1 .\" $NetBSD: libcrypto.pl,v 1.3 2007/11/27 22:16:03 christos Exp $
3 .\" Automatically generated by Pod::Man 2.16 (Pod::Simple 3.05)
6 .\" ========================================================================
7 .de Sh \" Subsection heading
15 .de Sp \" Vertical space (when we can't use .PP)
19 .de Vb \" Begin verbatim text
24 .de Ve \" End verbatim text
28 .\" Set up some character translations and predefined strings. \*(-- will
29 .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
30 .\" double quote, and \*(R" will give a right double quote. \*(C+ will
31 .\" give a nicer C++. Capital omega is used to do unbreakable dashes and
32 .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,
33 .\" nothing in troff, for use with C<>.
35 .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
39 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
40 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
53 .\" Escape single quotes in literal strings from groff's Unicode transform.
57 .\" If the F register is turned on, we'll generate index entries on stderr for
58 .\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index
59 .\" entries marked with X<> in POD. Of course, you'll have to process the
60 .\" output yourself in some meaningful fashion.
63 . tm Index:\\$1\t\\n%\t"\\$2"
73 .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
74 .\" Fear. Run. Save yourself. No user-serviceable parts.
75 . \" fudge factors for nroff and troff
84 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
90 . \" simple accents for nroff and troff
100 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
101 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
102 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
103 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
104 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
105 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
107 . \" troff and (daisy-wheel) nroff accents
108 .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
109 .ds 8 \h'\*(#H'\(*b\h'-\*(#H'
110 .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
111 .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
112 .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
113 .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
114 .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
115 .ds ae a\h'-(\w'a'u*4/10)'e
116 .ds Ae A\h'-(\w'A'u*4/10)'E
117 . \" corrections for vroff
118 .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
119 .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
120 . \" for low resolution devices (crt and lpr)
121 .if \n(.H>23 .if \n(.V>19 \
134 .\" ========================================================================
136 .IX Title "SSL_read 3"
137 .TH SSL_read 3 "2008-08-01" "1.1.0-dev" "OpenSSL"
138 .\" For nroff, turn off justification. Always turn off hyphenation; it makes
139 .\" way too many mistakes in technical documents.
143 SSL_read \- read bytes from a TLS/SSL connection.
147 .IX Header "SYNOPSIS"
149 \& #include <openssl/ssl.h>
151 \& int SSL_read(SSL *ssl, void *buf, int num);
154 .IX Header "DESCRIPTION"
155 \&\fISSL_read()\fR tries to read \fBnum\fR bytes from the specified \fBssl\fR into the
159 If necessary, \fISSL_read()\fR will negotiate a \s-1TLS/SSL\s0 session, if
160 not already explicitly performed by \fISSL_connect\fR\|(3) or
161 \&\fISSL_accept\fR\|(3). If the
162 peer requests a re-negotiation, it will be performed transparently during
163 the \fISSL_read()\fR operation. The behaviour of \fISSL_read()\fR depends on the
164 underlying \s-1BIO\s0.
166 For the transparent negotiation to succeed, the \fBssl\fR must have been
167 initialized to client or server mode. This is being done by calling
168 \&\fISSL_set_connect_state\fR\|(3) or \fISSL_set_accept_state()\fR
169 before the first call to an \fISSL_read()\fR or \fISSL_write\fR\|(3)
172 \&\fISSL_read()\fR works based on the \s-1SSL/TLS\s0 records. The data are received in
173 records (with a maximum record size of 16kB for SSLv3/TLSv1). Only when a
174 record has been completely received, it can be processed (decryption and
175 check of integrity). Therefore data that was not retrieved at the last
176 call of \fISSL_read()\fR can still be buffered inside the \s-1SSL\s0 layer and will be
177 retrieved on the next call to \fISSL_read()\fR. If \fBnum\fR is higher than the
178 number of bytes buffered, \fISSL_read()\fR will return with the bytes buffered.
179 If no more bytes are in the buffer, \fISSL_read()\fR will trigger the processing
180 of the next record. Only when the record has been received and processed
181 completely, \fISSL_read()\fR will return reporting success. At most the contents
182 of the record will be returned. As the size of an \s-1SSL/TLS\s0 record may exceed
183 the maximum packet size of the underlying transport (e.g. \s-1TCP\s0), it may
184 be necessary to read several packets from the transport layer before the
185 record is complete and \fISSL_read()\fR can succeed.
187 If the underlying \s-1BIO\s0 is \fBblocking\fR, \fISSL_read()\fR will only return, once the
188 read operation has been finished or an error occurred, except when a
189 renegotiation take place, in which case a \s-1SSL_ERROR_WANT_READ\s0 may occur.
190 This behaviour can be controlled with the \s-1SSL_MODE_AUTO_RETRY\s0 flag of the
191 \&\fISSL_CTX_set_mode\fR\|(3) call.
193 If the underlying \s-1BIO\s0 is \fBnon-blocking\fR, \fISSL_read()\fR will also return
194 when the underlying \s-1BIO\s0 could not satisfy the needs of \fISSL_read()\fR
195 to continue the operation. In this case a call to
196 \&\fISSL_get_error\fR\|(3) with the
197 return value of \fISSL_read()\fR will yield \fB\s-1SSL_ERROR_WANT_READ\s0\fR or
198 \&\fB\s-1SSL_ERROR_WANT_WRITE\s0\fR. As at any time a re-negotiation is possible, a
199 call to \fISSL_read()\fR can also cause write operations! The calling process
200 then must repeat the call after taking appropriate action to satisfy the
201 needs of \fISSL_read()\fR. The action depends on the underlying \s-1BIO\s0. When using a
202 non-blocking socket, nothing is to be done, but \fIselect()\fR can be used to check
203 for the required condition. When using a buffering \s-1BIO\s0, like a \s-1BIO\s0 pair, data
204 must be written into or retrieved out of the \s-1BIO\s0 before being able to continue.
206 \&\fISSL_pending\fR\|(3) can be used to find out whether there
207 are buffered bytes available for immediate retrieval. In this case
208 \&\fISSL_read()\fR can be called without blocking or actually receiving new
209 data from the underlying socket.
212 When an \fISSL_read()\fR operation has to be repeated because of
213 \&\fB\s-1SSL_ERROR_WANT_READ\s0\fR or \fB\s-1SSL_ERROR_WANT_WRITE\s0\fR, it must be repeated
214 with the same arguments.
216 .IX Header "RETURN VALUES"
217 The following return values can occur:
220 The read operation was successful; the return value is the number of
221 bytes actually read from the \s-1TLS/SSL\s0 connection.
223 The read operation was not successful. The reason may either be a clean
224 shutdown due to a \*(L"close notify\*(R" alert sent by the peer (in which case
225 the \s-1SSL_RECEIVED_SHUTDOWN\s0 flag in the ssl shutdown state is set
226 (see \fISSL_shutdown\fR\|(3),
227 \&\fISSL_set_shutdown\fR\|(3)). It is also possible, that
228 the peer simply shut down the underlying transport and the shutdown is
229 incomplete. Call \fISSL_get_error()\fR with the return value \fBret\fR to find out,
230 whether an error occurred or the connection was shut down cleanly
231 (\s-1SSL_ERROR_ZERO_RETURN\s0).
233 SSLv2 (deprecated) does not support a shutdown alert protocol, so it can
234 only be detected, whether the underlying connection was closed. It cannot
235 be checked, whether the closure was initiated by the peer or by something
239 The read operation was not successful, because either an error occurred
240 or action must be taken by the calling process. Call \fISSL_get_error()\fR with the
241 return value \fBret\fR to find out the reason.
243 .IX Header "SEE ALSO"
244 \&\fISSL_get_error\fR\|(3), \fISSL_write\fR\|(3),
245 \&\fISSL_CTX_set_mode\fR\|(3), \fISSL_CTX_new\fR\|(3),
246 \&\fISSL_connect\fR\|(3), \fISSL_accept\fR\|(3)
247 \&\fISSL_set_connect_state\fR\|(3),
248 \&\fISSL_pending\fR\|(3),
249 \&\fISSL_shutdown\fR\|(3), \fISSL_set_shutdown\fR\|(3),
250 \&\fIssl\fR\|(3), \fIopenssl_bio\fR\|(3)