提交 2f6f913e 编写于 作者: K Kurt Roeckx

Update documentation on how to close a connection

Reviewed-by: NBernd Edlinger <bernd.edlinger@hotmail.de>
GH: #5823
上级 094925de
...@@ -38,11 +38,10 @@ if and only if B<ret E<gt> 0>. ...@@ -38,11 +38,10 @@ if and only if B<ret E<gt> 0>.
=item SSL_ERROR_ZERO_RETURN =item SSL_ERROR_ZERO_RETURN
The TLS/SSL connection has been closed. The TLS/SSL peer has closed the connection for writing by sending the
If the protocol version is SSL 3.0 or higher, this result code is returned only "close notify" alert.
if a closure alert has occurred in the protocol, i.e. if the connection has been No more data can be read.
closed cleanly. Note that B<SSL_ERROR_ZERO_RETURN> does not necessarily
Note that in this case B<SSL_ERROR_ZERO_RETURN> does not necessarily
indicate that the underlying transport has been closed. indicate that the underlying transport has been closed.
=item SSL_ERROR_WANT_READ, SSL_ERROR_WANT_WRITE =item SSL_ERROR_WANT_READ, SSL_ERROR_WANT_WRITE
......
...@@ -35,35 +35,52 @@ performed, so that the peers stay synchronized. ...@@ -35,35 +35,52 @@ performed, so that the peers stay synchronized.
SSL_shutdown() supports both uni- and bidirectional shutdown by its 2 step SSL_shutdown() supports both uni- and bidirectional shutdown by its 2 step
behaviour. behaviour.
=over 4 SSL_shutdown() only closes the write direction.
It is not possible to call SSL_write() after calling SSL_shutdown().
The read direction is closed by the peer.
=head2 First to close the connection
=item When the application is the first party to send the "close notify" When the application is the first party to send the "close notify"
alert, SSL_shutdown() will only send the alert and then set the alert, SSL_shutdown() will only send the alert and then set the
SSL_SENT_SHUTDOWN flag (so that the session is considered good and will SSL_SENT_SHUTDOWN flag (so that the session is considered good and will
be kept in cache). SSL_shutdown() will then return with 0. If a unidirectional be kept in the cache).
shutdown is enough (the underlying connection shall be closed anyway), this SSL_shutdown() will then return with 0.
first call to SSL_shutdown() is sufficient. In order to complete the If a unidirectional shutdown is enough (the underlying connection shall be
bidirectional shutdown handshake, SSL_shutdown() must be called again. closed anyway), this first call to SSL_shutdown() is sufficient.
The second call will make SSL_shutdown() wait for the peer's "close notify"
shutdown alert. On success, the second call to SSL_shutdown() will return In order to complete the bidirectional shutdown handshake, the peer needs
with 1. to send back a "close notify" alert.
The SSL_RECEIVED_SHUTDOWN flag will be set after receiving and processing
=item If the peer already sent the "close notify" alert B<and> it was it.
SSL_shutdown() will return 1 when it has been received.
The peer is still allowed to send data after receiving the "close notify"
event.
If the peer did send data it needs to be processed by calling SSL_read()
before calling SSL_shutdown() a second time.
SSL_read() will indicate the end of the peer data by returning <= 0
and SSL_get_error() returning SSL_ERROR_ZERO_RETURN.
It is recommended to call SSL_read() between SSL_shutdown() calls.
=head2 Peer closes the connection
If the peer already sent the "close notify" alert B<and> it was
already processed implicitly inside another function already processed implicitly inside another function
(L<SSL_read(3)>), the SSL_RECEIVED_SHUTDOWN flag is set. (L<SSL_read(3)>), the SSL_RECEIVED_SHUTDOWN flag is set.
SSL_read() will return <= 0 in that case, and SSL_get_error() will return
SSL_ERROR_ZERO_RETURN.
SSL_shutdown() will send the "close notify" alert, set the SSL_SENT_SHUTDOWN SSL_shutdown() will send the "close notify" alert, set the SSL_SENT_SHUTDOWN
flag and will immediately return with 1. flag and will immediately return with 1.
Whether SSL_RECEIVED_SHUTDOWN is already set can be checked using the Whether SSL_RECEIVED_SHUTDOWN is already set can be checked using the
SSL_get_shutdown() (see also L<SSL_set_shutdown(3)> call. SSL_get_shutdown() (see also L<SSL_set_shutdown(3)> call.
=back =head1 NOTES
It is therefore recommended, to check the return value of SSL_shutdown() It is recommended to do a bidirectional shutdown by checking the return value
and call SSL_shutdown() again, if the bidirectional shutdown is not yet of SSL_shutdown() and call it again until it returns 1 or a fatal error.
complete (return value of the first call is 0).
The behaviour of SSL_shutdown() additionally depends on the underlying BIO. The behaviour of SSL_shutdown() additionally depends on the underlying BIO.
If the underlying BIO is B<blocking>, SSL_shutdown() will only return once the If the underlying BIO is B<blocking>, SSL_shutdown() will only return once the
handshake step has been finished or an error occurred. handshake step has been finished or an error occurred.
...@@ -92,8 +109,9 @@ The following return values can occur: ...@@ -92,8 +109,9 @@ The following return values can occur:
=item Z<>0 =item Z<>0
The shutdown is not yet finished. Call SSL_shutdown() for a second time, The shutdown is not yet finished: the "close notify" was send but the peer
if a bidirectional shutdown shall be performed. did not send it back yet.
Call SSL_shutdown() again to do a bidirectional shutdown.
The output of L<SSL_get_error(3)> may be misleading, as an The output of L<SSL_get_error(3)> may be misleading, as an
erroneous SSL_ERROR_SYSCALL may be flagged even though no error occurred. erroneous SSL_ERROR_SYSCALL may be flagged even though no error occurred.
...@@ -104,11 +122,12 @@ and the peer's "close notify" alert was received. ...@@ -104,11 +122,12 @@ and the peer's "close notify" alert was received.
=item E<lt>0 =item E<lt>0
The shutdown was not successful because a fatal error occurred either The shutdown was not successful.
at the protocol level or a connection failure occurred. It can also occur if Call L<SSL_get_error(3)> with the return value B<ret> to find out the reason.
action is need to continue the operation for non-blocking BIOs. It can occur if an action is needed to continue the operation for non-blocking
Call L<SSL_get_error(3)> with the return value B<ret> BIOs.
to find out the reason.
It can also occur when not all data was read using SSL_read().
=back =back
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册