2001-02-13 11:43:11 +00:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2018-05-13 09:24:11 +00:00
|
|
|
SSL_CTX_set_mode, SSL_CTX_clear_mode, SSL_set_mode, SSL_clear_mode, SSL_CTX_get_mode, SSL_get_mode - manipulate SSL engine mode
|
2001-02-13 11:43:11 +00:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/ssl.h>
|
|
|
|
|
|
|
|
long SSL_CTX_set_mode(SSL_CTX *ctx, long mode);
|
2018-05-13 09:24:11 +00:00
|
|
|
long SSL_CTX_clear_mode(SSL_CTX *ctx, long mode);
|
2001-02-13 11:43:11 +00:00
|
|
|
long SSL_set_mode(SSL *ssl, long mode);
|
2018-05-13 09:24:11 +00:00
|
|
|
long SSL_clear_mode(SSL *ssl, long mode);
|
2001-02-13 11:43:11 +00:00
|
|
|
|
|
|
|
long SSL_CTX_get_mode(SSL_CTX *ctx);
|
|
|
|
long SSL_get_mode(SSL *ssl);
|
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
|
|
|
SSL_CTX_set_mode() adds the mode set via bitmask in B<mode> to B<ctx>.
|
|
|
|
Options already set before are not cleared.
|
2018-05-13 09:24:11 +00:00
|
|
|
SSL_CTX_clear_mode() removes the mode set via bitmask in B<mode> from B<ctx>.
|
2001-02-13 11:43:11 +00:00
|
|
|
|
|
|
|
SSL_set_mode() adds the mode set via bitmask in B<mode> to B<ssl>.
|
|
|
|
Options already set before are not cleared.
|
2018-05-13 09:24:11 +00:00
|
|
|
SSL_clear_mode() removes the mode set via bitmask in B<mode> from B<ssl>.
|
2001-02-13 11:43:11 +00:00
|
|
|
|
|
|
|
SSL_CTX_get_mode() returns the mode set for B<ctx>.
|
|
|
|
|
|
|
|
SSL_get_mode() returns the mode set for B<ssl>.
|
|
|
|
|
|
|
|
=head1 NOTES
|
|
|
|
|
|
|
|
The following mode changes are available:
|
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
|
|
|
=item SSL_MODE_ENABLE_PARTIAL_WRITE
|
|
|
|
|
2016-10-20 14:04:21 +00:00
|
|
|
Allow SSL_write_ex(..., n, &r) to return with 0 < r < n (i.e. report success
|
|
|
|
when just a single record has been written). This works in a similar way for
|
|
|
|
SSL_write(). When not set (the default), SSL_write_ex() or SSL_write() will only
|
|
|
|
report success once the complete chunk was written. Once SSL_write_ex() or
|
2016-10-21 15:16:20 +00:00
|
|
|
SSL_write() returns successful, B<r> bytes have been written and the next call
|
|
|
|
to SSL_write_ex() or SSL_write() must only send the n-r bytes left, imitating
|
|
|
|
the behaviour of write().
|
2001-02-13 11:43:11 +00:00
|
|
|
|
|
|
|
=item SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER
|
|
|
|
|
2016-10-20 14:04:21 +00:00
|
|
|
Make it possible to retry SSL_write_ex() or SSL_write() with changed buffer
|
|
|
|
location (the buffer contents must stay the same). This is not the default to
|
|
|
|
avoid the misconception that non-blocking SSL_write() behaves like
|
2001-02-13 11:43:11 +00:00
|
|
|
non-blocking write().
|
|
|
|
|
|
|
|
=item SSL_MODE_AUTO_RETRY
|
|
|
|
|
2018-05-13 09:24:11 +00:00
|
|
|
During normal operations, non-application data records might need to be sent or
|
|
|
|
received that the application is not aware of.
|
|
|
|
If a non-application data record was processed,
|
|
|
|
L<SSL_read_ex(3)> and L<SSL_read(3)> can return with a failure and indicate the
|
|
|
|
need to retry with B<SSL_ERROR_WANT_READ>.
|
|
|
|
If such a non-application data record was processed, the flag
|
|
|
|
B<SSL_MODE_AUTO_RETRY> causes it to try to process the next record instead of
|
|
|
|
returning.
|
|
|
|
|
2001-02-13 11:43:11 +00:00
|
|
|
In a non-blocking environment applications must be prepared to handle
|
|
|
|
incomplete read/write operations.
|
2018-05-13 09:24:11 +00:00
|
|
|
Setting B<SSL_MODE_AUTO_RETRY> for a non-blocking B<BIO> will process
|
|
|
|
non-application data records until either no more data is available or
|
|
|
|
an application data record has been processed.
|
|
|
|
|
2001-02-13 11:43:11 +00:00
|
|
|
In a blocking environment, applications are not always prepared to
|
2018-05-13 09:24:11 +00:00
|
|
|
deal with the functions returning intermediate reports such as retry
|
|
|
|
requests, and setting the B<SSL_MODE_AUTO_RETRY> flag will cause the functions
|
|
|
|
to only return after successfully processing an application data record or a
|
|
|
|
failure.
|
|
|
|
|
|
|
|
Turning off B<SSL_MODE_AUTO_RETRY> can be useful with blocking B<BIO>s in case
|
|
|
|
they are used in combination with something like select() or poll().
|
|
|
|
Otherwise the call to SSL_read() or SSL_read_ex() might hang when a
|
|
|
|
non-application record was sent and no application data was sent.
|
2001-02-13 11:43:11 +00:00
|
|
|
|
2008-06-03 02:48:34 +00:00
|
|
|
=item SSL_MODE_RELEASE_BUFFERS
|
|
|
|
|
|
|
|
When we no longer need a read buffer or a write buffer for a given SSL,
|
2015-01-27 21:43:53 +00:00
|
|
|
then release the memory we were using to hold it.
|
|
|
|
Using this flag can
|
2008-06-03 02:48:34 +00:00
|
|
|
save around 34k per idle SSL connection.
|
|
|
|
This flag has no effect on SSL v2 connections, or on DTLS connections.
|
|
|
|
|
2014-10-21 20:43:08 +00:00
|
|
|
=item SSL_MODE_SEND_FALLBACK_SCSV
|
2014-10-15 08:43:50 +00:00
|
|
|
|
|
|
|
Send TLS_FALLBACK_SCSV in the ClientHello.
|
2014-10-21 20:43:08 +00:00
|
|
|
To be set only by applications that reconnect with a downgraded protocol
|
2014-10-15 08:43:50 +00:00
|
|
|
version; see draft-ietf-tls-downgrade-scsv-00 for details.
|
|
|
|
|
2014-10-21 20:43:08 +00:00
|
|
|
DO NOT ENABLE THIS if your application attempts a normal handshake.
|
|
|
|
Only use this in explicit fallback retries, following the guidance
|
|
|
|
in draft-ietf-tls-downgrade-scsv-00.
|
|
|
|
|
2015-10-06 12:48:43 +00:00
|
|
|
=item SSL_MODE_ASYNC
|
|
|
|
|
|
|
|
Enable asynchronous processing. TLS I/O operations may indicate a retry with
|
|
|
|
SSL_ERROR_WANT_ASYNC with this mode set if an asynchronous capable engine is
|
|
|
|
used to perform cryptographic operations. See L<SSL_get_error(3)>.
|
|
|
|
|
2018-12-26 11:44:53 +00:00
|
|
|
=item SSL_MODE_DTLS_SCTP_LABEL_LENGTH_BUG
|
|
|
|
|
|
|
|
Older versions of OpenSSL had a bug in the computation of the label length
|
|
|
|
used for computing the endpoint-pair shared secret. The bug was that the
|
|
|
|
terminating zero was included in the length of the label. Setting this option
|
|
|
|
enables this behaviour to allow interoperability with such broken
|
|
|
|
implementations. Please note that setting this option breaks interoperability
|
|
|
|
with correct implementations. This option only applies to DTLS over SCTP.
|
|
|
|
|
2001-02-13 11:43:11 +00:00
|
|
|
=back
|
|
|
|
|
2018-05-13 09:24:11 +00:00
|
|
|
All modes are off by default except for SSL_MODE_AUTO_RETRY which is on by
|
|
|
|
default since 1.1.1.
|
|
|
|
|
2001-02-13 11:43:11 +00:00
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
|
|
|
SSL_CTX_set_mode() and SSL_set_mode() return the new mode bitmask
|
|
|
|
after adding B<mode>.
|
|
|
|
|
|
|
|
SSL_CTX_get_mode() and SSL_get_mode() return the current bitmask.
|
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2016-11-11 08:33:09 +00:00
|
|
|
L<ssl(7)>, L<SSL_read_ex(3)>, L<SSL_read(3)>, L<SSL_write_ex(3)> or
|
2016-10-20 14:04:21 +00:00
|
|
|
L<SSL_write(3)>, L<SSL_get_error(3)>
|
2015-10-06 12:48:43 +00:00
|
|
|
|
|
|
|
=head1 HISTORY
|
|
|
|
|
2018-12-09 00:02:36 +00:00
|
|
|
SSL_MODE_ASYNC was added in OpenSSL 1.1.0.
|
2001-02-13 11:43:11 +00:00
|
|
|
|
2016-05-18 15:44:05 +00:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2018-09-11 12:22:14 +00:00
|
|
|
Copyright 2001-2018 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 15:44:05 +00:00
|
|
|
|
|
|
|
Licensed under the OpenSSL license (the "License"). You may not use
|
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|