2
0

SSL_write.pod 8.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208
  1. =pod
  2. =head1 NAME
  3. SSL_write_ex2, SSL_write_ex, SSL_write, SSL_sendfile, SSL_WRITE_FLAG_CONCLUDE -
  4. write bytes to a TLS/SSL connection
  5. =head1 SYNOPSIS
  6. #include <openssl/ssl.h>
  7. #define SSL_WRITE_FLAG_CONCLUDE
  8. ossl_ssize_t SSL_sendfile(SSL *s, int fd, off_t offset, size_t size, int flags);
  9. int SSL_write_ex2(SSL *s, const void *buf, size_t num,
  10. uint64_t flags,
  11. size_t *written);
  12. int SSL_write_ex(SSL *s, const void *buf, size_t num, size_t *written);
  13. int SSL_write(SSL *ssl, const void *buf, int num);
  14. =head1 DESCRIPTION
  15. SSL_write_ex() and SSL_write() write B<num> bytes from the buffer B<buf> into
  16. the specified B<ssl> connection. On success SSL_write_ex() will store the number
  17. of bytes written in B<*written>.
  18. SSL_write_ex2() functions similarly to SSL_write_ex() but can also accept
  19. optional flags which modify its behaviour. Calling SSL_write_ex2() with a
  20. I<flags> argument of 0 is exactly equivalent to calling SSL_write_ex().
  21. SSL_sendfile() writes B<size> bytes from offset B<offset> in the file
  22. descriptor B<fd> to the specified SSL connection B<s>. This function provides
  23. efficient zero-copy semantics. SSL_sendfile() is available only when
  24. Kernel TLS is enabled, which can be checked by calling BIO_get_ktls_send().
  25. It is provided here to allow users to maintain the same interface.
  26. The meaning of B<flags> is platform dependent.
  27. Currently, under Linux it is ignored.
  28. The I<flags> argument to SSL_write_ex2() can accept zero or more of the
  29. following flags. Note that which flags are supported will depend on the kind of
  30. SSL object and underlying protocol being used:
  31. =over 4
  32. =item B<SSL_WRITE_FLAG_CONCLUDE>
  33. This flag is only supported on QUIC stream SSL objects (or QUIC connection SSL
  34. objects with a default stream attached).
  35. If this flag is set, and the call to SSL_write_ex2() succeeds, and all of the
  36. data passed to the call is written (meaning that C<*written == num>), the
  37. relevant QUIC stream's send part is concluded automatically as though
  38. L<SSL_stream_conclude(3)> was called (causing transmission of a FIN for the
  39. stream).
  40. While using this flag is semantically equivalent to calling
  41. L<SSL_stream_conclude(3)> after a successful call to this function, using this
  42. flag enables greater efficiency than making these two API calls separately, as
  43. it enables the written stream data and the FIN flag indicating the end of the
  44. stream to be scheduled as part of the same QUIC STREAM frame and QUIC packet.
  45. Setting this flag does not cause a stream's send part to be concluded if not all
  46. of the data passed to the call was consumed.
  47. =back
  48. A call to SSL_write_ex2() fails if a flag is passed which is not supported or
  49. understood by the given SSL object. An application should determine if a flag is
  50. supported (for example, for B<SSL_WRITE_FLAG_CONCLUDE>, that a QUIC stream SSL
  51. object is being used) before attempting to use it.
  52. =head1 NOTES
  53. In the paragraphs below a "write function" is defined as one of either
  54. SSL_write_ex(), or SSL_write().
  55. If necessary, a write function will negotiate a TLS/SSL session, if not already
  56. explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the peer
  57. requests a re-negotiation, it will be performed transparently during
  58. the write function operation. The behaviour of the write functions depends on the
  59. underlying BIO.
  60. For the transparent negotiation to succeed, the B<ssl> must have been
  61. initialized to client or server mode. This is being done by calling
  62. L<SSL_set_connect_state(3)> or SSL_set_accept_state()
  63. before the first call to a write function.
  64. If the underlying BIO is B<blocking>, the write functions will only return, once
  65. the write operation has been finished or an error occurred.
  66. If the underlying BIO is B<nonblocking> the write functions will also return
  67. when the underlying BIO could not satisfy the needs of the function to continue
  68. the operation. In this case a call to L<SSL_get_error(3)> with the
  69. return value of the write function will yield B<SSL_ERROR_WANT_READ>
  70. or B<SSL_ERROR_WANT_WRITE>. As at any time a re-negotiation is possible, a
  71. call to a write function can also cause read operations! The calling process
  72. then must repeat the call after taking appropriate action to satisfy the needs
  73. of the write function. The action depends on the underlying BIO. When using a
  74. nonblocking socket, nothing is to be done, but select() can be used to check
  75. for the required condition. When using a buffering BIO, like a BIO pair, data
  76. must be written into or retrieved out of the BIO before being able to continue.
  77. The write functions will only return with success when the complete contents of
  78. B<buf> of length B<num> has been written. This default behaviour can be changed
  79. with the SSL_MODE_ENABLE_PARTIAL_WRITE option of L<SSL_CTX_set_mode(3)>. When
  80. this flag is set the write functions will also return with success when a
  81. partial write has been successfully completed. In this case the write function
  82. operation is considered completed. The bytes are sent and a new write call with
  83. a new buffer (with the already sent bytes removed) must be started. A partial
  84. write is performed with the size of a message block, which is 16kB.
  85. When used with a QUIC SSL object, calling an I/O function such as SSL_write()
  86. allows internal network event processing to be performed. It is important that
  87. this processing is performed regularly. If an application is not using thread
  88. assisted mode, an application should ensure that an I/O function such as
  89. SSL_write() is called regularly, or alternatively ensure that SSL_handle_events()
  90. is called regularly. See L<openssl-quic(7)> and L<SSL_handle_events(3)> for more
  91. information.
  92. =head1 WARNINGS
  93. When a write function call has to be repeated because L<SSL_get_error(3)>
  94. returned B<SSL_ERROR_WANT_READ> or B<SSL_ERROR_WANT_WRITE>, it must be repeated
  95. with the same arguments.
  96. The data that was passed might have been partially processed.
  97. When B<SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER> was set using L<SSL_CTX_set_mode(3)>
  98. the pointer can be different, but the data and length should still be the same.
  99. You should not call SSL_write() with num=0, it will return an error.
  100. SSL_write_ex() can be called with num=0, but will not send application data to
  101. the peer.
  102. =head1 RETURN VALUES
  103. SSL_write_ex() and SSL_write_ex2() return 1 for success or 0 for failure.
  104. Success means that all requested application data bytes have been written to the
  105. SSL connection or, if SSL_MODE_ENABLE_PARTIAL_WRITE is in use, at least 1
  106. application data byte has been written to the SSL connection. Failure means that
  107. not all the requested bytes have been written yet (if
  108. SSL_MODE_ENABLE_PARTIAL_WRITE is not in use) or no bytes could be written to the
  109. SSL connection (if SSL_MODE_ENABLE_PARTIAL_WRITE is in use). Failures can be
  110. retryable (e.g. the network write buffer has temporarily filled up) or
  111. non-retryable (e.g. a fatal network error). In the event of a failure call
  112. L<SSL_get_error(3)> to find out the reason which indicates whether the call is
  113. retryable or not.
  114. For SSL_write() the following return values can occur:
  115. =over 4
  116. =item E<gt> 0
  117. The write operation was successful, the return value is the number of
  118. bytes actually written to the TLS/SSL connection.
  119. =item Z<><= 0
  120. The write operation was not successful, because either the connection was
  121. closed, an error occurred or action must be taken by the calling process.
  122. Call SSL_get_error() with the return value B<ret> to find out the reason.
  123. Old documentation indicated a difference between 0 and -1, and that -1 was
  124. retryable.
  125. You should instead call SSL_get_error() to find out if it's retryable.
  126. =back
  127. For SSL_sendfile(), the following return values can occur:
  128. =over 4
  129. =item Z<>>= 0
  130. The write operation was successful, the return value is the number
  131. of bytes of the file written to the TLS/SSL connection. The return
  132. value can be less than B<size> for a partial write.
  133. =item E<lt> 0
  134. The write operation was not successful, because either the connection was
  135. closed, an error occurred or action must be taken by the calling process.
  136. Call SSL_get_error() with the return value to find out the reason.
  137. =back
  138. =head1 SEE ALSO
  139. L<SSL_get_error(3)>, L<SSL_read_ex(3)>, L<SSL_read(3)>
  140. L<SSL_CTX_set_mode(3)>, L<SSL_CTX_new(3)>,
  141. L<SSL_connect(3)>, L<SSL_accept(3)>
  142. L<SSL_set_connect_state(3)>, L<BIO_ctrl(3)>,
  143. L<ssl(7)>, L<bio(7)>
  144. =head1 HISTORY
  145. The SSL_write_ex() function was added in OpenSSL 1.1.1.
  146. The SSL_sendfile() function was added in OpenSSL 3.0.
  147. =head1 COPYRIGHT
  148. Copyright 2000-2024 The OpenSSL Project Authors. All Rights Reserved.
  149. Licensed under the Apache License 2.0 (the "License"). You may not use
  150. this file except in compliance with the License. You can obtain a copy
  151. in the file LICENSE in the source distribution or at
  152. L<https://www.openssl.org/source/license.html>.
  153. =cut