123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128 |
- =pod
- =head1 NAME
- SSL_key_update,
- SSL_get_key_update_type,
- SSL_renegotiate,
- SSL_renegotiate_abbreviated,
- SSL_renegotiate_pending
- - initiate and obtain information about updating connection keys
- =head1 SYNOPSIS
- #include <openssl/ssl.h>
- int SSL_key_update(SSL *s, int updatetype);
- int SSL_get_key_update_type(const SSL *s);
- int SSL_renegotiate(SSL *s);
- int SSL_renegotiate_abbreviated(SSL *s);
- int SSL_renegotiate_pending(const SSL *s);
- =head1 DESCRIPTION
- SSL_key_update() schedules an update of the keys for the current TLS connection.
- If the B<updatetype> parameter is set to B<SSL_KEY_UPDATE_NOT_REQUESTED> then
- the sending keys for this connection will be updated and the peer will be
- informed of the change. If the B<updatetype> parameter is set to
- B<SSL_KEY_UPDATE_REQUESTED> then the sending keys for this connection will be
- updated and the peer will be informed of the change along with a request for the
- peer to additionally update its sending keys. It is an error if B<updatetype> is
- set to B<SSL_KEY_UPDATE_NONE>.
- SSL_key_update() must only be called after the initial handshake has been
- completed and TLSv1.3 or QUIC has been negotiated, at the same time, the
- application needs to ensure that the writing of data has been completed. The key
- update will not take place until the next time an IO operation such as
- SSL_read_ex() or SSL_write_ex() takes place on the connection. Alternatively
- SSL_do_handshake() can be called to force the update to take place immediately.
- SSL_get_key_update_type() can be used to determine whether a key update
- operation has been scheduled but not yet performed. The type of the pending key
- update operation will be returned if there is one, or SSL_KEY_UPDATE_NONE
- otherwise.
- SSL_renegotiate() and SSL_renegotiate_abbreviated() should only be called for
- connections that have negotiated TLSv1.2 or less. Calling them on any other
- connection will result in an error.
- When called from the client side, SSL_renegotiate() schedules a completely new
- handshake over an existing SSL/TLS connection. The next time an IO operation
- such as SSL_read_ex() or SSL_write_ex() takes place on the connection a check
- will be performed to confirm that it is a suitable time to start a
- renegotiation. If so, then it will be initiated immediately. OpenSSL will not
- attempt to resume any session associated with the connection in the new
- handshake.
- When called from the client side, SSL_renegotiate_abbreviated() works in the
- same was as SSL_renegotiate() except that OpenSSL will attempt to resume the
- session associated with the current connection in the new handshake.
- When called from the server side, SSL_renegotiate() and
- SSL_renegotiate_abbreviated() behave identically. They both schedule a request
- for a new handshake to be sent to the client. The next time an IO operation is
- performed then the same checks as on the client side are performed and then, if
- appropriate, the request is sent. The client may or may not respond with a new
- handshake and it may or may not attempt to resume an existing session. If
- a new handshake is started then this will be handled transparently by calling
- any OpenSSL IO function.
- If an OpenSSL client receives a renegotiation request from a server then again
- this will be handled transparently through calling any OpenSSL IO function. For
- a TLS connection the client will attempt to resume the current session in the
- new handshake. For historical reasons, DTLS clients will not attempt to resume
- the session in the new handshake.
- The SSL_renegotiate_pending() function returns 1 if a renegotiation or
- renegotiation request has been scheduled but not yet acted on, or 0 otherwise.
- =head1 USAGE WITH QUIC
- SSL_key_update() can also be used to perform a key update when using QUIC. The
- function must be called on a QUIC connection SSL object. This is normally done
- automatically when needed. Since a locally initiated QUIC key update always
- causes a peer to also trigger a key update, passing
- B<SSL_KEY_UPDATE_NOT_REQUESTED> as B<updatetype> has the same effect as passing
- B<SSL_KEY_UPDATE_REQUESTED>.
- The QUIC connection must have been fully established before a key update can be
- performed, and other QUIC protocol rules govern how frequently QUIC key update
- can be performed. SSL_key_update() will fail if these requirements are not met.
- Because QUIC key updates are always handled immediately,
- SSL_get_key_update_type() always returns SSL_KEY_UPDATE_NONE when called on a
- QUIC connection SSL object.
- =head1 RETURN VALUES
- SSL_key_update(), SSL_renegotiate() and SSL_renegotiate_abbreviated() return 1
- on success or 0 on error.
- SSL_get_key_update_type() returns the update type of the pending key update
- operation or SSL_KEY_UPDATE_NONE if there is none.
- SSL_renegotiate_pending() returns 1 if a renegotiation or renegotiation request
- has been scheduled but not yet acted on, or 0 otherwise.
- =head1 SEE ALSO
- L<ssl(7)>, L<SSL_read_ex(3)>,
- L<SSL_write_ex(3)>,
- L<SSL_do_handshake(3)>
- =head1 HISTORY
- The SSL_key_update() and SSL_get_key_update_type() functions were added in
- OpenSSL 1.1.1.
- =head1 COPYRIGHT
- Copyright 2017-2023 The OpenSSL Project Authors. All Rights Reserved.
- Licensed under the Apache License 2.0 (the "License"). You may not use
- this file except in compliance with the License. You can obtain a copy
- in the file LICENSE in the source distribution or at
- L<https://www.openssl.org/source/license.html>.
- =cut
|