on the underlying BIO.
|
2000-09-14 21:11:56 +08:00
|
|
|
|
2000-09-16 23:39:28 +08:00
|
|
|
If the underlying BIO is B<blocking>, SSL_shutdown() will only return once the
|
2001-08-16 22:27:55 +08:00
|
|
|
handshake step has been finished or an error occurred.
|
2000-09-14 21:11:56 +08:00
|
|
|
|
2000-09-16 23:39:28 +08:00
|
|
|
If the underlying BIO is B<non-blocking>, SSL_shutdown() will also return
|
2000-09-14 21:11:56 +08:00
|
|
|
when the underlying BIO could not satisfy the needs of SSL_shutdown()
|
|
|
|
to continue the handshake. In this case a call to SSL_get_error() with the
|
2000-09-16 23:39:28 +08:00
|
|
|
return value of SSL_shutdown() will yield B<SSL_ERROR_WANT_READ> or
|
|
|
|
B<SSL_ERROR_WANT_WRITE>. The calling process then must repeat the call after
|
2000-09-14 21:11:56 +08:00
|
|
|
taking appropriate action to satisfy the needs of SSL_shutdown().
|
|
|
|
The action depends on the underlying BIO. When using a non-blocking socket,
|
|
|
|
nothing is to be done, but select() can be used to check for the required
|
|
|
|
condition. When using a buffering BIO, like a BIO pair, data must be written
|
|
|
|
into or retrieved out of the BIO before being able to continue.
|
|
|
|
|
2001-08-17 23:09:31 +08:00
|
|
|
SSL_shutdown() can be modified to only set the connection to "shutdown"
|
|
|
|
state but not actually send the "close notify" alert messages,
|
|
|
|
see L<SSL_CTX_set_quiet_shutdown(3)|SSL_CTX_set_quiet_shutdown(3)>.
|
|
|
|
When "quiet shutdown" is enabled, SSL_shutdown() will always succeed
|
|
|
|
and return 1.
|
|
|
|
|
2000-09-14 21:11:56 +08:00
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
|
|
|
The following return values can occur:
|
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
2013-10-21 17:03:01 +08:00
|
|
|
=item Z<>0
|
2000-09-14 21:11:56 +08:00
|
|
|
|
2001-08-17 17:08:32 +08:00
|
|
|
The shutdown is not yet finished. Call SSL_shutdown() for a second time,
|
|
|
|
if a bidirectional shutdown shall be performed.
|
2001-08-16 22:27:55 +08:00
|
|
|
The output of L<SSL_get_error(3)|SSL_get_error(3)> may be misleading, as an
|
|
|
|
erroneous SSL_ERROR_SYSCALL may be flagged even though no error occurred.
|
2000-09-14 21:11:56 +08:00
|
|
|
|
2013-10-21 17:03:01 +08:00
|
|
|
=item Z<>1
|
2013-02-16 01:44:11 +08:00
|
|
|
|
|
|
|
The shutdown was successfully completed. The "close notify" alert was sent
|
|
|
|
and the peer's "close notify" alert was received.
|
|
|
|
|
2014-08-14 02:42:23 +08:00
|
|
|
=item E<lt>0
|
2000-09-14 21:11:56 +08:00
|
|
|
|
2000-09-16 23:39:28 +08:00
|
|
|
The shutdown was not successful because a fatal error occurred either
|
2001-08-16 22:27:55 +08:00
|
|
|
at the protocol level or a connection failure occurred. It can also occur if
|
2000-09-14 21:11:56 +08:00
|
|
|
action is need to continue the operation for non-blocking BIOs.
|
2001-08-16 22:27:55 +08:00
|
|
|
Call L<SSL_get_error(3)|SSL_get_error(3)> with the return value B<ret>
|
|
|
|
to find out the reason.
|
2000-09-14 21:11:56 +08:00
|
|
|
|
|
|
|
=back
|
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
|
|
|
L<SSL_get_error(3)|SSL_get_error(3)>, L<SSL_connect(3)|SSL_connect(3)>,
|
2001-02-13 22:00:09 +08:00
|
|
|
L<SSL_accept(3)|SSL_accept(3)>, L<SSL_set_shutdown(3)|SSL_set_shutdown(3)>,
|
2001-08-17 23:09:31 +08:00
|
|
|
L<SSL_CTX_set_quiet_shutdown(3)|SSL_CTX_set_quiet_shutdown(3)>,
|
2001-04-12 19:45:42 +08:00
|
|
|
L<SSL_clear(3)|SSL_clear(3)>, L<SSL_free(3)|SSL_free(3)>,
|
2001-02-13 22:00:09 +08:00
|
|
|
L<ssl(3)|ssl(3)>, L<bio(3)|bio(3)>
|
2000-09-14 21:11:56 +08:00
|
|
|
|
|
|
|
=cut
|