BIO_f_ssl.pod 9.5 KB
Newer Older
D
Dr. Stephen Henson 已提交
1 2 3 4 5 6 7 8 9 10 11 12 13 14
=pod

=head1 NAME

BIO_f_ssl, BIO_set_ssl, BIO_get_ssl, BIO_set_ssl_mode, BIO_set_ssl_renegotiate_bytes,
BIO_get_num_renegotiates, BIO_set_ssl_renegotiate_timeout, BIO_new_ssl,
BIO_new_ssl_connect, BIO_new_buffer_ssl_connect, BIO_ssl_copy_session_id,
BIO_ssl_shutdown - SSL BIO

=head1 SYNOPSIS

 #include <openssl/bio.h>
 #include <openssl/ssl.h>

15
 const BIO_METHOD *BIO_f_ssl(void);
D
Dr. Stephen Henson 已提交
16

R
Rich Salz 已提交
17 18 19
 #define BIO_set_ssl(b,ssl,c)   BIO_ctrl(b,BIO_C_SET_SSL,c,(char *)ssl)
 #define BIO_get_ssl(b,sslp)    BIO_ctrl(b,BIO_C_GET_SSL,0,(char *)sslp)
 #define BIO_set_ssl_mode(b,client)     BIO_ctrl(b,BIO_C_SSL_MODE,client,NULL)
D
Dr. Stephen Henson 已提交
20
 #define BIO_set_ssl_renegotiate_bytes(b,num) \
R
Rich Salz 已提交
21
        BIO_ctrl(b,BIO_C_SET_SSL_RENEGOTIATE_BYTES,num,NULL);
D
Dr. Stephen Henson 已提交
22
 #define BIO_set_ssl_renegotiate_timeout(b,seconds) \
R
Rich Salz 已提交
23
        BIO_ctrl(b,BIO_C_SET_SSL_RENEGOTIATE_TIMEOUT,seconds,NULL);
D
Dr. Stephen Henson 已提交
24
 #define BIO_get_num_renegotiates(b) \
R
Rich Salz 已提交
25
        BIO_ctrl(b,BIO_C_SET_SSL_NUM_RENEGOTIATES,0,NULL);
D
Dr. Stephen Henson 已提交
26 27 28 29 30 31 32

 BIO *BIO_new_ssl(SSL_CTX *ctx,int client);
 BIO *BIO_new_ssl_connect(SSL_CTX *ctx);
 BIO *BIO_new_buffer_ssl_connect(SSL_CTX *ctx);
 int BIO_ssl_copy_session_id(BIO *to,BIO *from);
 void BIO_ssl_shutdown(BIO *bio);

R
Rich Salz 已提交
33
 #define BIO_do_handshake(b)    BIO_ctrl(b,BIO_C_DO_STATE_MACHINE,0,NULL)
34

D
Dr. Stephen Henson 已提交
35 36 37
=head1 DESCRIPTION

BIO_f_ssl() returns the SSL BIO method. This is a filter BIO which
38
is a wrapper round the OpenSSL SSL routines adding a BIO "flavour" to
R
Rich Salz 已提交
39
SSL I/O.
D
Dr. Stephen Henson 已提交
40 41

I/O performed on an SSL BIO communicates using the SSL protocol with
42 43
the SSLs read and write BIOs. If an SSL connection is not established
then an attempt is made to establish one on the first I/O call.
D
Dr. Stephen Henson 已提交
44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

If a BIO is appended to an SSL BIO using BIO_push() it is automatically
used as the SSL BIOs read and write BIOs.

Calling BIO_reset() on an SSL BIO closes down any current SSL connection
by calling SSL_shutdown(). BIO_reset() is then sent to the next BIO in
the chain: this will typically disconnect the underlying transport.
The SSL BIO is then reset to the initial accept or connect state.

If the close flag is set when an SSL BIO is freed then the internal
SSL structure is also freed using SSL_free().

BIO_set_ssl() sets the internal SSL pointer of BIO B<b> to B<ssl> using
the close flag B<c>.

BIO_get_ssl() retrieves the SSL pointer of BIO B<b>, it can then be
manipulated using the standard SSL library functions.

BIO_set_ssl_mode() sets the SSL BIO mode to B<client>. If B<client>
is 1 client mode is set. If B<client> is 0 server mode is set.

BIO_set_ssl_renegotiate_bytes() sets the renegotiate byte count
R
Rich Salz 已提交
66
to B<num>. When set after every B<num> bytes of I/O (read and write)
D
Dr. Stephen Henson 已提交
67 68 69 70
the SSL session is automatically renegotiated. B<num> must be at
least 512 bytes.

BIO_set_ssl_renegotiate_timeout() sets the renegotiate timeout to
U
Ulf Möller 已提交
71
B<seconds>. When the renegotiate timeout elapses the session is
D
Dr. Stephen Henson 已提交
72 73 74 75 76 77 78 79 80 81 82 83 84 85 86
automatically renegotiated.

BIO_get_num_renegotiates() returns the total number of session
renegotiations due to I/O or timeout.

BIO_new_ssl() allocates an SSL BIO using SSL_CTX B<ctx> and using
client mode if B<client> is non zero.

BIO_new_ssl_connect() creates a new BIO chain consisting of an
SSL BIO (using B<ctx>) followed by a connect BIO.

BIO_new_buffer_ssl_connect() creates a new BIO chain consisting
of a buffering BIO, an SSL BIO (using B<ctx>) and a connect
BIO.

R
Rich Salz 已提交
87
BIO_ssl_copy_session_id() copies an SSL session id between
D
Dr. Stephen Henson 已提交
88 89 90 91 92 93 94 95 96
BIO chains B<from> and B<to>. It does this by locating the
SSL BIOs in each chain and calling SSL_copy_session_id() on
the internal SSL pointer.

BIO_ssl_shutdown() closes down an SSL connection on BIO
chain B<bio>. It does this by locating the SSL BIO in the
chain and calling SSL_shutdown() on its internal SSL
pointer.

97 98 99 100 101 102 103 104
BIO_do_handshake() attempts to complete an SSL handshake on the
supplied BIO and establish the SSL connection. It returns 1
if the connection was established successfully. A zero or negative
value is returned if the connection could not be established, the
call BIO_should_retry() should be used for non blocking connect BIOs
to determine if the call should be retried. If an SSL connection has
already been established this call has no effect.

D
Dr. Stephen Henson 已提交
105 106 107 108 109 110
=head1 NOTES

SSL BIOs are exceptional in that if the underlying transport
is non blocking they can still request a retry in exceptional
circumstances. Specifically this will happen if a session
renegotiation takes place during a BIO_read() operation, one
D
Dr. Stephen Henson 已提交
111
case where this happens is when step up occurs.
D
Dr. Stephen Henson 已提交
112

R
Rich Salz 已提交
113
The SSL flag SSL_AUTO_RETRY can be
114
set to disable this behaviour. That is when this flag is set
D
Dr. Stephen Henson 已提交
115 116 117 118 119 120 121 122
an SSL BIO using a blocking transport will never request a
retry.

Since unknown BIO_ctrl() operations are sent through filter
BIOs the servers name and port can be set using BIO_set_host()
on the BIO returned by BIO_new_ssl_connect() without having
to locate the connect BIO first.

123 124 125 126
Applications do not have to call BIO_do_handshake() but may wish
to do so to separate the handshake process from other I/O
processing.

D
Dr. Stephen Henson 已提交
127 128 129 130
=head1 EXAMPLE

This SSL/TLS client example, attempts to retrieve a page from an
SSL/TLS web server. The I/O routines are identical to those of the
R
Rich Salz 已提交
131
unencrypted example in L<BIO_s_connect(3)>.
D
Dr. Stephen Henson 已提交
132 133 134 135 136 137 138

 BIO *sbio, *out;
 int len;
 char tmpbuf[1024];
 SSL_CTX *ctx;
 SSL *ssl;

R
Rich Salz 已提交
139
 /* XXX Seed the PRNG if needed. */
140

141
 ctx = SSL_CTX_new(TLS_client_method());
D
Dr. Stephen Henson 已提交
142

R
Rich Salz 已提交
143
 /* XXX Set verify paths and mode here. */
D
Dr. Stephen Henson 已提交
144 145 146

 sbio = BIO_new_ssl_connect(ctx);
 BIO_get_ssl(sbio, &ssl);
R
Rich Salz 已提交
147 148 149 150
 if (ssl == NULL) {
     fprintf(stderr, "Can't locate SSL pointer\n");
     ERR_print_errors_fp(stderr);
     exit(1);
D
Dr. Stephen Henson 已提交
151 152 153 154 155
 }

 /* Don't want any retries */
 SSL_set_mode(ssl, SSL_MODE_AUTO_RETRY);

R
Rich Salz 已提交
156
 /* XXX We might want to do other things with ssl here */
D
Dr. Stephen Henson 已提交
157

158 159
 /* An empty host part means the loopback address */
 BIO_set_conn_hostname(sbio, ":https");
D
Dr. Stephen Henson 已提交
160 161

 out = BIO_new_fp(stdout, BIO_NOCLOSE);
R
Rich Salz 已提交
162 163 164 165
 if (BIO_do_connect(sbio) <= 0) {
     fprintf(stderr, "Error connecting to server\n");
     ERR_print_errors_fp(stderr);
     exit(1);
166
 }
R
Rich Salz 已提交
167
 if (BIO_do_handshake(sbio) <= 0) {
R
Rich Salz 已提交
168 169
        fprintf(stderr, "Error establishing SSL connection\n");
        ERR_print_errors_fp(stderr);
R
Rich Salz 已提交
170
        exit(1);
171
 }
D
Dr. Stephen Henson 已提交
172

R
Rich Salz 已提交
173
 /* XXX Could examine ssl here to get connection info */
D
Dr. Stephen Henson 已提交
174 175

 BIO_puts(sbio, "GET / HTTP/1.0\n\n");
R
Rich Salz 已提交
176 177 178 179 180
 for ( ; ; ) {
     len = BIO_read(sbio, tmpbuf, 1024);
     if(len <= 0)
         break;
     BIO_write(out, tmpbuf, len);
D
Dr. Stephen Henson 已提交
181 182 183 184
 }
 BIO_free_all(sbio);
 BIO_free(out);

185 186 187 188 189 190 191 192 193 194 195
Here is a simple server example. It makes use of a buffering
BIO to allow lines to be read from the SSL BIO using BIO_gets.
It creates a pseudo web page containing the actual request from
a client and also echoes the request to standard output.

 BIO *sbio, *bbio, *acpt, *out;
 int len;
 char tmpbuf[1024];
 SSL_CTX *ctx;
 SSL *ssl;

R
Rich Salz 已提交
196
 /* XXX Seed the PRNG if needed. */
197

198
 ctx = SSL_CTX_new(TLS_server_method());
R
Rich Salz 已提交
199 200 201 202 203 204
 if (!SSL_CTX_use_certificate_file(ctx, "server.pem", SSL_FILETYPE_PEM)
         || !SSL_CTX_use_PrivateKey_file(ctx, "server.pem", SSL_FILETYPE_PEM)
         || !SSL_CTX_check_private_key(ctx)) {
     fprintf(stderr, "Error setting up SSL_CTX\n");
     ERR_print_errors_fp(stderr);
     exit(1);
205 206
 }

R
Rich Salz 已提交
207
 /* XXX Other things like set verify locations, EDH temp callbacks. */
208 209

 /* New SSL BIO setup as server */
R
Rich Salz 已提交
210
 sbio = BIO_new_ssl(ctx,0);
211
 BIO_get_ssl(sbio, &ssl);
R
Rich Salz 已提交
212 213 214 215
 if (ssl == NULL) {
     fprintf(stderr, "Can't locate SSL pointer\n");
     ERR_print_errors_fp(stderr);
     exit(1);
216 217 218 219 220
 }

 SSL_set_mode(ssl, SSL_MODE_AUTO_RETRY);
 bbio = BIO_new(BIO_f_buffer());
 sbio = BIO_push(bbio, sbio);
R
Rich Salz 已提交
221
 acpt = BIO_new_accept("4433");
222

R
Rich Salz 已提交
223 224
 /*
  * By doing this when a new connection is established
225 226
  * we automatically have sbio inserted into it. The
  * BIO chain is now 'swallowed' by the accept BIO and
R
Rich Salz 已提交
227
  * will be freed when the accept BIO is freed.
228
  */
R
Rich Salz 已提交
229
 BIO_set_accept_bios(acpt, sbio);
230 231 232
 out = BIO_new_fp(stdout, BIO_NOCLOSE);

 /* Setup accept BIO */
R
Rich Salz 已提交
233 234 235 236
 if (BIO_do_accept(acpt) <= 0) {
     fprintf(stderr, "Error setting up accept BIO\n");
     ERR_print_errors_fp(stderr);
     exit(1);
237 238
 }

R
Rich Salz 已提交
239 240 241 242
 if (BIO_do_accept(acpt) <= 0) {
     fprintf(stderr, "Error in connection\n");
     ERR_print_errors_fp(stderr);
     exit(1);
243 244
 }

R
Rich Salz 已提交
245
 /* We only want one connection so remove and free accept BIO */
246 247 248
 sbio = BIO_pop(acpt);
 BIO_free_all(acpt);

R
Rich Salz 已提交
249 250 251 252
 if (BIO_do_handshake(sbio) <= 0) {
     fprintf(stderr, "Error in SSL handshake\n");
     ERR_print_errors_fp(stderr);
     exit(1);
253 254
 }

255 256
 BIO_puts(sbio, "HTTP/1.0 200 OK\r\nContent-type: text/plain\r\n\r\n");
 BIO_puts(sbio, "\r\nConnection Established\r\nRequest headers:\r\n");
257 258
 BIO_puts(sbio, "--------------------------------------------------\r\n");

R
Rich Salz 已提交
259 260 261 262 263 264 265 266 267
 for ( ; ; ) {
     len = BIO_gets(sbio, tmpbuf, 1024);
     if (len <= 0)
         break;
     BIO_write(sbio, tmpbuf, len);
     BIO_write(out, tmpbuf, len);
     /* Look for blank line signifying end of headers*/
     if (tmpbuf[0] == '\r' || tmpbuf[0] == '\n')
         break;
268 269 270
 }

 BIO_puts(sbio, "--------------------------------------------------\r\n");
271
 BIO_puts(sbio, "\r\n");
272 273 274
 BIO_flush(sbio);
 BIO_free_all(sbio);

D
Dr. Stephen Henson 已提交
275 276 277 278 279 280 281 282 283
=head1 BUGS

In OpenSSL versions before 1.0.0 the BIO_pop() call was handled incorrectly,
the I/O BIO reference count was incorrectly incremented (instead of
decremented) and dissociated with the SSL BIO even if the SSL BIO was not
explicitly being popped (e.g. a pop higher up the chain). Applications which
included workarounds for this bug (e.g. freeing BIOs more than once) should
be modified to handle this fix or they may free up an already freed BIO.

R
Rich Salz 已提交
284 285 286 287 288 289 290 291 292 293
=head1 COPYRIGHT

Copyright 2000-2016 The OpenSSL Project Authors. All Rights Reserved.

Licensed under the OpenSSL license (the "License").  You may not use
this file except in compliance with the License.  You can obtain a copy
in the file LICENSE in the source distribution or at
L<https://www.openssl.org/source/license.html>.

=cut