BIO_f_ssl.pod 9.6 KB
Newer Older
D
Dr. Stephen Henson 已提交
1 2 3 4 5 6 7 8 9
=pod

=head1 NAME

BIO_f_ssl, BIO_set_ssl, BIO_get_ssl, BIO_set_ssl_mode, BIO_set_ssl_renegotiate_bytes,
BIO_get_num_renegotiates, BIO_set_ssl_renegotiate_timeout, BIO_new_ssl,
BIO_new_ssl_connect, BIO_new_buffer_ssl_connect, BIO_ssl_copy_session_id,
BIO_ssl_shutdown - SSL BIO

R
Rich Salz 已提交
10 11
=for comment multiple includes

D
Dr. Stephen Henson 已提交
12 13 14 15 16
=head1 SYNOPSIS

 #include <openssl/bio.h>
 #include <openssl/ssl.h>

17
 const BIO_METHOD *BIO_f_ssl(void);
D
Dr. Stephen Henson 已提交
18

R
Rich Salz 已提交
19 20 21
 #define BIO_set_ssl(b,ssl,c)   BIO_ctrl(b,BIO_C_SET_SSL,c,(char *)ssl)
 #define BIO_get_ssl(b,sslp)    BIO_ctrl(b,BIO_C_GET_SSL,0,(char *)sslp)
 #define BIO_set_ssl_mode(b,client)     BIO_ctrl(b,BIO_C_SSL_MODE,client,NULL)
D
Dr. Stephen Henson 已提交
22
 #define BIO_set_ssl_renegotiate_bytes(b,num) \
R
Rich Salz 已提交
23
        BIO_ctrl(b,BIO_C_SET_SSL_RENEGOTIATE_BYTES,num,NULL);
D
Dr. Stephen Henson 已提交
24
 #define BIO_set_ssl_renegotiate_timeout(b,seconds) \
R
Rich Salz 已提交
25
        BIO_ctrl(b,BIO_C_SET_SSL_RENEGOTIATE_TIMEOUT,seconds,NULL);
D
Dr. Stephen Henson 已提交
26
 #define BIO_get_num_renegotiates(b) \
R
Rich Salz 已提交
27
        BIO_ctrl(b,BIO_C_SET_SSL_NUM_RENEGOTIATES,0,NULL);
D
Dr. Stephen Henson 已提交
28 29 30 31 32 33 34

 BIO *BIO_new_ssl(SSL_CTX *ctx,int client);
 BIO *BIO_new_ssl_connect(SSL_CTX *ctx);
 BIO *BIO_new_buffer_ssl_connect(SSL_CTX *ctx);
 int BIO_ssl_copy_session_id(BIO *to,BIO *from);
 void BIO_ssl_shutdown(BIO *bio);

R
Rich Salz 已提交
35
 #define BIO_do_handshake(b)    BIO_ctrl(b,BIO_C_DO_STATE_MACHINE,0,NULL)
36

D
Dr. Stephen Henson 已提交
37 38 39
=head1 DESCRIPTION

BIO_f_ssl() returns the SSL BIO method. This is a filter BIO which
40
is a wrapper round the OpenSSL SSL routines adding a BIO "flavour" to
R
Rich Salz 已提交
41
SSL I/O.
D
Dr. Stephen Henson 已提交
42 43

I/O performed on an SSL BIO communicates using the SSL protocol with
44 45
the SSLs read and write BIOs. If an SSL connection is not established
then an attempt is made to establish one on the first I/O call.
D
Dr. Stephen Henson 已提交
46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67

If a BIO is appended to an SSL BIO using BIO_push() it is automatically
used as the SSL BIOs read and write BIOs.

Calling BIO_reset() on an SSL BIO closes down any current SSL connection
by calling SSL_shutdown(). BIO_reset() is then sent to the next BIO in
the chain: this will typically disconnect the underlying transport.
The SSL BIO is then reset to the initial accept or connect state.

If the close flag is set when an SSL BIO is freed then the internal
SSL structure is also freed using SSL_free().

BIO_set_ssl() sets the internal SSL pointer of BIO B<b> to B<ssl> using
the close flag B<c>.

BIO_get_ssl() retrieves the SSL pointer of BIO B<b>, it can then be
manipulated using the standard SSL library functions.

BIO_set_ssl_mode() sets the SSL BIO mode to B<client>. If B<client>
is 1 client mode is set. If B<client> is 0 server mode is set.

BIO_set_ssl_renegotiate_bytes() sets the renegotiate byte count
R
Rich Salz 已提交
68
to B<num>. When set after every B<num> bytes of I/O (read and write)
D
Dr. Stephen Henson 已提交
69 70 71 72
the SSL session is automatically renegotiated. B<num> must be at
least 512 bytes.

BIO_set_ssl_renegotiate_timeout() sets the renegotiate timeout to
U
Ulf Möller 已提交
73
B<seconds>. When the renegotiate timeout elapses the session is
D
Dr. Stephen Henson 已提交
74 75 76 77 78 79 80 81 82 83 84 85 86 87 88
automatically renegotiated.

BIO_get_num_renegotiates() returns the total number of session
renegotiations due to I/O or timeout.

BIO_new_ssl() allocates an SSL BIO using SSL_CTX B<ctx> and using
client mode if B<client> is non zero.

BIO_new_ssl_connect() creates a new BIO chain consisting of an
SSL BIO (using B<ctx>) followed by a connect BIO.

BIO_new_buffer_ssl_connect() creates a new BIO chain consisting
of a buffering BIO, an SSL BIO (using B<ctx>) and a connect
BIO.

R
Rich Salz 已提交
89
BIO_ssl_copy_session_id() copies an SSL session id between
D
Dr. Stephen Henson 已提交
90 91 92 93 94 95 96 97 98
BIO chains B<from> and B<to>. It does this by locating the
SSL BIOs in each chain and calling SSL_copy_session_id() on
the internal SSL pointer.

BIO_ssl_shutdown() closes down an SSL connection on BIO
chain B<bio>. It does this by locating the SSL BIO in the
chain and calling SSL_shutdown() on its internal SSL
pointer.

99 100 101 102 103 104 105 106
BIO_do_handshake() attempts to complete an SSL handshake on the
supplied BIO and establish the SSL connection. It returns 1
if the connection was established successfully. A zero or negative
value is returned if the connection could not be established, the
call BIO_should_retry() should be used for non blocking connect BIOs
to determine if the call should be retried. If an SSL connection has
already been established this call has no effect.

D
Dr. Stephen Henson 已提交
107 108 109 110 111 112
=head1 NOTES

SSL BIOs are exceptional in that if the underlying transport
is non blocking they can still request a retry in exceptional
circumstances. Specifically this will happen if a session
renegotiation takes place during a BIO_read() operation, one
D
Dr. Stephen Henson 已提交
113
case where this happens is when step up occurs.
D
Dr. Stephen Henson 已提交
114

R
Rich Salz 已提交
115
The SSL flag SSL_AUTO_RETRY can be
116
set to disable this behaviour. That is when this flag is set
D
Dr. Stephen Henson 已提交
117 118 119 120 121 122 123 124
an SSL BIO using a blocking transport will never request a
retry.

Since unknown BIO_ctrl() operations are sent through filter
BIOs the servers name and port can be set using BIO_set_host()
on the BIO returned by BIO_new_ssl_connect() without having
to locate the connect BIO first.

125 126 127 128
Applications do not have to call BIO_do_handshake() but may wish
to do so to separate the handshake process from other I/O
processing.

D
Dr. Stephen Henson 已提交
129 130 131 132
=head1 EXAMPLE

This SSL/TLS client example, attempts to retrieve a page from an
SSL/TLS web server. The I/O routines are identical to those of the
R
Rich Salz 已提交
133
unencrypted example in L<BIO_s_connect(3)>.
D
Dr. Stephen Henson 已提交
134 135 136 137 138 139 140

 BIO *sbio, *out;
 int len;
 char tmpbuf[1024];
 SSL_CTX *ctx;
 SSL *ssl;

R
Rich Salz 已提交
141
 /* XXX Seed the PRNG if needed. */
142

143
 ctx = SSL_CTX_new(TLS_client_method());
D
Dr. Stephen Henson 已提交
144

R
Rich Salz 已提交
145
 /* XXX Set verify paths and mode here. */
D
Dr. Stephen Henson 已提交
146 147 148

 sbio = BIO_new_ssl_connect(ctx);
 BIO_get_ssl(sbio, &ssl);
R
Rich Salz 已提交
149 150 151 152
 if (ssl == NULL) {
     fprintf(stderr, "Can't locate SSL pointer\n");
     ERR_print_errors_fp(stderr);
     exit(1);
D
Dr. Stephen Henson 已提交
153 154 155 156 157
 }

 /* Don't want any retries */
 SSL_set_mode(ssl, SSL_MODE_AUTO_RETRY);

R
Rich Salz 已提交
158
 /* XXX We might want to do other things with ssl here */
D
Dr. Stephen Henson 已提交
159

160 161
 /* An empty host part means the loopback address */
 BIO_set_conn_hostname(sbio, ":https");
D
Dr. Stephen Henson 已提交
162 163

 out = BIO_new_fp(stdout, BIO_NOCLOSE);
R
Rich Salz 已提交
164 165 166 167
 if (BIO_do_connect(sbio) <= 0) {
     fprintf(stderr, "Error connecting to server\n");
     ERR_print_errors_fp(stderr);
     exit(1);
168
 }
R
Rich Salz 已提交
169
 if (BIO_do_handshake(sbio) <= 0) {
R
Rich Salz 已提交
170 171
        fprintf(stderr, "Error establishing SSL connection\n");
        ERR_print_errors_fp(stderr);
R
Rich Salz 已提交
172
        exit(1);
173
 }
D
Dr. Stephen Henson 已提交
174

R
Rich Salz 已提交
175
 /* XXX Could examine ssl here to get connection info */
D
Dr. Stephen Henson 已提交
176 177

 BIO_puts(sbio, "GET / HTTP/1.0\n\n");
R
Rich Salz 已提交
178 179 180 181 182
 for ( ; ; ) {
     len = BIO_read(sbio, tmpbuf, 1024);
     if(len <= 0)
         break;
     BIO_write(out, tmpbuf, len);
D
Dr. Stephen Henson 已提交
183 184 185 186
 }
 BIO_free_all(sbio);
 BIO_free(out);

187 188 189 190 191 192 193 194 195 196 197
Here is a simple server example. It makes use of a buffering
BIO to allow lines to be read from the SSL BIO using BIO_gets.
It creates a pseudo web page containing the actual request from
a client and also echoes the request to standard output.

 BIO *sbio, *bbio, *acpt, *out;
 int len;
 char tmpbuf[1024];
 SSL_CTX *ctx;
 SSL *ssl;

R
Rich Salz 已提交
198
 /* XXX Seed the PRNG if needed. */
199

200
 ctx = SSL_CTX_new(TLS_server_method());
R
Rich Salz 已提交
201 202 203 204 205 206
 if (!SSL_CTX_use_certificate_file(ctx, "server.pem", SSL_FILETYPE_PEM)
         || !SSL_CTX_use_PrivateKey_file(ctx, "server.pem", SSL_FILETYPE_PEM)
         || !SSL_CTX_check_private_key(ctx)) {
     fprintf(stderr, "Error setting up SSL_CTX\n");
     ERR_print_errors_fp(stderr);
     exit(1);
207 208
 }

R
Rich Salz 已提交
209
 /* XXX Other things like set verify locations, EDH temp callbacks. */
210 211

 /* New SSL BIO setup as server */
R
Rich Salz 已提交
212
 sbio = BIO_new_ssl(ctx,0);
213
 BIO_get_ssl(sbio, &ssl);
R
Rich Salz 已提交
214 215 216 217
 if (ssl == NULL) {
     fprintf(stderr, "Can't locate SSL pointer\n");
     ERR_print_errors_fp(stderr);
     exit(1);
218 219 220 221 222
 }

 SSL_set_mode(ssl, SSL_MODE_AUTO_RETRY);
 bbio = BIO_new(BIO_f_buffer());
 sbio = BIO_push(bbio, sbio);
R
Rich Salz 已提交
223
 acpt = BIO_new_accept("4433");
224

R
Rich Salz 已提交
225 226
 /*
  * By doing this when a new connection is established
227 228
  * we automatically have sbio inserted into it. The
  * BIO chain is now 'swallowed' by the accept BIO and
R
Rich Salz 已提交
229
  * will be freed when the accept BIO is freed.
230
  */
R
Rich Salz 已提交
231
 BIO_set_accept_bios(acpt, sbio);
232 233 234
 out = BIO_new_fp(stdout, BIO_NOCLOSE);

 /* Setup accept BIO */
R
Rich Salz 已提交
235 236 237 238
 if (BIO_do_accept(acpt) <= 0) {
     fprintf(stderr, "Error setting up accept BIO\n");
     ERR_print_errors_fp(stderr);
     exit(1);
239 240
 }

R
Rich Salz 已提交
241 242 243 244
 if (BIO_do_accept(acpt) <= 0) {
     fprintf(stderr, "Error in connection\n");
     ERR_print_errors_fp(stderr);
     exit(1);
245 246
 }

R
Rich Salz 已提交
247
 /* We only want one connection so remove and free accept BIO */
248 249 250
 sbio = BIO_pop(acpt);
 BIO_free_all(acpt);

R
Rich Salz 已提交
251 252 253 254
 if (BIO_do_handshake(sbio) <= 0) {
     fprintf(stderr, "Error in SSL handshake\n");
     ERR_print_errors_fp(stderr);
     exit(1);
255 256
 }

257 258
 BIO_puts(sbio, "HTTP/1.0 200 OK\r\nContent-type: text/plain\r\n\r\n");
 BIO_puts(sbio, "\r\nConnection Established\r\nRequest headers:\r\n");
259 260
 BIO_puts(sbio, "--------------------------------------------------\r\n");

R
Rich Salz 已提交
261 262 263 264 265 266 267 268 269
 for ( ; ; ) {
     len = BIO_gets(sbio, tmpbuf, 1024);
     if (len <= 0)
         break;
     BIO_write(sbio, tmpbuf, len);
     BIO_write(out, tmpbuf, len);
     /* Look for blank line signifying end of headers*/
     if (tmpbuf[0] == '\r' || tmpbuf[0] == '\n')
         break;
270 271 272
 }

 BIO_puts(sbio, "--------------------------------------------------\r\n");
273
 BIO_puts(sbio, "\r\n");
274 275 276
 BIO_flush(sbio);
 BIO_free_all(sbio);

D
Dr. Stephen Henson 已提交
277 278 279 280 281 282 283 284 285
=head1 BUGS

In OpenSSL versions before 1.0.0 the BIO_pop() call was handled incorrectly,
the I/O BIO reference count was incorrectly incremented (instead of
decremented) and dissociated with the SSL BIO even if the SSL BIO was not
explicitly being popped (e.g. a pop higher up the chain). Applications which
included workarounds for this bug (e.g. freeing BIOs more than once) should
be modified to handle this fix or they may free up an already freed BIO.

R
Rich Salz 已提交
286 287 288 289 290 291 292 293 294 295
=head1 COPYRIGHT

Copyright 2000-2016 The OpenSSL Project Authors. All Rights Reserved.

Licensed under the OpenSSL license (the "License").  You may not use
this file except in compliance with the License.  You can obtain a copy
in the file LICENSE in the source distribution or at
L<https://www.openssl.org/source/license.html>.

=cut