[openssl] master update
Richard Levitte
levitte at openssl.org
Tue May 5 04:33:24 UTC 2020
The branch master has been updated
via e307e616f25a6b7b0f343fc1e62a35b2cba888f3 (commit)
from 3327c8d6f3b6d9509559782aec28b78013fb72ba (commit)
- Log -----------------------------------------------------------------
commit e307e616f25a6b7b0f343fc1e62a35b2cba888f3
Author: Kurt Roeckx <kurt at roeckx.be>
Date: Mon Apr 13 13:01:29 2020 +0200
Improve SSL_shutdown documentation.
Reviewed-by: Tomas Mraz <tmraz at fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/11531)
-----------------------------------------------------------------------
Summary of changes:
doc/man3/SSL_shutdown.pod | 16 ++++++++++++++--
1 file changed, 14 insertions(+), 2 deletions(-)
diff --git a/doc/man3/SSL_shutdown.pod b/doc/man3/SSL_shutdown.pod
index 608cd7195e..f7476500fd 100644
--- a/doc/man3/SSL_shutdown.pod
+++ b/doc/man3/SSL_shutdown.pod
@@ -75,6 +75,16 @@ state but not actually send the close_notify alert messages,
see L<SSL_CTX_set_quiet_shutdown(3)>.
When "quiet shutdown" is enabled, SSL_shutdown() will always succeed
and return 1.
+Note that this is not standard compliant behaviour.
+It should only be done when the peer has a way to make sure all
+data has been received and doesn't wait for the close_notify alert
+message, otherwise an unexpected EOF will be reported.
+
+There are implementations that do not send the required close_notify alert.
+If there is a need to communicate with such an implementation, and it's clear
+that all data has been received, do not wait for the peer's close_notify alert.
+Waiting for the close_notify alert when the peer just closes the connection will
+result in an error being generated.
=head2 First to close the connection
@@ -124,8 +134,10 @@ The following return values can occur:
The shutdown is not yet finished: the close_notify was sent but the peer
did not send it back yet.
Call SSL_read() to do a bidirectional shutdown.
-The output of L<SSL_get_error(3)> may be misleading, as an
-erroneous SSL_ERROR_SYSCALL may be flagged even though no error occurred.
+
+Unlike most other function, returning 0 does not indicate an error.
+L<SSL_get_error(3)> should not get called, it may misleadingly
+indicate an error even though no error occurred.
=item Z<>1
More information about the openssl-commits
mailing list