diff options
author | Ralf S. Engelschall <rse@openssl.org> | 1998-12-29 17:12:34 +0000 |
---|---|---|
committer | Ralf S. Engelschall <rse@openssl.org> | 1998-12-29 17:12:34 +0000 |
commit | cb496082f8db564ac7c8054edf46a2a7dd5e7393 (patch) | |
tree | b1fdd51c303a3a5fbcb664ad4767b9999c006a0a /doc | |
parent | f2d4be3b84dd38e12dadeba055b28374d56ab1a1 (diff) | |
download | openssl-new-cb496082f8db564ac7c8054edf46a2a7dd5e7393.tar.gz |
Import the first cut for manual pages.
They are written in Perl's POD format for two reasons: First Perl is already
needed for SSLeay and second, POD is easy to write and maintain _AND_ created
nice looking NRoff manpages.
The idea is to have three manual pages:
openssl(1) ... The manpage for the `openssl' program (formerly ssleay)
crypto(3) .... The manpage for crypto.h/libcrypto.a
ssl(3) ....... The manpage for ssl.h/libssl.a
The openssl(1) should be very similar to cvs(1), i.e. it should document all
commands in a compact way. And I've even created the first cut for an
overview of all 243 functions of the SSL API for ssl.pod. More to come...
Diffstat (limited to 'doc')
-rw-r--r-- | doc/crypto.pod | 27 | ||||
-rw-r--r-- | doc/openssl.pod | 132 | ||||
-rw-r--r-- | doc/ssl.pod | 543 |
3 files changed, 702 insertions, 0 deletions
diff --git a/doc/crypto.pod b/doc/crypto.pod new file mode 100644 index 0000000000..4873b1765d --- /dev/null +++ b/doc/crypto.pod @@ -0,0 +1,27 @@ + +=pod + +=head1 NAME + +Crypto - OpenSSL Cryptography library + +=head1 SYNOPSIS + +=head1 DESCRIPTION + +The OpenSSL B<crypto> library implements various cryptography standards +related to the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security +(TLS v1) protocols. It provides a rich API which is documented here. + +... + +=head1 SEE ALSO + +openssl(1), ssl(3) + +=head1 AUTHORS + +Ralf S. Engelschall + +=cut + diff --git a/doc/openssl.pod b/doc/openssl.pod new file mode 100644 index 0000000000..f7b8415334 --- /dev/null +++ b/doc/openssl.pod @@ -0,0 +1,132 @@ + +=pod + +=head1 NAME + +openssl - OpenSSL command line tool + +=head1 SYNOPSIS + +B<openssl> +I<command> +[ I<command_opts> ] +[ I<command_args> ] + +=head1 DESCRIPTION + +OpenSSL is a cryptography toolkit implementing the Secure Sockets Layer (SSL +v2/v3) and Transport Layer Security (TLS v1) network protocols and related +cryptography standards required by them. + +The B<openssl> program is a command line tool for using the various +cryptography functions of OpenSSL's B<crypto> library from the shell. +It can be used for + + o Creation of RSA, DH and DSA key parameters + o Creattion of X.509 certificates, CSRs and CRLs + o Calculation of Message Digests + o Encryption and Decryption with Ciphers + o SSL/TLS Client and Server Tests + +=head1 COMMAND SUMMARY + +The B<openssl> program provides a rich variety of commands (I<command> in the +SYNOPSIS above), each of which often has a wealth of options and arguments +(I<command_opts> and I<command_args> in the SYNOPSIS). + +=over 10 + +=item B<s_client> + +This implements a generic SSL/TLS client which can establish a transparent +connection to a remote server speaking SSL/TLS. It's intended for testing +purposes only and provides only rudimentary interface functionality but +internally uses mostly all functionality of the OpenSSL B<ssl> library. + +=item B<s_server> + +This implements a generic SSL/TLS server which accepts connections from remote +clients speaking SSL/TLS. It's intended for testing purposes only and provides +only rudimentary interface functionality but internally uses mostly all +functionality of the OpenSSL B<ssl> library. It provides both an own command +line oriented protocol for testing SSL functions and a simple HTTP response +facility to emulate an SSL/TLS-aware webserver. + +=back + +=head1 DETAILED COMMAND DESCRIPTION + +The following is a detailed description of every B<openssl> I<command>. + +=over 4 + +=item B<openssl> B<s_client> +[B<-connect> I<host>B<:>I<port>] +[B<-verify> I<arg>] +[B<-cert> I<arg>] +[B<-key> I<arg>] +[B<-CApath> I<arg>] +[B<-CAfile> I<arg>] +[B<-reconnect>] +[B<-pause>] +[B<-debug>] +[B<-nbio_test>] +[B<-state>] +[B<-nbio>] +[B<-quiet>] +[B<-ssl2>] +[B<-ssl3>] +[B<-tls1>] +[B<-no_ssl2>] +[B<-no_ssl3>] +[B<-no_tls1>] +[B<-bugs>] +[B<-cipher>] + +The B<s_client> command implements a generic SSL/TLS client which can +establish a transparent connection to a remote I<host> and I<port> speaking +SSL/TLS. + +=item B<openssl> B<s_server> +[B<-accept> I<port>] +[B<-verify> I<arg>] +[B<-Verify> I<arg>] +[B<-cert> I<arg>] +[B<-key> I<arg>] +[B<-nbio>] +[B<-nbio_test>] +[B<-debug>] +[B<-state>] +[B<-CApath> I<arg>] +[B<-CAfile> I<arg>] +[B<-nocert>] +[B<-cipher> I<arg>] +[B<-quiet>] +[B<-no_tmp_rsa>] +[B<-ssl2>] +[B<-ssl3>] +[B<-tls1>] +[B<-no_ssl2>] +[B<-no_ssl3>] +[B<-no_tls1>] +[B<-bugs>] +[B<-www>] +[B<-WWW>] + +The B<s_server> command implements a generic SSL/TLS server which accepts +connections from remote clients on I<port> speaking SSL/TLS. + +=back + +... + +=head1 SEE ALSO + +crypto(3), ssl(3) + +=head1 AUTHORS + +Ralf S. Engelschall + +=cut + diff --git a/doc/ssl.pod b/doc/ssl.pod new file mode 100644 index 0000000000..311dd242b1 --- /dev/null +++ b/doc/ssl.pod @@ -0,0 +1,543 @@ + +=pod + +=head1 NAME + +SSL - OpenSSL SSL/TLS library + +=head1 SYNOPSIS + +=head1 DESCRIPTION + +The OpenSSL B<ssl> library implements the Secure Sockets Layer (SSL v2/v3) and +Transport Layer Security (TLS v1) protocols. It provides a rich API which is +documented here. + +=head1 HEADERS + +Currently the OpenSSL B<ssl> library provides the following C header files +containing the prototypes for the data structures and and functions: + +=over 4 + +=item B<ssl.h> + +That's the common header file for the SSL/TLS API. Include it into your +program to make the API of the B<ssl> library available. It internally +includes both more private SSL headers and headers from the B<crypto> library. + +=back + +=head1 STRUCTURES + +Currently the OpenSSL B<ssl> library functions deal with the following data +structures: + +=over 4 + +=item B<SSL_CTX> (SSL Context) + +=item B<SSL> (SSL Connection) + +That's the SSL/TLS structure which is created by +a server or client per established connection. + +=item B<SSL_METHOD> (SSL Method) + +=item B<SSL_CIPHER> (SSL Cipher) + +=item B<SSL_SESSION> (SSL Session) + +=back + +=head1 FUNCTIONS + +Currently the OpenSSL B<ssl> library exports 143 API functions. +They are documented in the following: + +=over 4 + +=item [MACRO] B<SSL_ADH>(SSL_kEDH|SSL_aNULL); + +=item [MACRO] B<SSL_CB_ACCEPT_EXIT>(SSL_ST_ACCEPT|SSL_CB_EXIT); + +=item [MACRO] B<SSL_CB_ACCEPT_LOOP>(SSL_ST_ACCEPT|SSL_CB_LOOP); + +=item [MACRO] B<SSL_CB_CONNECT_EXIT>(SSL_ST_CONNECT|SSL_CB_EXIT); + +=item [MACRO] B<SSL_CB_CONNECT_LOOP>(SSL_ST_CONNECT|SSL_CB_LOOP); + +=item [MACRO] B<SSL_CB_READ_ALERT>(SSL_CB_ALERT|SSL_CB_READ); + +=item [MACRO] B<SSL_CB_WRITE_ALERT>(SSL_CB_ALERT|SSL_CB_WRITE); + +=item char *B<SSL_CIPHER_description>(SSL_CIPHER *cipher, char *buf, int len); + +=item int B<SSL_CIPHER_get_bits>(SSL_CIPHER *c, int *alg_bits); + +=item char *B<SSL_CIPHER_get_name>(SSL_CIPHER *c); + +=item char *B<SSL_CIPHER_get_version>(SSL_CIPHER *c); + +=item int B<SSL_CTX_add_client_CA>(SSL_CTX *ctx, X509 *x); + +=item [MACRO] B<SSL_CTX_add_extra_chain_cert>(ctx,x509); + +=item int B<SSL_CTX_add_session>(SSL_CTX *ctx, SSL_SESSION *c); + +=item int B<SSL_CTX_check_private_key>(SSL_CTX *ctx); + +=item long B<SSL_CTX_ctrl>(SSL_CTX *ctx, int cmd, long larg, char *parg); + +=item void B<SSL_CTX_flush_sessions>(SSL_CTX *s, long t); + +=item void B<SSL_CTX_free>(SSL_CTX *a); + +=item [MACRO] B<SSL_CTX_get_app_data>(ctx); + +=item [MACRO] B<SSL_CTX_get_cert_store>(ctx); + +=item STACK *B<SSL_CTX_get_client_CA_list>(SSL_CTX *ctx); + +=item [MACRO] B<SSL_CTX_get_client_cert_cb>(ctx); + +=item char *B<SSL_CTX_get_ex_data>(SSL_CTX *s, int idx); + +=item int B<SSL_CTX_get_ex_new_index>(long argl, char *argp, int (*new_func);(void), int (*dup_func)(void), void (*free_func)(void)) + +=item [MACRO] B<SSL_CTX_get_info_callback>(ctx); + +=item int B<SSL_CTX_get_quiet_shutdown>(SSL_CTX *ctx); + +=item [MACRO] B<SSL_CTX_get_session_cache_mode>(ctx); + +=item [MACRO] B<SSL_CTX_get_timeout>(ctx); + +=item int (*B<SSL_CTX_get_verify_callback>(SSL_CTX *ctx);)(void) + +=item int B<SSL_CTX_get_verify_mode>(SSL_CTX *ctx); + +=item int B<SSL_CTX_load_verify_locations>(SSL_CTX *ctx, char *CAfile, char *CApath); + +=item [MACRO] B<SSL_CTX_need_tmp_RSA>(ctx); + +=item SSL_CTX *B<SSL_CTX_new>(SSL_METHOD *meth); + +=item int B<SSL_CTX_remove_session>(SSL_CTX *ctx, SSL_SESSION *c); + +=item [MACRO] B<SSL_CTX_sess_accept>(ctx); + +=item [MACRO] B<SSL_CTX_sess_accept_good>(ctx); + +=item [MACRO] B<SSL_CTX_sess_accept_renegotiate>(ctx); + +=item [MACRO] B<SSL_CTX_sess_cache_full>(ctx); + +=item [MACRO] B<SSL_CTX_sess_cb_hits>(ctx); + +=item [MACRO] B<SSL_CTX_sess_connect>(ctx); + +=item [MACRO] B<SSL_CTX_sess_connect_good>(ctx); + +=item [MACRO] B<SSL_CTX_sess_connect_renegotiate>(ctx); + +=item [MACRO] B<SSL_CTX_sess_get_cache_size>(ctx); + +=item [MACRO] B<SSL_CTX_sess_get_get_cb>(ctx); + +=item [MACRO] B<SSL_CTX_sess_get_new_cb>(ctx); + +=item [MACRO] B<SSL_CTX_sess_get_remove_cb>(ctx); + +=item [MACRO] B<SSL_CTX_sess_hits>(ctx); + +=item [MACRO] B<SSL_CTX_sess_misses>(ctx); + +=item [MACRO] B<SSL_CTX_sess_number>(ctx); + +=item [MACRO] B<SSL_CTX_sess_set_cache_size>(ctx,t); + +=item [MACRO] B<SSL_CTX_sess_set_get_cb>(ctx,cb); + +=item [MACRO] B<SSL_CTX_sess_set_new_cb>(ctx,cb); + +=item [MACRO] B<SSL_CTX_sess_set_remove_cb>(ctx,cb); + +=item [MACRO] B<SSL_CTX_sess_timeouts>(ctx); + +=item [MACRO] B<SSL_CTX_sessions>(ctx); + +=item [MACRO] B<SSL_CTX_set_app_data>(ctx,arg); + +=item [MACRO] B<SSL_CTX_set_cert_store>(ctx,cs); + +=item [MACRO] B<SSL_CTX_set_cert_verify_callback>(a,b,c); + +=item void B<SSL_CTX_set_cert_verify_cb>(SSL_CTX *ctx, int (*cb);(void), char *arg) + +=item int B<SSL_CTX_set_cipher_list>(SSL_CTX *ctx, char *str); + +=item void B<SSL_CTX_set_client_CA_list>(SSL_CTX *ctx, STACK *list); + +=item [MACRO] B<SSL_CTX_set_client_cert_cb>(ctx,cb); + +=item void B<SSL_CTX_set_default_passwd_cb>(SSL_CTX *ctx, int (*cb);(void)) + +=item [MACRO] B<SSL_CTX_set_default_read_ahead>(ctx,m); + +=item [MACRO] B<SSL_CTX_set_default_verify>(a,b,c); + +=item int B<SSL_CTX_set_default_verify_paths>(SSL_CTX *ctx); + +=item int B<SSL_CTX_set_ex_data>(SSL_CTX *s, int idx, char *arg); + +=item [MACRO] B<SSL_CTX_set_info_callback>(ctx,cb); + +=item [MACRO] B<SSL_CTX_set_options>(ctx,op); + +=item void B<SSL_CTX_set_quiet_shutdown>(SSL_CTX *ctx, int mode); + +=item [MACRO] B<SSL_CTX_set_session_cache_mode>(ctx,m); + +=item int B<SSL_CTX_set_ssl_version>(SSL_CTX *ctx, SSL_METHOD *meth); + +=item [MACRO] B<SSL_CTX_set_timeout>(ctx,t); + +=item [MACRO] B<SSL_CTX_set_tmp_dh>(ctx,dh); + +=item [MACRO] B<SSL_CTX_set_tmp_dh_callback>(ctx,dh); + +=item [MACRO] B<SSL_CTX_set_tmp_rsa>(ctx,rsa); + +=item [MACRO] B<SSL_CTX_set_tmp_rsa_callback>(ctx,cb); + +=item void B<SSL_CTX_set_verify>(SSL_CTX *ctx, int mode, int (*cb);(void)) + +=item int B<SSL_CTX_use_PrivateKey>(SSL_CTX *ctx, EVP_PKEY *pkey); + +=item int B<SSL_CTX_use_PrivateKey_ASN1>(int type, SSL_CTX *ctx, unsigned char *d, long len); + +=item int B<SSL_CTX_use_PrivateKey_file>(SSL_CTX *ctx, char *file, int type); + +=item int B<SSL_CTX_use_RSAPrivateKey>(SSL_CTX *ctx, RSA *rsa); + +=item int B<SSL_CTX_use_RSAPrivateKey_ASN1>(SSL_CTX *ctx, unsigned char *d, long len); + +=item int B<SSL_CTX_use_RSAPrivateKey_file>(SSL_CTX *ctx, char *file, int type); + +=item int B<SSL_CTX_use_certificate>(SSL_CTX *ctx, X509 *x); + +=item int B<SSL_CTX_use_certificate_ASN1>(SSL_CTX *ctx, int len, unsigned char *d); + +=item int B<SSL_CTX_use_certificate_file>(SSL_CTX *ctx, char *file, int type); + +=item [MACRO] B<SSL_DH>(SSL_kDHr|SSL_kDHd|SSL_kEDH); + +=item [MACRO] B<SSL_EDH>(SSL_kEDH|(SSL_AUTH_MASK^SSL_aNULL); + +=item [MACRO] B<SSL_FZA>(SSL_aFZA|SSL_kFZA|SSL_eFZA); + +=item [MACRO] B<SSL_MIN_RSA_MODULUS_LENGTH_IN_BYTES>(512/8); + +=item [MACRO] B<SSL_NULL>(SSL_eNULL); + +=item [MACRO] B<SSL_RSA>(SSL_kRSA|SSL_aRSA); + +=item [MACRO] B<SSL_SESSION_CACHE_MAX_SIZE_DEFAULT>(1024*20); + +=item int B<SSL_SESSION_cmp>(SSL_SESSION *a, SSL_SESSION *b); + +=item void B<SSL_SESSION_free>(SSL_SESSION *ss); + +=item [MACRO] B<SSL_SESSION_get_app_data>(s); + +=item char *B<SSL_SESSION_get_ex_data>(SSL_SESSION *s, int idx); + +=item int B<SSL_SESSION_get_ex_new_index>(long argl, char *argp, int (*new_func);(void), int (*dup_func)(void), void (*free_func)(void)) + +=item long B<SSL_SESSION_get_time>(SSL_SESSION *s); + +=item long B<SSL_SESSION_get_timeout>(SSL_SESSION *s); + +=item unsigned long B<SSL_SESSION_hash>(SSL_SESSION *a); + +=item SSL_SESSION *B<SSL_SESSION_new>(void); + +=item int B<SSL_SESSION_print>(BIO *bp, SSL_SESSION *x); + +=item int B<SSL_SESSION_print_fp>(FILE *fp, SSL_SESSION *x); + +=item [MACRO] B<SSL_SESSION_set_app_data>(s,a); + +=item int B<SSL_SESSION_set_ex_data>(SSL_SESSION *s, int idx, char *arg); + +=item long B<SSL_SESSION_set_time>(SSL_SESSION *s, long t); + +=item long B<SSL_SESSION_set_timeout>(SSL_SESSION *s, long t); + +=item [MACRO] B<SSL_SESS_CACHE_BOTH>(SSL_SESS_CACHE_CLIENT|SSL_SESS_CACHE_SERVER); + +=item [MACRO] B<SSL_SHA>(SSL_SHA1); + +=item [MACRO] B<SSL_ST_INIT>(SSL_ST_CONNECT|SSL_ST_ACCEPT); + +=item [MACRO] B<SSL_ST_RENEGOTIATE>(0x04|SSL_ST_INIT); + +=item int B<SSL_accept>(SSL *s); + +=item int B<SSL_add_client_CA>(SSL *ssl, X509 *x); + +=item [MACRO] B<SSL_add_session>(a,b); + +=item char *B<SSL_alert_desc_string>(int value); + +=item char *B<SSL_alert_desc_string_long>(int value); + +=item char *B<SSL_alert_type_string>(int value); + +=item char *B<SSL_alert_type_string_long>(int value); + +=item int B<SSL_check_private_key>(SSL *ssl); + +=item void B<SSL_clear>(SSL *s); + +=item [MACRO] B<SSL_clear_num_renegotiations>(ssl); + +=item int B<SSL_connect>(SSL *s); + +=item void B<SSL_copy_session_id>(SSL *t, SSL *f); + +=item long B<SSL_ctrl>(SSL *s, int cmd, long larg, char *parg); + +=item int B<SSL_do_handshake>(SSL *s); + +=item SSL *B<SSL_dup>(SSL *s); + +=item STACK *B<SSL_dup_CA_list>(STACK *sk); + +=item [MACRO] B<SSL_flush_sessions>(a,b); + +=item void B<SSL_free>(SSL *s); + +=item SSL_CTX *B<SSL_get_SSL_CTX>(SSL *ssl); + +=item [MACRO] B<SSL_get_app_data>(s); + +=item X509 *B<SSL_get_certificate>(SSL *s); + +=item [MACRO] B<SSL_get_cipher>(s); + +=item [MACRO] B<SSL_get_cipher_bits>(s,np); + +=item char *B<SSL_get_cipher_list>(SSL *s, int n); + +=item [MACRO] B<SSL_get_cipher_name>(s); + +=item [MACRO] B<SSL_get_cipher_version>(s); + +=item STACK *B<SSL_get_ciphers>(SSL *s); + +=item STACK *B<SSL_get_client_CA_list>(SSL *s); + +=item SSL_CIPHER *B<SSL_get_current_cipher>(SSL *s); + +=item long B<SSL_get_default_timeout>(SSL *s); + +=item int B<SSL_get_error>(SSL *s, int i); + +=item char *B<SSL_get_ex_data>(SSL *s, int idx); + +=item int B<SSL_get_ex_data_X509_STORE_CTX_idx>(void); + +=item int B<SSL_get_ex_new_index>(long argl, char *argp, int (*new_func);(void), int (*dup_func)(void), void (*free_func)(void)) + +=item int B<SSL_get_fd>(SSL *s); + +=item void (*B<SSL_get_info_callback>(SSL *ssl);)(void) + +=item STACK *B<SSL_get_peer_cert_chain>(SSL *s); + +=item X509 *B<SSL_get_peer_certificate>(SSL *s); + +=item EVP_PKEY *B<SSL_get_privatekey>(SSL *s); + +=item int B<SSL_get_quiet_shutdown>(SSL *s); + +=item BIO *B<SSL_get_rbio>(SSL *s); + +=item int B<SSL_get_read_ahead>(SSL *s); + +=item SSL_SESSION *B<SSL_get_session>(SSL *ssl); + +=item char *B<SSL_get_shared_ciphers>(SSL *s, char *buf, int len); + +=item int B<SSL_get_shutdown>(SSL *s); + +=item SSL_METHOD *B<SSL_get_ssl_method>(SSL *s); + +=item [MACRO] B<SSL_get_state>(a); + +=item [MACRO] B<SSL_get_time>(a); + +=item [MACRO] B<SSL_get_timeout>(a); + +=item int (*B<SSL_get_verify_callback>(SSL *s);)(void) + +=item int B<SSL_get_verify_mode>(SSL *s); + +=item long B<SSL_get_verify_result>(SSL *ssl); + +=item char *B<SSL_get_version>(SSL *s); + +=item BIO *B<SSL_get_wbio>(SSL *s); + +=item [MACRO] B<SSL_in_accept_init>(a); + +=item [MACRO] B<SSL_in_before>(a); + +=item [MACRO] B<SSL_in_connect_init>(a); + +=item [MACRO] B<SSL_in_init>(a); + +=item [MACRO] B<SSL_is_init_finished>(a); + +=item STACK *B<SSL_load_client_CA_file>(char *file); + +=item void B<SSL_load_error_strings>(void); + +=item SSL *B<SSL_new>(SSL_CTX *ctx); + +=item [MACRO] B<SSL_num_renegotiations>(ssl); + +=item int B<SSL_peek>(SSL *s, char *buf, int num); + +=item int B<SSL_pending>(SSL *s); + +=item int B<SSL_read>(SSL *s, char *buf, int num); + +=item [MACRO] B<SSL_remove_session>(a,b); + +=item int B<SSL_renegotiate>(SSL *s); + +=item char *B<SSL_rstate_string>(SSL *s); + +=item char *B<SSL_rstate_string_long>(SSL *s); + +=item [MACRO] B<SSL_session_reused>(ssl); + +=item void B<SSL_set_accept_state>(SSL *s); + +=item [MACRO] B<SSL_set_app_data>(s,arg); + +=item void B<SSL_set_bio>(SSL *s, BIO *rbio, BIO *wbio); + +=item int B<SSL_set_cipher_list>(SSL *s, char *str); + +=item void B<SSL_set_client_CA_list>(SSL *s, STACK *list); + +=item void B<SSL_set_connect_state>(SSL *s); + +=item int B<SSL_set_ex_data>(SSL *s, int idx, char *arg); + +=item int B<SSL_set_fd>(SSL *s, int fd); + +=item void B<SSL_set_info_callback>(SSL *ssl, void (*cb);(void)) + +=item [MACRO] B<SSL_set_options>(ssl,op); + +=item [MACRO] B<SSL_set_pref_cipher>(c,n); + +=item void B<SSL_set_quiet_shutdown>(SSL *s, int mode); + +=item void B<SSL_set_read_ahead>(SSL *s, int yes); + +=item int B<SSL_set_rfd>(SSL *s, int fd); + +=item int B<SSL_set_session>(SSL *s, SSL_SESSION *session); + +=item void B<SSL_set_shutdown>(SSL *s, int mode); + +=item int B<SSL_set_ssl_method>(SSL *s, SSL_METHOD *meth); + +=item [MACRO] B<SSL_set_time>(a,b); + +=item [MACRO] B<SSL_set_timeout>(a,b); + +=item void B<SSL_set_verify>(SSL *s, int mode, int (*callback);(void)) + +=item void B<SSL_set_verify_result>(SSL *ssl, long arg); + +=item int B<SSL_set_wfd>(SSL *s, int fd); + +=item int B<SSL_shutdown>(SSL *s); + +=item int B<SSL_state>(SSL *ssl); + +=item char *B<SSL_state_string>(SSL *s); + +=item char *B<SSL_state_string_long>(SSL *s); + +=item [MACRO] B<SSL_total_renegotiations>(ssl); + +=item int B<SSL_use_PrivateKey>(SSL *ssl, EVP_PKEY *pkey); + +=item int B<SSL_use_PrivateKey_ASN1>(int type, SSL *ssl, unsigned char *d, long len); + +=item int B<SSL_use_PrivateKey_file>(SSL *ssl, char *file, int type); + +=item int B<SSL_use_RSAPrivateKey>(SSL *ssl, RSA *rsa); + +=item int B<SSL_use_RSAPrivateKey_ASN1>(SSL *ssl, unsigned char *d, long len); + +=item int B<SSL_use_RSAPrivateKey_file>(SSL *ssl, char *file, int type); + +=item int B<SSL_use_certificate>(SSL *ssl, X509 *x); + +=item int B<SSL_use_certificate_ASN1>(SSL *ssl, int len, unsigned char *d); + +=item int B<SSL_use_certificate_file>(SSL *ssl, char *file, int type); + +=item int B<SSL_version>(SSL *s); + +=item [MACRO] B<SSL_want>(s); + +=item [MACRO] B<SSL_want_nothing>(s); + +=item [MACRO] B<SSL_want_read>(s); + +=item [MACRO] B<SSL_want_write>(s); + +=item [MACRO] B<SSL_want_x509_lookup>(s); + +=item int B<SSL_write>(SSL *s, char *buf, int num); + +=item SSL_METHOD *B<SSLv2_client_method>(void); + +=item SSL_METHOD *B<SSLv2_method>(void); + +=item SSL_METHOD *B<SSLv2_server_method>(void); + +=item SSL_METHOD *B<SSLv3_client_method>(void); + +=item SSL_METHOD *B<SSLv3_method>(void); + +=item SSL_METHOD *B<SSLv3_server_method>(void); + +=item SSL_METHOD *B<TLSv1_client_method>(void); + +=item SSL_METHOD *B<TLSv1_method>(void); + +=item SSL_METHOD *B<TLSv1_server_method>(void); + +=back + +=head1 SEE ALSO + +openssl(1), crypto(3) + +=head1 AUTHORS + +Ralf S. Engelschall + +=cut + |