2017-02-24 23:38:38 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
|
|
|
SSL_set_max_early_data,
|
|
|
|
SSL_CTX_set_max_early_data,
|
|
|
|
SSL_get_max_early_data,
|
|
|
|
SSL_CTX_get_max_early_data,
|
|
|
|
SSL_SESSION_get_max_early_data,
|
2017-07-14 01:02:18 +08:00
|
|
|
SSL_SESSION_set_max_early_data,
|
2017-03-02 23:05:36 +08:00
|
|
|
SSL_write_early_data,
|
2017-03-02 22:42:55 +08:00
|
|
|
SSL_read_early_data,
|
2017-02-24 23:38:38 +08:00
|
|
|
SSL_get_early_data_status
|
|
|
|
- functions for sending and receiving early data
|
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/ssl.h>
|
|
|
|
|
|
|
|
int SSL_CTX_set_max_early_data(SSL_CTX *ctx, uint32_t max_early_data);
|
|
|
|
uint32_t SSL_CTX_get_max_early_data(const SSL_CTX *ctx);
|
|
|
|
int SSL_set_max_early_data(SSL *s, uint32_t max_early_data);
|
2017-03-31 00:54:39 +08:00
|
|
|
uint32_t SSL_get_max_early_data(const SSL *s);
|
2017-02-24 23:38:38 +08:00
|
|
|
uint32_t SSL_SESSION_get_max_early_data(const SSL_SESSION *s);
|
2017-07-14 01:02:18 +08:00
|
|
|
int SSL_SESSION_set_max_early_data(SSL_SESSION *s, uint32_t max_early_data);
|
2017-02-24 23:38:38 +08:00
|
|
|
|
2017-03-02 23:05:36 +08:00
|
|
|
int SSL_write_early_data(SSL *s, const void *buf, size_t num, size_t *written);
|
2017-02-24 23:38:38 +08:00
|
|
|
|
2017-03-02 22:42:55 +08:00
|
|
|
int SSL_read_early_data(SSL *s, void *buf, size_t num, size_t *readbytes);
|
2017-02-24 23:38:38 +08:00
|
|
|
|
|
|
|
int SSL_get_early_data_status(const SSL *s);
|
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
2017-05-19 08:16:38 +08:00
|
|
|
These functions are used to send and receive early data where TLSv1.3 has been
|
2017-03-03 00:05:02 +08:00
|
|
|
negotiated. Early data can be sent by the client immediately after its initial
|
|
|
|
ClientHello without having to wait for the server to complete the handshake.
|
|
|
|
Early data can only be sent if a session has previously been established with
|
|
|
|
the server, and the server is known to support it. Additionally these functions
|
|
|
|
can be used to send data from the server to the client when the client has not
|
|
|
|
yet completed the authentication stage of the handshake.
|
2017-02-24 23:38:38 +08:00
|
|
|
|
|
|
|
Early data has weaker security properties than other data sent over an SSL/TLS
|
2017-03-03 00:05:02 +08:00
|
|
|
connection. In particular the data does not have forward secrecy and there are
|
|
|
|
no guarantees that the same early data was not replayed across multiple
|
2017-02-24 23:38:38 +08:00
|
|
|
connections. For this reason extreme care should be exercised when using early
|
2017-03-03 01:40:43 +08:00
|
|
|
data. For specific details, consult the TLS 1.3 specification.
|
2017-02-24 23:38:38 +08:00
|
|
|
|
2017-02-28 08:40:24 +08:00
|
|
|
When a server receives early data it may opt to immediately respond by sending
|
|
|
|
application data back to the client. Data sent by the server at this stage is
|
|
|
|
done before the full handshake has been completed. Specifically the client's
|
|
|
|
authentication messages have not yet been received, i.e. the client is
|
2017-03-03 00:05:02 +08:00
|
|
|
unauthenticated at this point and care should be taken when using this
|
|
|
|
capability.
|
2017-02-28 08:40:24 +08:00
|
|
|
|
|
|
|
A server or client can determine whether the full handshake has been completed
|
|
|
|
or not by calling L<SSL_is_init_finished(3)>.
|
|
|
|
|
2017-03-03 00:05:02 +08:00
|
|
|
On the client side, the function SSL_SESSION_get_max_early_data() can be used to
|
|
|
|
determine if a session established with a server can be used to send early data.
|
|
|
|
If the session cannot be used then this function will return 0. Otherwise it
|
|
|
|
will return the maximum number of early data bytes that can be sent.
|
2017-02-24 23:38:38 +08:00
|
|
|
|
2017-07-14 01:02:18 +08:00
|
|
|
The function SSL_SESSION_set_max_early_data() sets the maximum number of early
|
|
|
|
data bytes that can be sent for a session. This would typically be used when
|
2017-08-31 21:32:51 +08:00
|
|
|
creating a PSK session file (see L<SSL_CTX_set_psk_use_session_callback(3)>). If
|
|
|
|
using a ticket based PSK then this is set automatically to the value provided by
|
|
|
|
the server.
|
2017-07-14 01:02:18 +08:00
|
|
|
|
2017-03-02 23:05:36 +08:00
|
|
|
A client uses the function SSL_write_early_data() to send early data. This
|
2017-03-03 00:05:02 +08:00
|
|
|
function is similar to the L<SSL_write_ex(3)> function, but with the following
|
|
|
|
differences. See L<SSL_write_ex(3)> for information on how to write bytes to
|
|
|
|
the underlying connection, and how to handle any errors that may arise. This
|
|
|
|
page describes the differences between SSL_write_early_data() and
|
|
|
|
L<SSL_write_ex(3)>.
|
2017-02-24 23:38:38 +08:00
|
|
|
|
2017-03-02 23:49:33 +08:00
|
|
|
When called by a client, SSL_write_early_data() must be the first IO function
|
|
|
|
called on a new connection, i.e. it must occur before any calls to
|
|
|
|
L<SSL_write_ex(3)>, L<SSL_read_ex(3)>, L<SSL_connect(3)>, L<SSL_do_handshake(3)>
|
|
|
|
or other similar functions. It may be called multiple times to stream data to
|
|
|
|
the server, but the total number of bytes written must not exceed the value
|
|
|
|
returned from SSL_SESSION_get_max_early_data(). Once the initial
|
|
|
|
SSL_write_early_data() call has completed successfully the client may interleave
|
|
|
|
calls to L<SSL_read_ex(3)> and L<SSL_read(3)> with calls to
|
|
|
|
SSL_write_early_data() as required.
|
2017-02-24 23:38:38 +08:00
|
|
|
|
2017-03-02 23:05:36 +08:00
|
|
|
If SSL_write_early_data() fails you should call L<SSL_get_error(3)> to determine
|
|
|
|
the correct course of action, as for L<SSL_write_ex(3)>.
|
2017-02-24 23:38:38 +08:00
|
|
|
|
2017-02-28 08:40:24 +08:00
|
|
|
When the client no longer wishes to send any more early data then it should
|
|
|
|
complete the handshake by calling a function such as L<SSL_connect(3)> or
|
|
|
|
L<SSL_do_handshake(3)>. Alternatively you can call a standard write function
|
|
|
|
such as L<SSL_write_ex(3)>, which will transparently complete the connection and
|
|
|
|
write the requested data.
|
2017-02-24 23:38:38 +08:00
|
|
|
|
|
|
|
A server may choose to ignore early data that has been sent to it. Once the
|
|
|
|
connection has been completed you can determine whether the server accepted or
|
|
|
|
rejected the early data by calling SSL_get_early_data_status(). This will return
|
|
|
|
SSL_EARLY_DATA_ACCEPTED if the data was accepted, SSL_EARLY_DATA_REJECTED if it
|
|
|
|
was rejected or SSL_EARLY_DATA_NOT_SENT if no early data was sent. This function
|
|
|
|
may be called by either the client or the server.
|
|
|
|
|
2017-03-02 22:42:55 +08:00
|
|
|
A server uses the SSL_read_early_data() function to receive early data on a
|
2017-03-02 23:05:36 +08:00
|
|
|
connection. As for SSL_write_early_data() this must be the first IO function
|
|
|
|
called on a connection, i.e. it must occur before any calls to
|
|
|
|
L<SSL_write_ex(3)>, L<SSL_read_ex(3)>, L<SSL_accept(3)>, L<SSL_do_handshake(3)>,
|
|
|
|
or other similar functions.
|
2017-02-24 23:38:38 +08:00
|
|
|
|
2017-03-03 00:05:02 +08:00
|
|
|
SSL_read_early_data() is similar to L<SSL_read_ex(3)> with the following
|
|
|
|
differences. Refer to L<SSL_read_ex(3)> for full details.
|
2017-02-24 23:38:38 +08:00
|
|
|
|
2017-03-02 22:42:55 +08:00
|
|
|
SSL_read_early_data() may return 3 possible values:
|
2017-02-24 23:38:38 +08:00
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
2017-03-02 22:42:55 +08:00
|
|
|
=item SSL_READ_EARLY_DATA_ERROR
|
2017-02-24 23:38:38 +08:00
|
|
|
|
2017-09-10 18:06:27 +08:00
|
|
|
This indicates an IO or some other error occurred. This should be treated in the
|
2017-02-24 23:38:38 +08:00
|
|
|
same way as a 0 return value from L<SSL_read_ex(3)>.
|
|
|
|
|
2017-03-02 22:42:55 +08:00
|
|
|
=item SSL_READ_EARLY_DATA_SUCCESS
|
2017-02-24 23:38:38 +08:00
|
|
|
|
|
|
|
This indicates that early data was successfully read. This should be treated in
|
|
|
|
the same way as a 1 return value from L<SSL_read_ex(3)>. You should continue to
|
2017-03-02 22:42:55 +08:00
|
|
|
call SSL_read_early_data() to read more data.
|
2017-02-24 23:38:38 +08:00
|
|
|
|
2017-03-02 22:42:55 +08:00
|
|
|
=item SSL_READ_EARLY_DATA_FINISH
|
2017-02-24 23:38:38 +08:00
|
|
|
|
|
|
|
This indicates that no more early data can be read. It may be returned on the
|
2017-03-02 22:42:55 +08:00
|
|
|
first call to SSL_read_early_data() if the client has not sent any early data,
|
|
|
|
or if the early data was rejected.
|
2017-02-24 23:38:38 +08:00
|
|
|
|
|
|
|
=back
|
|
|
|
|
2017-03-02 23:49:33 +08:00
|
|
|
Once the initial SSL_read_early_data() call has completed successfully (i.e. it
|
|
|
|
has returned SSL_READ_EARLY_DATA_SUCCESS or SSL_READ_EARLY_DATA_FINISH) then the
|
|
|
|
server may choose to write data immediately to the unauthenticated client using
|
|
|
|
SSL_write_early_data(). If SSL_read_early_data() returned
|
|
|
|
SSL_READ_EARLY_DATA_FINISH then in some situations (e.g. if the client only
|
2017-03-03 00:05:02 +08:00
|
|
|
supports TLSv1.2) the handshake may have already been completed and calls
|
2017-03-02 23:49:33 +08:00
|
|
|
to SSL_write_early_data() are not allowed. Call L<SSL_is_init_finished(3)> to
|
|
|
|
determine whether the handshake has completed or not. If the handshake is still
|
|
|
|
in progress then the server may interleave calls to SSL_write_early_data() with
|
|
|
|
calls to SSL_read_early_data() as required.
|
|
|
|
|
|
|
|
Servers must not call L<SSL_read_ex(3)>, L<SSL_read(3)>, L<SSL_write_ex(3)> or
|
|
|
|
L<SSL_write(3)> until SSL_read_early_data() has returned with
|
|
|
|
SSL_READ_EARLY_DATA_FINISH. Once it has done so the connection to the client
|
|
|
|
still needs to be completed. Complete the connection by calling a function such
|
|
|
|
as L<SSL_accept(3)> or L<SSL_do_handshake(3)>. Alternatively you can call a
|
|
|
|
standard read function such as L<SSL_read_ex(3)>, which will transparently
|
|
|
|
complete the connection and read the requested data. Note that it is an error to
|
|
|
|
attempt to complete the connection before SSL_read_early_data() has returned
|
|
|
|
SSL_READ_EARLY_DATA_FINISH.
|
2017-03-02 22:42:55 +08:00
|
|
|
|
|
|
|
Only servers may call SSL_read_early_data().
|
|
|
|
|
|
|
|
Calls to SSL_read_early_data() may, in certain circumstances, complete the
|
|
|
|
connection immediately without further need to call a function such as
|
2017-03-03 00:05:02 +08:00
|
|
|
L<SSL_accept(3)>. This can happen if the client is using a protocol version less
|
|
|
|
than TLSv1.3. Applications can test for this by calling
|
2017-03-02 22:42:55 +08:00
|
|
|
L<SSL_is_init_finished(3)>. Alternatively, applications may choose to call
|
2017-05-19 08:16:38 +08:00
|
|
|
L<SSL_accept(3)> anyway. Such a call will successfully return immediately with no
|
2017-03-02 22:42:55 +08:00
|
|
|
further action taken.
|
2017-02-28 08:40:24 +08:00
|
|
|
|
2017-02-24 23:38:38 +08:00
|
|
|
When a session is created between a server and a client the server will specify
|
|
|
|
the maximum amount of any early data that it will accept on any future
|
|
|
|
connection attempt. By default this is approximately 16k. A server may override
|
|
|
|
this default value by calling SSL_CTX_set_max_early_data() or
|
|
|
|
SSL_set_max_early_data() to set it for the whole SSL_CTX or an individual SSL
|
|
|
|
object respectively. Similarly the SSL_CTX_get_max_early_data() and
|
|
|
|
SSL_get_max_early_data() functions can be used to obtain the current maximum
|
|
|
|
early data settings for the SSL_CTX and SSL objects respectively.
|
|
|
|
|
|
|
|
In the event that the current maximum early data setting for the server is
|
|
|
|
different to that originally specified in a session that a client is resuming
|
|
|
|
with then the lower of the two values will apply.
|
|
|
|
|
2017-07-18 21:54:23 +08:00
|
|
|
=head1 NOTES
|
|
|
|
|
|
|
|
The whole purpose of early data is to enable a client to start sending data to
|
|
|
|
the server before a full round trip of network traffic has occurred. Application
|
|
|
|
developers should ensure they consider optimisation of the underlying TCP socket
|
|
|
|
to obtain a performant solution. For example Nagle's algorithm is commonly used
|
|
|
|
by operating systems in an attempt to avoid lots of small TCP packets. In many
|
|
|
|
scenarios this is beneficial for performance, but it does not work well with the
|
|
|
|
early data solution as implemented in OpenSSL. In Nagle's algorithm the OS will
|
|
|
|
buffer outgoing TCP data if a TCP packet has already been sent which we have not
|
|
|
|
yet received an ACK for from the peer. The buffered data will only be
|
|
|
|
transmitted if enough data to fill an entire TCP packet is accumulated, or if
|
|
|
|
the ACK is received from the peer. The initial ClientHello will be sent as the
|
|
|
|
first TCP packet, causing the early application data from calls to
|
|
|
|
SSL_write_early_data() to be buffered by the OS and not sent until an ACK is
|
|
|
|
received for the ClientHello packet. This means the early data is not actually
|
|
|
|
sent until a complete round trip with the server has occurred which defeats the
|
|
|
|
objective of early data.
|
|
|
|
|
|
|
|
In many operating systems the TCP_NODELAY socket option is available to disable
|
|
|
|
Nagle's algorithm. If an application opts to disable Nagle's algorithm
|
|
|
|
consideration should be given to turning it back on again after the handshake is
|
|
|
|
complete if appropriate.
|
|
|
|
|
2017-02-24 23:38:38 +08:00
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
2017-03-02 23:05:36 +08:00
|
|
|
SSL_write_early_data() returns 1 for success or 0 for failure. In the event of a
|
2017-02-28 08:40:24 +08:00
|
|
|
failure call L<SSL_get_error(3)> to determine the correct course of action.
|
2017-02-24 23:38:38 +08:00
|
|
|
|
2017-03-02 22:42:55 +08:00
|
|
|
SSL_read_early_data() returns SSL_READ_EARLY_DATA_ERROR for failure,
|
|
|
|
SSL_READ_EARLY_DATA_SUCCESS for success with more data to read and
|
2017-03-03 00:05:02 +08:00
|
|
|
SSL_READ_EARLY_DATA_FINISH for success with no more to data be read. In the
|
|
|
|
event of a failure call L<SSL_get_error(3)> to determine the correct course of
|
|
|
|
action.
|
2017-02-24 23:38:38 +08:00
|
|
|
|
|
|
|
SSL_get_max_early_data(), SSL_CTX_get_max_early_data() and
|
|
|
|
SSL_SESSION_get_max_early_data() return the maximum number of early data bytes
|
|
|
|
that may be sent.
|
|
|
|
|
2017-07-14 01:02:18 +08:00
|
|
|
SSL_set_max_early_data(), SSL_CTX_set_max_early_data() and
|
|
|
|
SSL_SESSION_set_max_early_data() return 1 for success or 0 for failure.
|
2017-02-24 23:38:38 +08:00
|
|
|
|
|
|
|
SSL_get_early_data_status() returns SSL_EARLY_DATA_ACCEPTED if early data was
|
|
|
|
accepted by the server, SSL_EARLY_DATA_REJECTED if early data was rejected by
|
|
|
|
the server, or SSL_EARLY_DATA_NOT_SENT if no early data was sent.
|
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
|
|
|
L<SSL_get_error(3)>,
|
|
|
|
L<SSL_write_ex(3)>,
|
|
|
|
L<SSL_read_ex(3)>,
|
|
|
|
L<SSL_connect(3)>,
|
|
|
|
L<SSL_accept(3)>,
|
|
|
|
L<SSL_do_handshake(3)>,
|
2017-07-14 01:02:18 +08:00
|
|
|
L<SSL_CTX_set_psk_use_session_callback(3)>,
|
2017-02-24 23:38:38 +08:00
|
|
|
L<ssl(7)>
|
|
|
|
|
|
|
|
=head1 HISTORY
|
|
|
|
|
|
|
|
All of the functions described above were added in OpenSSL 1.1.1.
|
|
|
|
|
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
|
|
|
Copyright 2017 The OpenSSL Project Authors. All Rights Reserved.
|
|
|
|
|
|
|
|
Licensed under the OpenSSL license (the "License"). You may not use
|
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|