1 .\" Automatically generated by Pod::Man v1.37, Pod::Parser v1.32
4 .\" ========================================================================
5 .de Sh \" Subsection heading
13 .de Sp \" Vertical space (when we can't use .PP)
17 .de Vb \" Begin verbatim text
22 .de Ve \" End verbatim text
26 .\" Set up some character translations and predefined strings. \*(-- will
27 .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
28 .\" double quote, and \*(R" will give a right double quote. | will give a
29 .\" real vertical bar. \*(C+ will give a nicer C++. Capital omega is used to
30 .\" do unbreakable dashes and therefore won't be available. \*(C` and \*(C'
31 .\" expand to `' in nroff, nothing in troff, for use with C<>.
33 .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
37 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
38 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
51 .\" If the F register is turned on, we'll generate index entries on stderr for
52 .\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index
53 .\" entries marked with X<> in POD. Of course, you'll have to process the
54 .\" output yourself in some meaningful fashion.
57 . tm Index:\\$1\t\\n%\t"\\$2"
63 .\" For nroff, turn off justification. Always turn off hyphenation; it makes
64 .\" way too many mistakes in technical documents.
68 .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
69 .\" Fear. Run. Save yourself. No user-serviceable parts.
70 . \" fudge factors for nroff and troff
79 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
85 . \" simple accents for nroff and troff
95 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
96 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
97 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
98 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
99 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
100 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
102 . \" troff and (daisy-wheel) nroff accents
103 .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
104 .ds 8 \h'\*(#H'\(*b\h'-\*(#H'
105 .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
106 .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
107 .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
108 .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
109 .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
110 .ds ae a\h'-(\w'a'u*4/10)'e
111 .ds Ae A\h'-(\w'A'u*4/10)'E
112 . \" corrections for vroff
113 .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
114 .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
115 . \" for low resolution devices (crt and lpr)
116 .if \n(.H>23 .if \n(.V>19 \
129 .\" ========================================================================
131 .IX Title "BIO_f_ssl 3"
132 .TH BIO_f_ssl 3 "2009-07-23" "0.9.8k" "OpenSSL"
134 BIO_f_ssl, BIO_set_ssl, BIO_get_ssl, BIO_set_ssl_mode, BIO_set_ssl_renegotiate_bytes,
135 BIO_get_num_renegotiates, BIO_set_ssl_renegotiate_timeout, BIO_new_ssl,
136 BIO_new_ssl_connect, BIO_new_buffer_ssl_connect, BIO_ssl_copy_session_id,
137 BIO_ssl_shutdown \- SSL BIO
139 .IX Header "SYNOPSIS"
141 \& #include <openssl/bio.h>
142 \& #include <openssl/ssl.h>
146 \& BIO_METHOD *BIO_f_ssl(void);
150 \& #define BIO_set_ssl(b,ssl,c) BIO_ctrl(b,BIO_C_SET_SSL,c,(char *)ssl)
151 \& #define BIO_get_ssl(b,sslp) BIO_ctrl(b,BIO_C_GET_SSL,0,(char *)sslp)
152 \& #define BIO_set_ssl_mode(b,client) BIO_ctrl(b,BIO_C_SSL_MODE,client,NULL)
153 \& #define BIO_set_ssl_renegotiate_bytes(b,num) \e
154 \& BIO_ctrl(b,BIO_C_SET_SSL_RENEGOTIATE_BYTES,num,NULL);
155 \& #define BIO_set_ssl_renegotiate_timeout(b,seconds) \e
156 \& BIO_ctrl(b,BIO_C_SET_SSL_RENEGOTIATE_TIMEOUT,seconds,NULL);
157 \& #define BIO_get_num_renegotiates(b) \e
158 \& BIO_ctrl(b,BIO_C_SET_SSL_NUM_RENEGOTIATES,0,NULL);
162 \& BIO *BIO_new_ssl(SSL_CTX *ctx,int client);
163 \& BIO *BIO_new_ssl_connect(SSL_CTX *ctx);
164 \& BIO *BIO_new_buffer_ssl_connect(SSL_CTX *ctx);
165 \& int BIO_ssl_copy_session_id(BIO *to,BIO *from);
166 \& void BIO_ssl_shutdown(BIO *bio);
170 \& #define BIO_do_handshake(b) BIO_ctrl(b,BIO_C_DO_STATE_MACHINE,0,NULL)
173 .IX Header "DESCRIPTION"
174 \&\fIBIO_f_ssl()\fR returns the \s-1SSL\s0 \s-1BIO\s0 method. This is a filter \s-1BIO\s0 which
175 is a wrapper round the OpenSSL \s-1SSL\s0 routines adding a \s-1BIO\s0 \*(L"flavour\*(R" to
178 I/O performed on an \s-1SSL\s0 \s-1BIO\s0 communicates using the \s-1SSL\s0 protocol with
179 the SSLs read and write BIOs. If an \s-1SSL\s0 connection is not established
180 then an attempt is made to establish one on the first I/O call.
182 If a \s-1BIO\s0 is appended to an \s-1SSL\s0 \s-1BIO\s0 using \fIBIO_push()\fR it is automatically
183 used as the \s-1SSL\s0 BIOs read and write BIOs.
185 Calling \fIBIO_reset()\fR on an \s-1SSL\s0 \s-1BIO\s0 closes down any current \s-1SSL\s0 connection
186 by calling \fISSL_shutdown()\fR. \fIBIO_reset()\fR is then sent to the next \s-1BIO\s0 in
187 the chain: this will typically disconnect the underlying transport.
188 The \s-1SSL\s0 \s-1BIO\s0 is then reset to the initial accept or connect state.
190 If the close flag is set when an \s-1SSL\s0 \s-1BIO\s0 is freed then the internal
191 \&\s-1SSL\s0 structure is also freed using \fISSL_free()\fR.
193 \&\fIBIO_set_ssl()\fR sets the internal \s-1SSL\s0 pointer of \s-1BIO\s0 \fBb\fR to \fBssl\fR using
194 the close flag \fBc\fR.
196 \&\fIBIO_get_ssl()\fR retrieves the \s-1SSL\s0 pointer of \s-1BIO\s0 \fBb\fR, it can then be
197 manipulated using the standard \s-1SSL\s0 library functions.
199 \&\fIBIO_set_ssl_mode()\fR sets the \s-1SSL\s0 \s-1BIO\s0 mode to \fBclient\fR. If \fBclient\fR
200 is 1 client mode is set. If \fBclient\fR is 0 server mode is set.
202 \&\fIBIO_set_ssl_renegotiate_bytes()\fR sets the renegotiate byte count
203 to \fBnum\fR. When set after every \fBnum\fR bytes of I/O (read and write)
204 the \s-1SSL\s0 session is automatically renegotiated. \fBnum\fR must be at
207 \&\fIBIO_set_ssl_renegotiate_timeout()\fR sets the renegotiate timeout to
208 \&\fBseconds\fR. When the renegotiate timeout elapses the session is
209 automatically renegotiated.
211 \&\fIBIO_get_num_renegotiates()\fR returns the total number of session
212 renegotiations due to I/O or timeout.
214 \&\fIBIO_new_ssl()\fR allocates an \s-1SSL\s0 \s-1BIO\s0 using \s-1SSL_CTX\s0 \fBctx\fR and using
215 client mode if \fBclient\fR is non zero.
217 \&\fIBIO_new_ssl_connect()\fR creates a new \s-1BIO\s0 chain consisting of an
218 \&\s-1SSL\s0 \s-1BIO\s0 (using \fBctx\fR) followed by a connect \s-1BIO\s0.
220 \&\fIBIO_new_buffer_ssl_connect()\fR creates a new \s-1BIO\s0 chain consisting
221 of a buffering \s-1BIO\s0, an \s-1SSL\s0 \s-1BIO\s0 (using \fBctx\fR) and a connect
224 \&\fIBIO_ssl_copy_session_id()\fR copies an \s-1SSL\s0 session id between
225 \&\s-1BIO\s0 chains \fBfrom\fR and \fBto\fR. It does this by locating the
226 \&\s-1SSL\s0 BIOs in each chain and calling \fISSL_copy_session_id()\fR on
227 the internal \s-1SSL\s0 pointer.
229 \&\fIBIO_ssl_shutdown()\fR closes down an \s-1SSL\s0 connection on \s-1BIO\s0
230 chain \fBbio\fR. It does this by locating the \s-1SSL\s0 \s-1BIO\s0 in the
231 chain and calling \fISSL_shutdown()\fR on its internal \s-1SSL\s0
234 \&\fIBIO_do_handshake()\fR attempts to complete an \s-1SSL\s0 handshake on the
235 supplied \s-1BIO\s0 and establish the \s-1SSL\s0 connection. It returns 1
236 if the connection was established successfully. A zero or negative
237 value is returned if the connection could not be established, the
238 call \fIBIO_should_retry()\fR should be used for non blocking connect BIOs
239 to determine if the call should be retried. If an \s-1SSL\s0 connection has
240 already been established this call has no effect.
243 \&\s-1SSL\s0 BIOs are exceptional in that if the underlying transport
244 is non blocking they can still request a retry in exceptional
245 circumstances. Specifically this will happen if a session
246 renegotiation takes place during a \fIBIO_read()\fR operation, one
247 case where this happens is when \s-1SGC\s0 or step up occurs.
249 In OpenSSL 0.9.6 and later the \s-1SSL\s0 flag \s-1SSL_AUTO_RETRY\s0 can be
250 set to disable this behaviour. That is when this flag is set
251 an \s-1SSL\s0 \s-1BIO\s0 using a blocking transport will never request a
254 Since unknown \fIBIO_ctrl()\fR operations are sent through filter
255 BIOs the servers name and port can be set using \fIBIO_set_host()\fR
256 on the \s-1BIO\s0 returned by \fIBIO_new_ssl_connect()\fR without having
257 to locate the connect \s-1BIO\s0 first.
259 Applications do not have to call \fIBIO_do_handshake()\fR but may wish
260 to do so to separate the handshake process from other I/O
263 .IX Header "RETURN VALUES"
267 This \s-1SSL/TLS\s0 client example, attempts to retrieve a page from an
268 \&\s-1SSL/TLS\s0 web server. The I/O routines are identical to those of the
269 unencrypted example in \fIBIO_s_connect\fR\|(3).
274 \& char tmpbuf[1024];
280 \& ERR_load_crypto_strings();
281 \& ERR_load_SSL_strings();
282 \& OpenSSL_add_all_algorithms();
286 \& /* We would seed the PRNG here if the platform didn't
287 \& * do it automatically
292 \& ctx = SSL_CTX_new(SSLv23_client_method());
296 \& /* We'd normally set some stuff like the verify paths and
297 \& * mode here because as things stand this will connect to
298 \& * any server whose certificate is signed by any CA.
303 \& sbio = BIO_new_ssl_connect(ctx);
307 \& BIO_get_ssl(sbio, &ssl);
312 \& fprintf(stderr, "Can't locate SSL pointer\en");
313 \& /* whatever ... */
318 \& /* Don't want any retries */
319 \& SSL_set_mode(ssl, SSL_MODE_AUTO_RETRY);
323 \& /* We might want to do other things with ssl here */
327 \& BIO_set_conn_hostname(sbio, "localhost:https");
331 \& out = BIO_new_fp(stdout, BIO_NOCLOSE);
332 \& if(BIO_do_connect(sbio) <= 0) {
333 \& fprintf(stderr, "Error connecting to server\en");
334 \& ERR_print_errors_fp(stderr);
335 \& /* whatever ... */
340 \& if(BIO_do_handshake(sbio) <= 0) {
341 \& fprintf(stderr, "Error establishing SSL connection\en");
342 \& ERR_print_errors_fp(stderr);
343 \& /* whatever ... */
348 \& /* Could examine ssl here to get connection info */
352 \& BIO_puts(sbio, "GET / HTTP/1.0\en\en");
354 \& len = BIO_read(sbio, tmpbuf, 1024);
355 \& if(len <= 0) break;
356 \& BIO_write(out, tmpbuf, len);
358 \& BIO_free_all(sbio);
362 Here is a simple server example. It makes use of a buffering
363 \&\s-1BIO\s0 to allow lines to be read from the \s-1SSL\s0 \s-1BIO\s0 using BIO_gets.
364 It creates a pseudo web page containing the actual request from
365 a client and also echoes the request to standard output.
368 \& BIO *sbio, *bbio, *acpt, *out;
370 \& char tmpbuf[1024];
376 \& ERR_load_crypto_strings();
377 \& ERR_load_SSL_strings();
378 \& OpenSSL_add_all_algorithms();
382 \& /* Might seed PRNG here */
386 \& ctx = SSL_CTX_new(SSLv23_server_method());
390 \& if (!SSL_CTX_use_certificate_file(ctx,"server.pem",SSL_FILETYPE_PEM)
391 \& || !SSL_CTX_use_PrivateKey_file(ctx,"server.pem",SSL_FILETYPE_PEM)
392 \& || !SSL_CTX_check_private_key(ctx)) {
396 \& fprintf(stderr, "Error setting up SSL_CTX\en");
397 \& ERR_print_errors_fp(stderr);
403 \& /* Might do other things here like setting verify locations and
404 \& * DH and/or RSA temporary key callbacks
409 \& /* New SSL BIO setup as server */
410 \& sbio=BIO_new_ssl(ctx,0);
414 \& BIO_get_ssl(sbio, &ssl);
419 \& fprintf(stderr, "Can't locate SSL pointer\en");
420 \& /* whatever ... */
425 \& /* Don't want any retries */
426 \& SSL_set_mode(ssl, SSL_MODE_AUTO_RETRY);
430 \& /* Create the buffering BIO */
434 \& bbio = BIO_new(BIO_f_buffer());
438 \& /* Add to chain */
439 \& sbio = BIO_push(bbio, sbio);
443 \& acpt=BIO_new_accept("4433");
447 \& /* By doing this when a new connection is established
448 \& * we automatically have sbio inserted into it. The
449 \& * BIO chain is now 'swallowed' by the accept BIO and
450 \& * will be freed when the accept BIO is freed.
455 \& BIO_set_accept_bios(acpt,sbio);
459 \& out = BIO_new_fp(stdout, BIO_NOCLOSE);
463 \& /* Setup accept BIO */
464 \& if(BIO_do_accept(acpt) <= 0) {
465 \& fprintf(stderr, "Error setting up accept BIO\en");
466 \& ERR_print_errors_fp(stderr);
472 \& /* Now wait for incoming connection */
473 \& if(BIO_do_accept(acpt) <= 0) {
474 \& fprintf(stderr, "Error in connection\en");
475 \& ERR_print_errors_fp(stderr);
481 \& /* We only want one connection so remove and free
487 \& sbio = BIO_pop(acpt);
491 \& BIO_free_all(acpt);
495 \& if(BIO_do_handshake(sbio) <= 0) {
496 \& fprintf(stderr, "Error in SSL handshake\en");
497 \& ERR_print_errors_fp(stderr);
503 \& BIO_puts(sbio, "HTTP/1.0 200 OK\er\enContent-type: text/plain\er\en\er\en");
504 \& BIO_puts(sbio, "\er\enConnection Established\er\enRequest headers:\er\en");
505 \& BIO_puts(sbio, "--------------------------------------------------\er\en");
510 \& len = BIO_gets(sbio, tmpbuf, 1024);
511 \& if(len <= 0) break;
512 \& BIO_write(sbio, tmpbuf, len);
513 \& BIO_write(out, tmpbuf, len);
514 \& /* Look for blank line signifying end of headers*/
515 \& if((tmpbuf[0] == '\er') || (tmpbuf[0] == '\en')) break;
520 \& BIO_puts(sbio, "--------------------------------------------------\er\en");
521 \& BIO_puts(sbio, "\er\en");
525 \& /* Since there is a buffering BIO present we had better flush it */
530 \& BIO_free_all(sbio);
533 .IX Header "SEE ALSO"