1 | =pod
|
---|
2 |
|
---|
3 | =head1 NAME
|
---|
4 |
|
---|
5 | SSL_get_error - obtain result code for TLS/SSL I/O operation
|
---|
6 |
|
---|
7 | =head1 SYNOPSIS
|
---|
8 |
|
---|
9 | #include <openssl/ssl.h>
|
---|
10 |
|
---|
11 | int SSL_get_error(const SSL *ssl, int ret);
|
---|
12 |
|
---|
13 | =head1 DESCRIPTION
|
---|
14 |
|
---|
15 | SSL_get_error() returns a result code (suitable for the C "switch"
|
---|
16 | statement) for a preceding call to SSL_connect(), SSL_accept(), SSL_do_handshake(),
|
---|
17 | SSL_read_ex(), SSL_read(), SSL_peek_ex(), SSL_peek(), SSL_shutdown(),
|
---|
18 | SSL_write_ex() or SSL_write() on B<ssl>. The value returned by that TLS/SSL I/O
|
---|
19 | function must be passed to SSL_get_error() in parameter B<ret>.
|
---|
20 |
|
---|
21 | In addition to B<ssl> and B<ret>, SSL_get_error() inspects the
|
---|
22 | current thread's OpenSSL error queue. Thus, SSL_get_error() must be
|
---|
23 | used in the same thread that performed the TLS/SSL I/O operation, and no
|
---|
24 | other OpenSSL function calls should appear in between. The current
|
---|
25 | thread's error queue must be empty before the TLS/SSL I/O operation is
|
---|
26 | attempted, or SSL_get_error() will not work reliably.
|
---|
27 |
|
---|
28 | =head1 NOTES
|
---|
29 |
|
---|
30 | Some TLS implementations do not send a close_notify alert on shutdown.
|
---|
31 |
|
---|
32 | On an unexpected EOF, versions before OpenSSL 3.0 returned
|
---|
33 | B<SSL_ERROR_SYSCALL>, nothing was added to the error stack, and errno was 0.
|
---|
34 | Since OpenSSL 3.0 the returned error is B<SSL_ERROR_SSL> with a meaningful
|
---|
35 | error on the error stack (SSL_R_UNEXPECTED_EOF_WHILE_READING). This error reason
|
---|
36 | code may be used for control flow decisions (see the man page for
|
---|
37 | L<ERR_GET_REASON(3)> for further details on this).
|
---|
38 |
|
---|
39 | =head1 RETURN VALUES
|
---|
40 |
|
---|
41 | The following return values can currently occur:
|
---|
42 |
|
---|
43 | =over 4
|
---|
44 |
|
---|
45 | =item SSL_ERROR_NONE
|
---|
46 |
|
---|
47 | The TLS/SSL I/O operation completed. This result code is returned
|
---|
48 | if and only if B<ret E<gt> 0>.
|
---|
49 |
|
---|
50 | =item SSL_ERROR_ZERO_RETURN
|
---|
51 |
|
---|
52 | The TLS/SSL peer has closed the connection for writing by sending the
|
---|
53 | close_notify alert.
|
---|
54 | No more data can be read.
|
---|
55 | Note that B<SSL_ERROR_ZERO_RETURN> does not necessarily
|
---|
56 | indicate that the underlying transport has been closed.
|
---|
57 |
|
---|
58 | This error can also appear when the option B<SSL_OP_IGNORE_UNEXPECTED_EOF>
|
---|
59 | is set. See L<SSL_CTX_set_options(3)> for more details.
|
---|
60 |
|
---|
61 | =item SSL_ERROR_WANT_READ, SSL_ERROR_WANT_WRITE
|
---|
62 |
|
---|
63 | The operation did not complete and can be retried later.
|
---|
64 |
|
---|
65 | B<SSL_ERROR_WANT_READ> is returned when the last operation was a read
|
---|
66 | operation from a nonblocking B<BIO>.
|
---|
67 | It means that not enough data was available at this time to complete the
|
---|
68 | operation.
|
---|
69 | If at a later time the underlying B<BIO> has data available for reading the same
|
---|
70 | function can be called again.
|
---|
71 |
|
---|
72 | SSL_read() and SSL_read_ex() can also set B<SSL_ERROR_WANT_READ> when there is
|
---|
73 | still unprocessed data available at either the B<SSL> or the B<BIO> layer, even
|
---|
74 | for a blocking B<BIO>.
|
---|
75 | See L<SSL_read(3)> for more information.
|
---|
76 |
|
---|
77 | B<SSL_ERROR_WANT_WRITE> is returned when the last operation was a write
|
---|
78 | to a nonblocking B<BIO> and it was unable to sent all data to the B<BIO>.
|
---|
79 | When the B<BIO> is writable again, the same function can be called again.
|
---|
80 |
|
---|
81 | Note that the retry may again lead to an B<SSL_ERROR_WANT_READ> or
|
---|
82 | B<SSL_ERROR_WANT_WRITE> condition.
|
---|
83 | There is no fixed upper limit for the number of iterations that
|
---|
84 | may be necessary until progress becomes visible at application
|
---|
85 | protocol level.
|
---|
86 |
|
---|
87 | It is safe to call SSL_read() or SSL_read_ex() when more data is available
|
---|
88 | even when the call that set this error was an SSL_write() or SSL_write_ex().
|
---|
89 | However, if the call was an SSL_write() or SSL_write_ex(), it should be called
|
---|
90 | again to continue sending the application data. If you get B<SSL_ERROR_WANT_WRITE>
|
---|
91 | from SSL_write() or SSL_write_ex() then you should not do any other operation
|
---|
92 | that could trigger B<IO> other than to repeat the previous SSL_write() call.
|
---|
93 |
|
---|
94 | For socket B<BIO>s (e.g. when SSL_set_fd() was used), select() or
|
---|
95 | poll() on the underlying socket can be used to find out when the
|
---|
96 | TLS/SSL I/O function should be retried.
|
---|
97 |
|
---|
98 | Caveat: Any TLS/SSL I/O function can lead to either of
|
---|
99 | B<SSL_ERROR_WANT_READ> and B<SSL_ERROR_WANT_WRITE>.
|
---|
100 | In particular,
|
---|
101 | SSL_read_ex(), SSL_read(), SSL_peek_ex(), or SSL_peek() may want to write data
|
---|
102 | and SSL_write() or SSL_write_ex() may want to read data.
|
---|
103 | This is mainly because
|
---|
104 | TLS/SSL handshakes may occur at any time during the protocol (initiated by
|
---|
105 | either the client or the server); SSL_read_ex(), SSL_read(), SSL_peek_ex(),
|
---|
106 | SSL_peek(), SSL_write_ex(), and SSL_write() will handle any pending handshakes.
|
---|
107 |
|
---|
108 | =item SSL_ERROR_WANT_CONNECT, SSL_ERROR_WANT_ACCEPT
|
---|
109 |
|
---|
110 | The operation did not complete; the same TLS/SSL I/O function should be
|
---|
111 | called again later. The underlying BIO was not connected yet to the peer
|
---|
112 | and the call would block in connect()/accept(). The SSL function should be
|
---|
113 | called again when the connection is established. These messages can only
|
---|
114 | appear with a BIO_s_connect() or BIO_s_accept() BIO, respectively.
|
---|
115 | In order to find out, when the connection has been successfully established,
|
---|
116 | on many platforms select() or poll() for writing on the socket file descriptor
|
---|
117 | can be used.
|
---|
118 |
|
---|
119 | =item SSL_ERROR_WANT_X509_LOOKUP
|
---|
120 |
|
---|
121 | The operation did not complete because an application callback set by
|
---|
122 | SSL_CTX_set_client_cert_cb() has asked to be called again.
|
---|
123 | The TLS/SSL I/O function should be called again later.
|
---|
124 | Details depend on the application.
|
---|
125 |
|
---|
126 | =item SSL_ERROR_WANT_ASYNC
|
---|
127 |
|
---|
128 | The operation did not complete because an asynchronous engine is still
|
---|
129 | processing data. This will only occur if the mode has been set to SSL_MODE_ASYNC
|
---|
130 | using L<SSL_CTX_set_mode(3)> or L<SSL_set_mode(3)> and an asynchronous capable
|
---|
131 | engine is being used. An application can determine whether the engine has
|
---|
132 | completed its processing using select() or poll() on the asynchronous wait file
|
---|
133 | descriptor. This file descriptor is available by calling
|
---|
134 | L<SSL_get_all_async_fds(3)> or L<SSL_get_changed_async_fds(3)>. The TLS/SSL I/O
|
---|
135 | function should be called again later. The function B<must> be called from the
|
---|
136 | same thread that the original call was made from.
|
---|
137 |
|
---|
138 | =item SSL_ERROR_WANT_ASYNC_JOB
|
---|
139 |
|
---|
140 | The asynchronous job could not be started because there were no async jobs
|
---|
141 | available in the pool (see ASYNC_init_thread(3)). This will only occur if the
|
---|
142 | mode has been set to SSL_MODE_ASYNC using L<SSL_CTX_set_mode(3)> or
|
---|
143 | L<SSL_set_mode(3)> and a maximum limit has been set on the async job pool
|
---|
144 | through a call to L<ASYNC_init_thread(3)>. The application should retry the
|
---|
145 | operation after a currently executing asynchronous operation for the current
|
---|
146 | thread has completed.
|
---|
147 |
|
---|
148 | =item SSL_ERROR_WANT_CLIENT_HELLO_CB
|
---|
149 |
|
---|
150 | The operation did not complete because an application callback set by
|
---|
151 | SSL_CTX_set_client_hello_cb() has asked to be called again.
|
---|
152 | The TLS/SSL I/O function should be called again later.
|
---|
153 | Details depend on the application.
|
---|
154 |
|
---|
155 | =item SSL_ERROR_SYSCALL
|
---|
156 |
|
---|
157 | Some non-recoverable, fatal I/O error occurred. The OpenSSL error queue may
|
---|
158 | contain more information on the error. For socket I/O on Unix systems, consult
|
---|
159 | B<errno> for details. If this error occurs then no further I/O operations should
|
---|
160 | be performed on the connection and SSL_shutdown() must not be called.
|
---|
161 |
|
---|
162 | This value can also be returned for other errors, check the error queue for
|
---|
163 | details.
|
---|
164 |
|
---|
165 | =item SSL_ERROR_SSL
|
---|
166 |
|
---|
167 | A non-recoverable, fatal error in the SSL library occurred, usually a protocol
|
---|
168 | error. The OpenSSL error queue contains more information on the error. If this
|
---|
169 | error occurs then no further I/O operations should be performed on the
|
---|
170 | connection and SSL_shutdown() must not be called.
|
---|
171 |
|
---|
172 | =back
|
---|
173 |
|
---|
174 | =head1 SEE ALSO
|
---|
175 |
|
---|
176 | L<ssl(7)>
|
---|
177 |
|
---|
178 | =head1 HISTORY
|
---|
179 |
|
---|
180 | The SSL_ERROR_WANT_ASYNC error code was added in OpenSSL 1.1.0.
|
---|
181 | The SSL_ERROR_WANT_CLIENT_HELLO_CB error code was added in OpenSSL 1.1.1.
|
---|
182 |
|
---|
183 | =head1 COPYRIGHT
|
---|
184 |
|
---|
185 | Copyright 2000-2024 The OpenSSL Project Authors. All Rights Reserved.
|
---|
186 |
|
---|
187 | Licensed under the Apache License 2.0 (the "License"). You may not use
|
---|
188 | this file except in compliance with the License. You can obtain a copy
|
---|
189 | in the file LICENSE in the source distribution or at
|
---|
190 | L<https://www.openssl.org/source/license.html>.
|
---|
191 |
|
---|
192 | =cut
|
---|