BIO_f_ssl.3ossl 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446
  1. .\" Automatically generated by Pod::Man 4.14 (Pod::Simple 3.42)
  2. .\"
  3. .\" Standard preamble:
  4. .\" ========================================================================
  5. .de Sp \" Vertical space (when we can't use .PP)
  6. .if t .sp .5v
  7. .if n .sp
  8. ..
  9. .de Vb \" Begin verbatim text
  10. .ft CW
  11. .nf
  12. .ne \\$1
  13. ..
  14. .de Ve \" End verbatim text
  15. .ft R
  16. .fi
  17. ..
  18. .\" Set up some character translations and predefined strings. \*(-- will
  19. .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
  20. .\" double quote, and \*(R" will give a right double quote. \*(C+ will
  21. .\" give a nicer C++. Capital omega is used to do unbreakable dashes and
  22. .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,
  23. .\" nothing in troff, for use with C<>.
  24. .tr \(*W-
  25. .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
  26. .ie n \{\
  27. . ds -- \(*W-
  28. . ds PI pi
  29. . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
  30. . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
  31. . ds L" ""
  32. . ds R" ""
  33. . ds C` ""
  34. . ds C' ""
  35. 'br\}
  36. .el\{\
  37. . ds -- \|\(em\|
  38. . ds PI \(*p
  39. . ds L" ``
  40. . ds R" ''
  41. . ds C`
  42. . ds C'
  43. 'br\}
  44. .\"
  45. .\" Escape single quotes in literal strings from groff's Unicode transform.
  46. .ie \n(.g .ds Aq \(aq
  47. .el .ds Aq '
  48. .\"
  49. .\" If the F register is >0, we'll generate index entries on stderr for
  50. .\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
  51. .\" entries marked with X<> in POD. Of course, you'll have to process the
  52. .\" output yourself in some meaningful fashion.
  53. .\"
  54. .\" Avoid warning from groff about undefined register 'F'.
  55. .de IX
  56. ..
  57. .nr rF 0
  58. .if \n(.g .if rF .nr rF 1
  59. .if (\n(rF:(\n(.g==0)) \{\
  60. . if \nF \{\
  61. . de IX
  62. . tm Index:\\$1\t\\n%\t"\\$2"
  63. ..
  64. . if !\nF==2 \{\
  65. . nr % 0
  66. . nr F 2
  67. . \}
  68. . \}
  69. .\}
  70. .rr rF
  71. .\"
  72. .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
  73. .\" Fear. Run. Save yourself. No user-serviceable parts.
  74. . \" fudge factors for nroff and troff
  75. .if n \{\
  76. . ds #H 0
  77. . ds #V .8m
  78. . ds #F .3m
  79. . ds #[ \f1
  80. . ds #] \fP
  81. .\}
  82. .if t \{\
  83. . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
  84. . ds #V .6m
  85. . ds #F 0
  86. . ds #[ \&
  87. . ds #] \&
  88. .\}
  89. . \" simple accents for nroff and troff
  90. .if n \{\
  91. . ds ' \&
  92. . ds ` \&
  93. . ds ^ \&
  94. . ds , \&
  95. . ds ~ ~
  96. . ds /
  97. .\}
  98. .if t \{\
  99. . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
  100. . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
  101. . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
  102. . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
  103. . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
  104. . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
  105. .\}
  106. . \" troff and (daisy-wheel) nroff accents
  107. .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
  108. .ds 8 \h'\*(#H'\(*b\h'-\*(#H'
  109. .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
  110. .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
  111. .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
  112. .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
  113. .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
  114. .ds ae a\h'-(\w'a'u*4/10)'e
  115. .ds Ae A\h'-(\w'A'u*4/10)'E
  116. . \" corrections for vroff
  117. .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
  118. .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
  119. . \" for low resolution devices (crt and lpr)
  120. .if \n(.H>23 .if \n(.V>19 \
  121. \{\
  122. . ds : e
  123. . ds 8 ss
  124. . ds o a
  125. . ds d- d\h'-1'\(ga
  126. . ds D- D\h'-1'\(hy
  127. . ds th \o'bp'
  128. . ds Th \o'LP'
  129. . ds ae ae
  130. . ds Ae AE
  131. .\}
  132. .rm #[ #] #H #V #F C
  133. .\" ========================================================================
  134. .\"
  135. .IX Title "BIO_F_SSL 3ossl"
  136. .TH BIO_F_SSL 3ossl "2024-09-03" "3.3.2" "OpenSSL"
  137. .\" For nroff, turn off justification. Always turn off hyphenation; it makes
  138. .\" way too many mistakes in technical documents.
  139. .if n .ad l
  140. .nh
  141. .SH "NAME"
  142. BIO_do_handshake,
  143. BIO_f_ssl, BIO_set_ssl, BIO_get_ssl, BIO_set_ssl_mode,
  144. BIO_set_ssl_renegotiate_bytes,
  145. BIO_get_num_renegotiates, BIO_set_ssl_renegotiate_timeout, BIO_new_ssl,
  146. BIO_new_ssl_connect, BIO_new_buffer_ssl_connect, BIO_ssl_copy_session_id,
  147. BIO_ssl_shutdown \- SSL BIO
  148. .SH "SYNOPSIS"
  149. .IX Header "SYNOPSIS"
  150. .Vb 2
  151. \& #include <openssl/bio.h>
  152. \& #include <openssl/ssl.h>
  153. \&
  154. \& const BIO_METHOD *BIO_f_ssl(void);
  155. \&
  156. \& long BIO_set_ssl(BIO *b, SSL *ssl, long c);
  157. \& long BIO_get_ssl(BIO *b, SSL **sslp);
  158. \& long BIO_set_ssl_mode(BIO *b, long client);
  159. \& long BIO_set_ssl_renegotiate_bytes(BIO *b, long num);
  160. \& long BIO_set_ssl_renegotiate_timeout(BIO *b, long seconds);
  161. \& long BIO_get_num_renegotiates(BIO *b);
  162. \&
  163. \& BIO *BIO_new_ssl(SSL_CTX *ctx, int client);
  164. \& BIO *BIO_new_ssl_connect(SSL_CTX *ctx);
  165. \& BIO *BIO_new_buffer_ssl_connect(SSL_CTX *ctx);
  166. \& int BIO_ssl_copy_session_id(BIO *to, BIO *from);
  167. \& void BIO_ssl_shutdown(BIO *bio);
  168. \&
  169. \& long BIO_do_handshake(BIO *b);
  170. .Ve
  171. .SH "DESCRIPTION"
  172. .IX Header "DESCRIPTION"
  173. \&\fBBIO_f_ssl()\fR returns the \s-1SSL BIO\s0 method. This is a filter \s-1BIO\s0 which
  174. is a wrapper round the OpenSSL \s-1SSL\s0 routines adding a \s-1BIO\s0 \*(L"flavour\*(R" to
  175. \&\s-1SSL I/O.\s0
  176. .PP
  177. I/O performed on an \s-1SSL BIO\s0 communicates using the \s-1SSL\s0 protocol with
  178. the SSLs read and write BIOs. If an \s-1SSL\s0 connection is not established
  179. then an attempt is made to establish one on the first I/O call.
  180. .PP
  181. If a \s-1BIO\s0 is appended to an \s-1SSL BIO\s0 using \fBBIO_push()\fR it is automatically
  182. used as the \s-1SSL\s0 BIOs read and write BIOs.
  183. .PP
  184. Calling \fBBIO_reset()\fR on an \s-1SSL BIO\s0 closes down any current \s-1SSL\s0 connection
  185. by calling \fBSSL_shutdown()\fR. \fBBIO_reset()\fR is then sent to the next \s-1BIO\s0 in
  186. the chain: this will typically disconnect the underlying transport.
  187. The \s-1SSL BIO\s0 is then reset to the initial accept or connect state.
  188. .PP
  189. If the close flag is set when an \s-1SSL BIO\s0 is freed then the internal
  190. \&\s-1SSL\s0 structure is also freed using \fBSSL_free()\fR.
  191. .PP
  192. \&\fBBIO_set_ssl()\fR sets the internal \s-1SSL\s0 pointer of \s-1SSL BIO\s0 \fBb\fR to \fBssl\fR using
  193. the close flag \fBc\fR.
  194. .PP
  195. \&\fBBIO_get_ssl()\fR retrieves the \s-1SSL\s0 pointer of \s-1SSL BIO\s0 \fBb\fR, it can then be
  196. manipulated using the standard \s-1SSL\s0 library functions.
  197. .PP
  198. \&\fBBIO_set_ssl_mode()\fR sets the \s-1SSL BIO\s0 mode to \fBclient\fR. If \fBclient\fR
  199. is 1 client mode is set. If \fBclient\fR is 0 server mode is set.
  200. .PP
  201. \&\fBBIO_set_ssl_renegotiate_bytes()\fR sets the renegotiate byte count of \s-1SSL BIO\s0 \fBb\fR
  202. to \fBnum\fR. When set after every \fBnum\fR bytes of I/O (read and write)
  203. the \s-1SSL\s0 session is automatically renegotiated. \fBnum\fR must be at
  204. least 512 bytes.
  205. .PP
  206. \&\fBBIO_set_ssl_renegotiate_timeout()\fR sets the renegotiate timeout of \s-1SSL BIO\s0 \fBb\fR
  207. to \fBseconds\fR.
  208. When the renegotiate timeout elapses the session is automatically renegotiated.
  209. .PP
  210. \&\fBBIO_get_num_renegotiates()\fR returns the total number of session
  211. renegotiations due to I/O or timeout of \s-1SSL BIO\s0 \fBb\fR.
  212. .PP
  213. \&\fBBIO_new_ssl()\fR allocates an \s-1SSL BIO\s0 using \s-1SSL_CTX\s0 \fBctx\fR and using
  214. client mode if \fBclient\fR is non zero.
  215. .PP
  216. \&\fBBIO_new_ssl_connect()\fR creates a new \s-1BIO\s0 chain consisting of an
  217. \&\s-1SSL BIO\s0 (using \fBctx\fR) followed by a connect \s-1BIO.\s0
  218. .PP
  219. \&\fBBIO_new_buffer_ssl_connect()\fR creates a new \s-1BIO\s0 chain consisting
  220. of a buffering \s-1BIO,\s0 an \s-1SSL BIO\s0 (using \fBctx\fR), and a connect \s-1BIO.\s0
  221. .PP
  222. \&\fBBIO_ssl_copy_session_id()\fR copies an \s-1SSL\s0 session id between
  223. \&\s-1BIO\s0 chains \fBfrom\fR and \fBto\fR. It does this by locating the
  224. \&\s-1SSL\s0 BIOs in each chain and calling \fBSSL_copy_session_id()\fR on
  225. the internal \s-1SSL\s0 pointer.
  226. .PP
  227. \&\fBBIO_ssl_shutdown()\fR closes down an \s-1SSL\s0 connection on \s-1BIO\s0
  228. chain \fBbio\fR. It does this by locating the \s-1SSL BIO\s0 in the
  229. chain and calling \fBSSL_shutdown()\fR on its internal \s-1SSL\s0
  230. pointer.
  231. .PP
  232. \&\fBBIO_do_handshake()\fR attempts to complete an \s-1SSL\s0 handshake on the
  233. supplied \s-1BIO\s0 and establish the \s-1SSL\s0 connection.
  234. For non-SSL BIOs the connection is done typically at \s-1TCP\s0 level.
  235. If domain name resolution yields multiple \s-1IP\s0 addresses all of them are tried
  236. after \fBconnect()\fR failures.
  237. The function returns 1 if the connection was established successfully.
  238. A zero or negative value is returned if the connection could not be established.
  239. The call \fBBIO_should_retry()\fR should be used for nonblocking connect BIOs
  240. to determine if the call should be retried.
  241. If a connection has already been established this call has no effect.
  242. .SH "NOTES"
  243. .IX Header "NOTES"
  244. \&\s-1SSL\s0 BIOs are exceptional in that if the underlying transport
  245. is non blocking they can still request a retry in exceptional
  246. circumstances. Specifically this will happen if a session
  247. renegotiation takes place during a \fBBIO_read_ex()\fR operation, one
  248. case where this happens is when step up occurs.
  249. .PP
  250. The \s-1SSL\s0 flag \s-1SSL_AUTO_RETRY\s0 can be
  251. set to disable this behaviour. That is when this flag is set
  252. an \s-1SSL BIO\s0 using a blocking transport will never request a
  253. retry.
  254. .PP
  255. Since unknown \fBBIO_ctrl()\fR operations are sent through filter
  256. BIOs the servers name and port can be set using \fBBIO_set_host()\fR
  257. on the \s-1BIO\s0 returned by \fBBIO_new_ssl_connect()\fR without having
  258. to locate the connect \s-1BIO\s0 first.
  259. .PP
  260. Applications do not have to call \fBBIO_do_handshake()\fR but may wish
  261. to do so to separate the handshake process from other I/O
  262. processing.
  263. .PP
  264. \&\fBBIO_set_ssl()\fR, \fBBIO_get_ssl()\fR, \fBBIO_set_ssl_mode()\fR,
  265. \&\fBBIO_set_ssl_renegotiate_bytes()\fR, \fBBIO_set_ssl_renegotiate_timeout()\fR,
  266. \&\fBBIO_get_num_renegotiates()\fR, and \fBBIO_do_handshake()\fR are implemented as macros.
  267. .PP
  268. \&\fBBIO_ssl_copy_session_id()\fR is not currently supported on \s-1QUIC SSL\s0 objects and
  269. fails if called on such an object.
  270. .SH "RETURN VALUES"
  271. .IX Header "RETURN VALUES"
  272. \&\fBBIO_f_ssl()\fR returns the \s-1SSL\s0 \fB\s-1BIO_METHOD\s0\fR structure.
  273. .PP
  274. \&\fBBIO_set_ssl()\fR, \fBBIO_get_ssl()\fR, \fBBIO_set_ssl_mode()\fR, \fBBIO_set_ssl_renegotiate_bytes()\fR,
  275. \&\fBBIO_set_ssl_renegotiate_timeout()\fR and \fBBIO_get_num_renegotiates()\fR return 1 on
  276. success or a value which is less than or equal to 0 if an error occurred.
  277. .PP
  278. \&\fBBIO_new_ssl()\fR, \fBBIO_new_ssl_connect()\fR and \fBBIO_new_buffer_ssl_connect()\fR return
  279. a valid \fB\s-1BIO\s0\fR structure on success or \fB\s-1NULL\s0\fR if an error occurred.
  280. .PP
  281. \&\fBBIO_ssl_copy_session_id()\fR returns 1 on success or 0 on error, or if called
  282. on a \s-1QUIC SSL\s0 object.
  283. .PP
  284. \&\fBBIO_do_handshake()\fR returns 1 if the connection was established successfully.
  285. A zero or negative value is returned if the connection could not be established.
  286. .SH "EXAMPLES"
  287. .IX Header "EXAMPLES"
  288. This \s-1SSL/TLS\s0 client example attempts to retrieve a page from an
  289. \&\s-1SSL/TLS\s0 web server. The I/O routines are identical to those of the
  290. unencrypted example in \fBBIO_s_connect\fR\|(3).
  291. .PP
  292. .Vb 5
  293. \& BIO *sbio, *out;
  294. \& int len;
  295. \& char tmpbuf[1024];
  296. \& SSL_CTX *ctx;
  297. \& SSL *ssl;
  298. \&
  299. \& /* XXX Seed the PRNG if needed. */
  300. \&
  301. \& ctx = SSL_CTX_new(TLS_client_method());
  302. \&
  303. \& /* XXX Set verify paths and mode here. */
  304. \&
  305. \& sbio = BIO_new_ssl_connect(ctx);
  306. \& BIO_get_ssl(sbio, &ssl);
  307. \& if (ssl == NULL) {
  308. \& fprintf(stderr, "Can\*(Aqt locate SSL pointer\en");
  309. \& ERR_print_errors_fp(stderr);
  310. \& exit(1);
  311. \& }
  312. \&
  313. \& /* XXX We might want to do other things with ssl here */
  314. \&
  315. \& /* An empty host part means the loopback address */
  316. \& BIO_set_conn_hostname(sbio, ":https");
  317. \&
  318. \& out = BIO_new_fp(stdout, BIO_NOCLOSE);
  319. \& if (BIO_do_connect(sbio) <= 0) {
  320. \& fprintf(stderr, "Error connecting to server\en");
  321. \& ERR_print_errors_fp(stderr);
  322. \& exit(1);
  323. \& }
  324. \&
  325. \& /* XXX Could examine ssl here to get connection info */
  326. \&
  327. \& BIO_puts(sbio, "GET / HTTP/1.0\en\en");
  328. \& for (;;) {
  329. \& len = BIO_read(sbio, tmpbuf, 1024);
  330. \& if (len <= 0)
  331. \& break;
  332. \& BIO_write(out, tmpbuf, len);
  333. \& }
  334. \& BIO_free_all(sbio);
  335. \& BIO_free(out);
  336. .Ve
  337. .PP
  338. Here is a simple server example. It makes use of a buffering
  339. \&\s-1BIO\s0 to allow lines to be read from the \s-1SSL BIO\s0 using BIO_gets.
  340. It creates a pseudo web page containing the actual request from
  341. a client and also echoes the request to standard output.
  342. .PP
  343. .Vb 5
  344. \& BIO *sbio, *bbio, *acpt, *out;
  345. \& int len;
  346. \& char tmpbuf[1024];
  347. \& SSL_CTX *ctx;
  348. \& SSL *ssl;
  349. \&
  350. \& /* XXX Seed the PRNG if needed. */
  351. \&
  352. \& ctx = SSL_CTX_new(TLS_server_method());
  353. \& if (!SSL_CTX_use_certificate_file(ctx, "server.pem", SSL_FILETYPE_PEM)
  354. \& || !SSL_CTX_use_PrivateKey_file(ctx, "server.pem", SSL_FILETYPE_PEM)
  355. \& || !SSL_CTX_check_private_key(ctx)) {
  356. \& fprintf(stderr, "Error setting up SSL_CTX\en");
  357. \& ERR_print_errors_fp(stderr);
  358. \& exit(1);
  359. \& }
  360. \&
  361. \& /* XXX Other things like set verify locations, EDH temp callbacks. */
  362. \&
  363. \& /* New SSL BIO setup as server */
  364. \& sbio = BIO_new_ssl(ctx, 0);
  365. \& BIO_get_ssl(sbio, &ssl);
  366. \& if (ssl == NULL) {
  367. \& fprintf(stderr, "Can\*(Aqt locate SSL pointer\en");
  368. \& ERR_print_errors_fp(stderr);
  369. \& exit(1);
  370. \& }
  371. \&
  372. \& bbio = BIO_new(BIO_f_buffer());
  373. \& sbio = BIO_push(bbio, sbio);
  374. \& acpt = BIO_new_accept("4433");
  375. \&
  376. \& /*
  377. \& * By doing this when a new connection is established
  378. \& * we automatically have sbio inserted into it. The
  379. \& * BIO chain is now \*(Aqswallowed\*(Aq by the accept BIO and
  380. \& * will be freed when the accept BIO is freed.
  381. \& */
  382. \& BIO_set_accept_bios(acpt, sbio);
  383. \& out = BIO_new_fp(stdout, BIO_NOCLOSE);
  384. \&
  385. \& /* First call to BIO_do_accept() sets up accept BIO */
  386. \& if (BIO_do_accept(acpt) <= 0) {
  387. \& fprintf(stderr, "Error setting up accept BIO\en");
  388. \& ERR_print_errors_fp(stderr);
  389. \& exit(1);
  390. \& }
  391. .Ve
  392. .PP
  393. /* Second call to \fBBIO_do_accept()\fR waits for incoming connection */
  394. if (BIO_do_accept(acpt) <= 0) {
  395. fprintf(stderr, \*(L"Error accepting connection\en\*(R");
  396. ERR_print_errors_fp(stderr);
  397. \fBexit\fR\|(1);
  398. }
  399. .PP
  400. .Vb 3
  401. \& /* We only want one connection so remove and free accept BIO */
  402. \& sbio = BIO_pop(acpt);
  403. \& BIO_free_all(acpt);
  404. \&
  405. \& if (BIO_do_handshake(sbio) <= 0) {
  406. \& fprintf(stderr, "Error in SSL handshake\en");
  407. \& ERR_print_errors_fp(stderr);
  408. \& exit(1);
  409. \& }
  410. \&
  411. \& BIO_puts(sbio, "HTTP/1.0 200 OK\er\enContent\-type: text/plain\er\en\er\en");
  412. \& BIO_puts(sbio, "\er\enConnection Established\er\enRequest headers:\er\en");
  413. \& BIO_puts(sbio, "\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\er\en");
  414. \&
  415. \& for (;;) {
  416. \& len = BIO_gets(sbio, tmpbuf, 1024);
  417. \& if (len <= 0)
  418. \& break;
  419. \& BIO_write(sbio, tmpbuf, len);
  420. \& BIO_write(out, tmpbuf, len);
  421. \& /* Look for blank line signifying end of headers*/
  422. \& if (tmpbuf[0] == \*(Aq\er\*(Aq || tmpbuf[0] == \*(Aq\en\*(Aq)
  423. \& break;
  424. \& }
  425. \&
  426. \& BIO_puts(sbio, "\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\er\en");
  427. \& BIO_puts(sbio, "\er\en");
  428. \& BIO_flush(sbio);
  429. \& BIO_free_all(sbio);
  430. .Ve
  431. .SH "HISTORY"
  432. .IX Header "HISTORY"
  433. In OpenSSL before 1.0.0 the \fBBIO_pop()\fR call was handled incorrectly,
  434. the I/O \s-1BIO\s0 reference count was incorrectly incremented (instead of
  435. decremented) and dissociated with the \s-1SSL BIO\s0 even if the \s-1SSL BIO\s0 was not
  436. explicitly being popped (e.g. a pop higher up the chain). Applications which
  437. included workarounds for this bug (e.g. freeing BIOs more than once) should
  438. be modified to handle this fix or they may free up an already freed \s-1BIO.\s0
  439. .SH "COPYRIGHT"
  440. .IX Header "COPYRIGHT"
  441. Copyright 2000\-2023 The OpenSSL Project Authors. All Rights Reserved.
  442. .PP
  443. Licensed under the Apache License 2.0 (the \*(L"License\*(R"). You may not use
  444. this file except in compliance with the License. You can obtain a copy
  445. in the file \s-1LICENSE\s0 in the source distribution or at
  446. <https://www.openssl.org/source/license.html>.