Dr. Stephen Henson | 18f2259 | 2000-09-14 18:55:39 +0000 | [diff] [blame] | 1 | =pod |
| 2 | |
| 3 | =head1 NAME |
| 4 | |
Bodo Möller | 07fcf42 | 2000-09-17 01:23:53 +0000 | [diff] [blame] | 5 | BIO_s_bio, BIO_make_bio_pair, BIO_destroy_bio_pair, BIO_shutdown_wr, |
Dr. Stephen Henson | 2c281eb | 2000-09-16 21:21:01 +0000 | [diff] [blame] | 6 | BIO_set_write_buf_size, BIO_get_write_buf_size, BIO_new_bio_pair, |
| 7 | BIO_get_write_guarantee, BIO_ctrl_get_write_guarantee, BIO_get_read_request, |
| 8 | BIO_ctrl_get_read_request, BIO_ctrl_reset_read_request - BIO pair BIO |
Dr. Stephen Henson | 18f2259 | 2000-09-14 18:55:39 +0000 | [diff] [blame] | 9 | |
| 10 | =head1 SYNOPSIS |
| 11 | |
| 12 | #include <openssl/bio.h> |
| 13 | |
| 14 | BIO_METHOD *BIO_s_bio(void); |
| 15 | |
| 16 | #define BIO_make_bio_pair(b1,b2) (int)BIO_ctrl(b1,BIO_C_MAKE_BIO_PAIR,0,b2) |
| 17 | #define BIO_destroy_bio_pair(b) (int)BIO_ctrl(b,BIO_C_DESTROY_BIO_PAIR,0,NULL) |
| 18 | |
Bodo Möller | 07fcf42 | 2000-09-17 01:23:53 +0000 | [diff] [blame] | 19 | #define BIO_shutdown_wr(b) (int)BIO_ctrl(b, BIO_C_SHUTDOWN_WR, 0, NULL) |
Dr. Stephen Henson | 2c281eb | 2000-09-16 21:21:01 +0000 | [diff] [blame] | 20 | |
Dr. Stephen Henson | 18f2259 | 2000-09-14 18:55:39 +0000 | [diff] [blame] | 21 | #define BIO_set_write_buf_size(b,size) (int)BIO_ctrl(b,BIO_C_SET_WRITE_BUF_SIZE,size,NULL) |
| 22 | #define BIO_get_write_buf_size(b,size) (size_t)BIO_ctrl(b,BIO_C_GET_WRITE_BUF_SIZE,size,NULL) |
| 23 | |
| 24 | int BIO_new_bio_pair(BIO **bio1, size_t writebuf1, BIO **bio2, size_t writebuf2); |
| 25 | |
| 26 | #define BIO_get_write_guarantee(b) (int)BIO_ctrl(b,BIO_C_GET_WRITE_GUARANTEE,0,NULL) |
| 27 | size_t BIO_ctrl_get_write_guarantee(BIO *b); |
| 28 | |
| 29 | #define BIO_get_read_request(b) (int)BIO_ctrl(b,BIO_C_GET_READ_REQUEST,0,NULL) |
| 30 | size_t BIO_ctrl_get_read_request(BIO *b); |
| 31 | |
| 32 | int BIO_ctrl_reset_read_request(BIO *b); |
| 33 | |
| 34 | =head1 DESCRIPTION |
| 35 | |
| 36 | BIO_s_bio() returns the method for a BIO pair. A BIO pair is a pair of source/sink |
| 37 | BIOs where data written to either half of the pair is buffered and can be read from |
Bodo Möller | e39c194 | 2000-09-14 22:09:55 +0000 | [diff] [blame] | 38 | the other half. Both halves must usually by handled by the same application thread |
| 39 | since no locking is done on the internal data structures. |
Dr. Stephen Henson | 18f2259 | 2000-09-14 18:55:39 +0000 | [diff] [blame] | 40 | |
| 41 | Since BIO chains typically end in a source/sink BIO it is possible to make this |
| 42 | one half of a BIO pair and have all the data processed by the chain under application |
| 43 | control. |
| 44 | |
Bodo Möller | e39c194 | 2000-09-14 22:09:55 +0000 | [diff] [blame] | 45 | One typical use of BIO pairs is to place TLS/SSL I/O under application control, this |
| 46 | can be used when the application wishes to use a non standard transport for |
| 47 | TLS/SSL or the normal socket routines are inappropriate. |
Dr. Stephen Henson | 18f2259 | 2000-09-14 18:55:39 +0000 | [diff] [blame] | 48 | |
| 49 | Calls to BIO_read() will read data from the buffer or request a retry if no |
| 50 | data is available. |
| 51 | |
| 52 | Calls to BIO_write() will place data in the buffer or request a retry if the |
| 53 | buffer is full. |
| 54 | |
| 55 | The standard calls BIO_ctrl_pending() and BIO_ctrl_wpending() can be used to |
| 56 | determine the amount of pending data in the read or write buffer. |
| 57 | |
| 58 | BIO_reset() clears any data in the write buffer. |
| 59 | |
| 60 | BIO_make_bio_pair() joins two separate BIOs into a connected pair. |
| 61 | |
| 62 | BIO_destroy_pair() destroys the association between two connected BIOs. Freeing |
Bodo Möller | e39c194 | 2000-09-14 22:09:55 +0000 | [diff] [blame] | 63 | up any half of the pair will automatically destroy the association. |
Dr. Stephen Henson | 18f2259 | 2000-09-14 18:55:39 +0000 | [diff] [blame] | 64 | |
Bodo Möller | 07fcf42 | 2000-09-17 01:23:53 +0000 | [diff] [blame] | 65 | BIO_shutdown_wr() is used to close down a BIO B<b>. After this call no further |
Dr. Stephen Henson | 2c281eb | 2000-09-16 21:21:01 +0000 | [diff] [blame] | 66 | writes on BIO B<b> are allowed (they will return an error). Reads on the other |
| 67 | half of the pair will return any pending data or EOF when all pending data has |
| 68 | been read. |
| 69 | |
Dr. Stephen Henson | 18f2259 | 2000-09-14 18:55:39 +0000 | [diff] [blame] | 70 | BIO_set_write_buf_size() sets the write buffer size of BIO B<b> to B<size>. |
Ulf Möller | 1e4e549 | 2000-09-16 15:39:28 +0000 | [diff] [blame] | 71 | If the size is not initialized a default value is used. This is currently |
Dr. Stephen Henson | 18f2259 | 2000-09-14 18:55:39 +0000 | [diff] [blame] | 72 | 17K, sufficient for a maximum size TLS record. |
| 73 | |
| 74 | BIO_get_write_buf_size() returns the size of the write buffer. |
| 75 | |
| 76 | BIO_new_bio_pair() combines the calls to BIO_new(), BIO_make_bio_pair() and |
| 77 | BIO_set_write_buf_size() to create a connected pair of BIOs B<bio1>, B<bio2> |
| 78 | with write buffer sizes B<writebuf1> and B<writebuf2>. If either size is |
Richard Levitte | 18be6c4 | 2002-12-12 22:12:02 +0000 | [diff] [blame] | 79 | zero then the default size is used. BIO_new_bio_pair() does not check whether |
| 80 | B<bio1> or B<bio2> do point to some other BIO, the values are overwritten, |
| 81 | BIO_free() is not called. |
Dr. Stephen Henson | 18f2259 | 2000-09-14 18:55:39 +0000 | [diff] [blame] | 82 | |
Ulf Möller | 1e4e549 | 2000-09-16 15:39:28 +0000 | [diff] [blame] | 83 | BIO_get_write_guarantee() and BIO_ctrl_get_write_guarantee() return the maximum |
Dr. Stephen Henson | 18f2259 | 2000-09-14 18:55:39 +0000 | [diff] [blame] | 84 | length of data that can be currently written to the BIO. Writes larger than this |
| 85 | value will return a value from BIO_write() less than the amount requested or if the |
| 86 | buffer is full request a retry. BIO_ctrl_get_write_guarantee() is a function |
| 87 | whereas BIO_get_write_guarantee() is a macro. |
| 88 | |
Bodo Möller | c1629c9 | 2000-09-16 15:55:57 +0000 | [diff] [blame] | 89 | BIO_get_read_request() and BIO_ctrl_get_read_request() return the |
| 90 | amount of data requested, or the buffer size if it is less, if the |
| 91 | last read attempt at the other half of the BIO pair failed due to an |
| 92 | empty buffer. This can be used to determine how much data should be |
| 93 | written to the BIO so the next read will succeed: this is most useful |
| 94 | in TLS/SSL applications where the amount of data read is usually |
| 95 | meaningful rather than just a buffer size. After a successful read |
| 96 | this call will return zero. It also will return zero once new data |
| 97 | has been written satisfying the read request or part of it. |
| 98 | Note that BIO_get_read_request() never returns an amount larger |
| 99 | than that returned by BIO_get_write_guarantee(). |
Dr. Stephen Henson | 18f2259 | 2000-09-14 18:55:39 +0000 | [diff] [blame] | 100 | |
| 101 | BIO_ctrl_reset_read_request() can also be used to reset the value returned by |
| 102 | BIO_get_read_request() to zero. |
| 103 | |
| 104 | =head1 NOTES |
| 105 | |
Ulf Möller | 1e4e549 | 2000-09-16 15:39:28 +0000 | [diff] [blame] | 106 | Both halves of a BIO pair should be freed. That is even if one half is implicit |
Dr. Stephen Henson | 18f2259 | 2000-09-14 18:55:39 +0000 | [diff] [blame] | 107 | freed due to a BIO_free_all() or SSL_free() call the other half needs to be freed. |
| 108 | |
Bodo Möller | e39c194 | 2000-09-14 22:09:55 +0000 | [diff] [blame] | 109 | When used in bidirectional applications (such as TLS/SSL) care should be taken to |
Dr. Stephen Henson | 18f2259 | 2000-09-14 18:55:39 +0000 | [diff] [blame] | 110 | flush any data in the write buffer. This can be done by calling BIO_pending() |
| 111 | on the other half of the pair and, if any data is pending, reading it and sending |
| 112 | it to the underlying transport. This must be done before any normal processing |
| 113 | (such as calling select() ) due to a request and BIO_should_read() being true. |
| 114 | |
| 115 | To see why this is important consider a case where a request is sent using |
| 116 | BIO_write() and a response read with BIO_read(), this can occur during an |
Bodo Möller | e39c194 | 2000-09-14 22:09:55 +0000 | [diff] [blame] | 117 | TLS/SSL handshake for example. BIO_write() will succeed and place data in the write |
Dr. Stephen Henson | 18f2259 | 2000-09-14 18:55:39 +0000 | [diff] [blame] | 118 | buffer. BIO_read() will initially fail and BIO_should_read() will be true. If |
| 119 | the application then waits for data to be available on the underlying transport |
Ulf Möller | 1e4e549 | 2000-09-16 15:39:28 +0000 | [diff] [blame] | 120 | before flushing the write buffer it will never succeed because the request was |
Dr. Stephen Henson | 18f2259 | 2000-09-14 18:55:39 +0000 | [diff] [blame] | 121 | never sent! |
| 122 | |
Richard Levitte | 18be6c4 | 2002-12-12 22:12:02 +0000 | [diff] [blame] | 123 | =head1 RETURN VALUES |
| 124 | |
| 125 | BIO_new_bio_pair() returns 1 on success, with the new BIOs available in |
| 126 | B<bio1> and B<bio2>, or 0 on failure, with NULL pointers stored into the |
| 127 | locations for B<bio1> and B<bio2>. Check the error stack for more information. |
| 128 | |
Richard Levitte | edd55d0 | 2003-05-23 09:08:59 +0000 | [diff] [blame] | 129 | [XXXXX: More return values need to be added here] |
Richard Levitte | 18be6c4 | 2002-12-12 22:12:02 +0000 | [diff] [blame] | 130 | |
Dr. Stephen Henson | 18f2259 | 2000-09-14 18:55:39 +0000 | [diff] [blame] | 131 | =head1 EXAMPLE |
| 132 | |
Richard Levitte | 18be6c4 | 2002-12-12 22:12:02 +0000 | [diff] [blame] | 133 | The BIO pair can be used to have full control over the network access of an |
| 134 | application. The application can call select() on the socket as required |
| 135 | without having to go through the SSL-interface. |
| 136 | |
| 137 | BIO *internal_bio, *network_bio; |
| 138 | ... |
Rich Salz | c03726c | 2015-08-27 12:28:08 -0400 | [diff] [blame] | 139 | BIO_new_bio_pair(&internal_bio, 0, &network_bio, 0); |
Richard Levitte | 18be6c4 | 2002-12-12 22:12:02 +0000 | [diff] [blame] | 140 | SSL_set_bio(ssl, internal_bio, internal_bio); |
Rich Salz | c03726c | 2015-08-27 12:28:08 -0400 | [diff] [blame] | 141 | SSL_operations(); //e.g SSL_read and SSL_write |
Richard Levitte | 18be6c4 | 2002-12-12 22:12:02 +0000 | [diff] [blame] | 142 | ... |
| 143 | |
| 144 | application | TLS-engine |
| 145 | | | |
| 146 | +----------> SSL_operations() |
| 147 | | /\ || |
| 148 | | || \/ |
| 149 | | BIO-pair (internal_bio) |
Rich Salz | c03726c | 2015-08-27 12:28:08 -0400 | [diff] [blame] | 150 | | BIO-pair (network_bio) |
| 151 | | || /\ |
| 152 | | \/ || |
| 153 | +-----------< BIO_operations() |
Richard Levitte | 18be6c4 | 2002-12-12 22:12:02 +0000 | [diff] [blame] | 154 | | | |
Rich Salz | c03726c | 2015-08-27 12:28:08 -0400 | [diff] [blame] | 155 | | | |
| 156 | socket |
Richard Levitte | 18be6c4 | 2002-12-12 22:12:02 +0000 | [diff] [blame] | 157 | |
| 158 | ... |
| 159 | SSL_free(ssl); /* implicitly frees internal_bio */ |
| 160 | BIO_free(network_bio); |
| 161 | ... |
| 162 | |
| 163 | As the BIO pair will only buffer the data and never directly access the |
| 164 | connection, it behaves non-blocking and will return as soon as the write |
| 165 | buffer is full or the read buffer is drained. Then the application has to |
| 166 | flush the write buffer and/or fill the read buffer. |
| 167 | |
| 168 | Use the BIO_ctrl_pending(), to find out whether data is buffered in the BIO |
Alok Menghrajani | 186bb90 | 2015-04-13 11:05:13 -0700 | [diff] [blame] | 169 | and must be transferred to the network. Use BIO_ctrl_get_read_request() to |
Richard Levitte | 18be6c4 | 2002-12-12 22:12:02 +0000 | [diff] [blame] | 170 | find out, how many bytes must be written into the buffer before the |
| 171 | SSL_operation() can successfully be continued. |
| 172 | |
| 173 | =head1 WARNING |
| 174 | |
| 175 | As the data is buffered, SSL_operation() may return with a ERROR_SSL_WANT_READ |
| 176 | condition, but there is still data in the write buffer. An application must |
| 177 | not rely on the error value of SSL_operation() but must assure that the |
| 178 | write buffer is always flushed first. Otherwise a deadlock may occur as |
| 179 | the peer might be waiting for the data before being able to continue. |
Dr. Stephen Henson | 18f2259 | 2000-09-14 18:55:39 +0000 | [diff] [blame] | 180 | |
| 181 | =head1 SEE ALSO |
| 182 | |
Rich Salz | 9b86974 | 2015-08-17 15:21:33 -0400 | [diff] [blame] | 183 | L<SSL_set_bio(3)>, L<ssl(3)>, L<bio(3)>, |
| 184 | L<BIO_should_retry(3)>, L<BIO_read(3)> |
Dr. Stephen Henson | 18f2259 | 2000-09-14 18:55:39 +0000 | [diff] [blame] | 185 | |
| 186 | =cut |