summaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorRalf S. Engelschall <rse@openssl.org>1998-12-29 17:12:34 +0000
committerRalf S. Engelschall <rse@openssl.org>1998-12-29 17:12:34 +0000
commitcb496082f8db564ac7c8054edf46a2a7dd5e7393 (patch)
treeb1fdd51c303a3a5fbcb664ad4767b9999c006a0a /doc
parentf2d4be3b84dd38e12dadeba055b28374d56ab1a1 (diff)
downloadopenssl-new-cb496082f8db564ac7c8054edf46a2a7dd5e7393.tar.gz
Import the first cut for manual pages.
They are written in Perl's POD format for two reasons: First Perl is already needed for SSLeay and second, POD is easy to write and maintain _AND_ created nice looking NRoff manpages. The idea is to have three manual pages: openssl(1) ... The manpage for the `openssl' program (formerly ssleay) crypto(3) .... The manpage for crypto.h/libcrypto.a ssl(3) ....... The manpage for ssl.h/libssl.a The openssl(1) should be very similar to cvs(1), i.e. it should document all commands in a compact way. And I've even created the first cut for an overview of all 243 functions of the SSL API for ssl.pod. More to come...
Diffstat (limited to 'doc')
-rw-r--r--doc/crypto.pod27
-rw-r--r--doc/openssl.pod132
-rw-r--r--doc/ssl.pod543
3 files changed, 702 insertions, 0 deletions
diff --git a/doc/crypto.pod b/doc/crypto.pod
new file mode 100644
index 0000000000..4873b1765d
--- /dev/null
+++ b/doc/crypto.pod
@@ -0,0 +1,27 @@
+
+=pod
+
+=head1 NAME
+
+Crypto - OpenSSL Cryptography library
+
+=head1 SYNOPSIS
+
+=head1 DESCRIPTION
+
+The OpenSSL B<crypto> library implements various cryptography standards
+related to the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security
+(TLS v1) protocols. It provides a rich API which is documented here.
+
+...
+
+=head1 SEE ALSO
+
+openssl(1), ssl(3)
+
+=head1 AUTHORS
+
+Ralf S. Engelschall
+
+=cut
+
diff --git a/doc/openssl.pod b/doc/openssl.pod
new file mode 100644
index 0000000000..f7b8415334
--- /dev/null
+++ b/doc/openssl.pod
@@ -0,0 +1,132 @@
+
+=pod
+
+=head1 NAME
+
+openssl - OpenSSL command line tool
+
+=head1 SYNOPSIS
+
+B<openssl>
+I<command>
+[ I<command_opts> ]
+[ I<command_args> ]
+
+=head1 DESCRIPTION
+
+OpenSSL is a cryptography toolkit implementing the Secure Sockets Layer (SSL
+v2/v3) and Transport Layer Security (TLS v1) network protocols and related
+cryptography standards required by them.
+
+The B<openssl> program is a command line tool for using the various
+cryptography functions of OpenSSL's B<crypto> library from the shell.
+It can be used for
+
+ o Creation of RSA, DH and DSA key parameters
+ o Creattion of X.509 certificates, CSRs and CRLs
+ o Calculation of Message Digests
+ o Encryption and Decryption with Ciphers
+ o SSL/TLS Client and Server Tests
+
+=head1 COMMAND SUMMARY
+
+The B<openssl> program provides a rich variety of commands (I<command> in the
+SYNOPSIS above), each of which often has a wealth of options and arguments
+(I<command_opts> and I<command_args> in the SYNOPSIS).
+
+=over 10
+
+=item B<s_client>
+
+This implements a generic SSL/TLS client which can establish a transparent
+connection to a remote server speaking SSL/TLS. It's intended for testing
+purposes only and provides only rudimentary interface functionality but
+internally uses mostly all functionality of the OpenSSL B<ssl> library.
+
+=item B<s_server>
+
+This implements a generic SSL/TLS server which accepts connections from remote
+clients speaking SSL/TLS. It's intended for testing purposes only and provides
+only rudimentary interface functionality but internally uses mostly all
+functionality of the OpenSSL B<ssl> library. It provides both an own command
+line oriented protocol for testing SSL functions and a simple HTTP response
+facility to emulate an SSL/TLS-aware webserver.
+
+=back
+
+=head1 DETAILED COMMAND DESCRIPTION
+
+The following is a detailed description of every B<openssl> I<command>.
+
+=over 4
+
+=item B<openssl> B<s_client>
+[B<-connect> I<host>B<:>I<port>]
+[B<-verify> I<arg>]
+[B<-cert> I<arg>]
+[B<-key> I<arg>]
+[B<-CApath> I<arg>]
+[B<-CAfile> I<arg>]
+[B<-reconnect>]
+[B<-pause>]
+[B<-debug>]
+[B<-nbio_test>]
+[B<-state>]
+[B<-nbio>]
+[B<-quiet>]
+[B<-ssl2>]
+[B<-ssl3>]
+[B<-tls1>]
+[B<-no_ssl2>]
+[B<-no_ssl3>]
+[B<-no_tls1>]
+[B<-bugs>]
+[B<-cipher>]
+
+The B<s_client> command implements a generic SSL/TLS client which can
+establish a transparent connection to a remote I<host> and I<port> speaking
+SSL/TLS.
+
+=item B<openssl> B<s_server>
+[B<-accept> I<port>]
+[B<-verify> I<arg>]
+[B<-Verify> I<arg>]
+[B<-cert> I<arg>]
+[B<-key> I<arg>]
+[B<-nbio>]
+[B<-nbio_test>]
+[B<-debug>]
+[B<-state>]
+[B<-CApath> I<arg>]
+[B<-CAfile> I<arg>]
+[B<-nocert>]
+[B<-cipher> I<arg>]
+[B<-quiet>]
+[B<-no_tmp_rsa>]
+[B<-ssl2>]
+[B<-ssl3>]
+[B<-tls1>]
+[B<-no_ssl2>]
+[B<-no_ssl3>]
+[B<-no_tls1>]
+[B<-bugs>]
+[B<-www>]
+[B<-WWW>]
+
+The B<s_server> command implements a generic SSL/TLS server which accepts
+connections from remote clients on I<port> speaking SSL/TLS.
+
+=back
+
+...
+
+=head1 SEE ALSO
+
+crypto(3), ssl(3)
+
+=head1 AUTHORS
+
+Ralf S. Engelschall
+
+=cut
+
diff --git a/doc/ssl.pod b/doc/ssl.pod
new file mode 100644
index 0000000000..311dd242b1
--- /dev/null
+++ b/doc/ssl.pod
@@ -0,0 +1,543 @@
+
+=pod
+
+=head1 NAME
+
+SSL - OpenSSL SSL/TLS library
+
+=head1 SYNOPSIS
+
+=head1 DESCRIPTION
+
+The OpenSSL B<ssl> library implements the Secure Sockets Layer (SSL v2/v3) and
+Transport Layer Security (TLS v1) protocols. It provides a rich API which is
+documented here.
+
+=head1 HEADERS
+
+Currently the OpenSSL B<ssl> library provides the following C header files
+containing the prototypes for the data structures and and functions:
+
+=over 4
+
+=item B<ssl.h>
+
+That's the common header file for the SSL/TLS API. Include it into your
+program to make the API of the B<ssl> library available. It internally
+includes both more private SSL headers and headers from the B<crypto> library.
+
+=back
+
+=head1 STRUCTURES
+
+Currently the OpenSSL B<ssl> library functions deal with the following data
+structures:
+
+=over 4
+
+=item B<SSL_CTX> (SSL Context)
+
+=item B<SSL> (SSL Connection)
+
+That's the SSL/TLS structure which is created by
+a server or client per established connection.
+
+=item B<SSL_METHOD> (SSL Method)
+
+=item B<SSL_CIPHER> (SSL Cipher)
+
+=item B<SSL_SESSION> (SSL Session)
+
+=back
+
+=head1 FUNCTIONS
+
+Currently the OpenSSL B<ssl> library exports 143 API functions.
+They are documented in the following:
+
+=over 4
+
+=item [MACRO] B<SSL_ADH>(SSL_kEDH|SSL_aNULL);
+
+=item [MACRO] B<SSL_CB_ACCEPT_EXIT>(SSL_ST_ACCEPT|SSL_CB_EXIT);
+
+=item [MACRO] B<SSL_CB_ACCEPT_LOOP>(SSL_ST_ACCEPT|SSL_CB_LOOP);
+
+=item [MACRO] B<SSL_CB_CONNECT_EXIT>(SSL_ST_CONNECT|SSL_CB_EXIT);
+
+=item [MACRO] B<SSL_CB_CONNECT_LOOP>(SSL_ST_CONNECT|SSL_CB_LOOP);
+
+=item [MACRO] B<SSL_CB_READ_ALERT>(SSL_CB_ALERT|SSL_CB_READ);
+
+=item [MACRO] B<SSL_CB_WRITE_ALERT>(SSL_CB_ALERT|SSL_CB_WRITE);
+
+=item char *B<SSL_CIPHER_description>(SSL_CIPHER *cipher, char *buf, int len);
+
+=item int B<SSL_CIPHER_get_bits>(SSL_CIPHER *c, int *alg_bits);
+
+=item char *B<SSL_CIPHER_get_name>(SSL_CIPHER *c);
+
+=item char *B<SSL_CIPHER_get_version>(SSL_CIPHER *c);
+
+=item int B<SSL_CTX_add_client_CA>(SSL_CTX *ctx, X509 *x);
+
+=item [MACRO] B<SSL_CTX_add_extra_chain_cert>(ctx,x509);
+
+=item int B<SSL_CTX_add_session>(SSL_CTX *ctx, SSL_SESSION *c);
+
+=item int B<SSL_CTX_check_private_key>(SSL_CTX *ctx);
+
+=item long B<SSL_CTX_ctrl>(SSL_CTX *ctx, int cmd, long larg, char *parg);
+
+=item void B<SSL_CTX_flush_sessions>(SSL_CTX *s, long t);
+
+=item void B<SSL_CTX_free>(SSL_CTX *a);
+
+=item [MACRO] B<SSL_CTX_get_app_data>(ctx);
+
+=item [MACRO] B<SSL_CTX_get_cert_store>(ctx);
+
+=item STACK *B<SSL_CTX_get_client_CA_list>(SSL_CTX *ctx);
+
+=item [MACRO] B<SSL_CTX_get_client_cert_cb>(ctx);
+
+=item char *B<SSL_CTX_get_ex_data>(SSL_CTX *s, int idx);
+
+=item int B<SSL_CTX_get_ex_new_index>(long argl, char *argp, int (*new_func);(void), int (*dup_func)(void), void (*free_func)(void))
+
+=item [MACRO] B<SSL_CTX_get_info_callback>(ctx);
+
+=item int B<SSL_CTX_get_quiet_shutdown>(SSL_CTX *ctx);
+
+=item [MACRO] B<SSL_CTX_get_session_cache_mode>(ctx);
+
+=item [MACRO] B<SSL_CTX_get_timeout>(ctx);
+
+=item int (*B<SSL_CTX_get_verify_callback>(SSL_CTX *ctx);)(void)
+
+=item int B<SSL_CTX_get_verify_mode>(SSL_CTX *ctx);
+
+=item int B<SSL_CTX_load_verify_locations>(SSL_CTX *ctx, char *CAfile, char *CApath);
+
+=item [MACRO] B<SSL_CTX_need_tmp_RSA>(ctx);
+
+=item SSL_CTX *B<SSL_CTX_new>(SSL_METHOD *meth);
+
+=item int B<SSL_CTX_remove_session>(SSL_CTX *ctx, SSL_SESSION *c);
+
+=item [MACRO] B<SSL_CTX_sess_accept>(ctx);
+
+=item [MACRO] B<SSL_CTX_sess_accept_good>(ctx);
+
+=item [MACRO] B<SSL_CTX_sess_accept_renegotiate>(ctx);
+
+=item [MACRO] B<SSL_CTX_sess_cache_full>(ctx);
+
+=item [MACRO] B<SSL_CTX_sess_cb_hits>(ctx);
+
+=item [MACRO] B<SSL_CTX_sess_connect>(ctx);
+
+=item [MACRO] B<SSL_CTX_sess_connect_good>(ctx);
+
+=item [MACRO] B<SSL_CTX_sess_connect_renegotiate>(ctx);
+
+=item [MACRO] B<SSL_CTX_sess_get_cache_size>(ctx);
+
+=item [MACRO] B<SSL_CTX_sess_get_get_cb>(ctx);
+
+=item [MACRO] B<SSL_CTX_sess_get_new_cb>(ctx);
+
+=item [MACRO] B<SSL_CTX_sess_get_remove_cb>(ctx);
+
+=item [MACRO] B<SSL_CTX_sess_hits>(ctx);
+
+=item [MACRO] B<SSL_CTX_sess_misses>(ctx);
+
+=item [MACRO] B<SSL_CTX_sess_number>(ctx);
+
+=item [MACRO] B<SSL_CTX_sess_set_cache_size>(ctx,t);
+
+=item [MACRO] B<SSL_CTX_sess_set_get_cb>(ctx,cb);
+
+=item [MACRO] B<SSL_CTX_sess_set_new_cb>(ctx,cb);
+
+=item [MACRO] B<SSL_CTX_sess_set_remove_cb>(ctx,cb);
+
+=item [MACRO] B<SSL_CTX_sess_timeouts>(ctx);
+
+=item [MACRO] B<SSL_CTX_sessions>(ctx);
+
+=item [MACRO] B<SSL_CTX_set_app_data>(ctx,arg);
+
+=item [MACRO] B<SSL_CTX_set_cert_store>(ctx,cs);
+
+=item [MACRO] B<SSL_CTX_set_cert_verify_callback>(a,b,c);
+
+=item void B<SSL_CTX_set_cert_verify_cb>(SSL_CTX *ctx, int (*cb);(void), char *arg)
+
+=item int B<SSL_CTX_set_cipher_list>(SSL_CTX *ctx, char *str);
+
+=item void B<SSL_CTX_set_client_CA_list>(SSL_CTX *ctx, STACK *list);
+
+=item [MACRO] B<SSL_CTX_set_client_cert_cb>(ctx,cb);
+
+=item void B<SSL_CTX_set_default_passwd_cb>(SSL_CTX *ctx, int (*cb);(void))
+
+=item [MACRO] B<SSL_CTX_set_default_read_ahead>(ctx,m);
+
+=item [MACRO] B<SSL_CTX_set_default_verify>(a,b,c);
+
+=item int B<SSL_CTX_set_default_verify_paths>(SSL_CTX *ctx);
+
+=item int B<SSL_CTX_set_ex_data>(SSL_CTX *s, int idx, char *arg);
+
+=item [MACRO] B<SSL_CTX_set_info_callback>(ctx,cb);
+
+=item [MACRO] B<SSL_CTX_set_options>(ctx,op);
+
+=item void B<SSL_CTX_set_quiet_shutdown>(SSL_CTX *ctx, int mode);
+
+=item [MACRO] B<SSL_CTX_set_session_cache_mode>(ctx,m);
+
+=item int B<SSL_CTX_set_ssl_version>(SSL_CTX *ctx, SSL_METHOD *meth);
+
+=item [MACRO] B<SSL_CTX_set_timeout>(ctx,t);
+
+=item [MACRO] B<SSL_CTX_set_tmp_dh>(ctx,dh);
+
+=item [MACRO] B<SSL_CTX_set_tmp_dh_callback>(ctx,dh);
+
+=item [MACRO] B<SSL_CTX_set_tmp_rsa>(ctx,rsa);
+
+=item [MACRO] B<SSL_CTX_set_tmp_rsa_callback>(ctx,cb);
+
+=item void B<SSL_CTX_set_verify>(SSL_CTX *ctx, int mode, int (*cb);(void))
+
+=item int B<SSL_CTX_use_PrivateKey>(SSL_CTX *ctx, EVP_PKEY *pkey);
+
+=item int B<SSL_CTX_use_PrivateKey_ASN1>(int type, SSL_CTX *ctx, unsigned char *d, long len);
+
+=item int B<SSL_CTX_use_PrivateKey_file>(SSL_CTX *ctx, char *file, int type);
+
+=item int B<SSL_CTX_use_RSAPrivateKey>(SSL_CTX *ctx, RSA *rsa);
+
+=item int B<SSL_CTX_use_RSAPrivateKey_ASN1>(SSL_CTX *ctx, unsigned char *d, long len);
+
+=item int B<SSL_CTX_use_RSAPrivateKey_file>(SSL_CTX *ctx, char *file, int type);
+
+=item int B<SSL_CTX_use_certificate>(SSL_CTX *ctx, X509 *x);
+
+=item int B<SSL_CTX_use_certificate_ASN1>(SSL_CTX *ctx, int len, unsigned char *d);
+
+=item int B<SSL_CTX_use_certificate_file>(SSL_CTX *ctx, char *file, int type);
+
+=item [MACRO] B<SSL_DH>(SSL_kDHr|SSL_kDHd|SSL_kEDH);
+
+=item [MACRO] B<SSL_EDH>(SSL_kEDH|(SSL_AUTH_MASK^SSL_aNULL);
+
+=item [MACRO] B<SSL_FZA>(SSL_aFZA|SSL_kFZA|SSL_eFZA);
+
+=item [MACRO] B<SSL_MIN_RSA_MODULUS_LENGTH_IN_BYTES>(512/8);
+
+=item [MACRO] B<SSL_NULL>(SSL_eNULL);
+
+=item [MACRO] B<SSL_RSA>(SSL_kRSA|SSL_aRSA);
+
+=item [MACRO] B<SSL_SESSION_CACHE_MAX_SIZE_DEFAULT>(1024*20);
+
+=item int B<SSL_SESSION_cmp>(SSL_SESSION *a, SSL_SESSION *b);
+
+=item void B<SSL_SESSION_free>(SSL_SESSION *ss);
+
+=item [MACRO] B<SSL_SESSION_get_app_data>(s);
+
+=item char *B<SSL_SESSION_get_ex_data>(SSL_SESSION *s, int idx);
+
+=item int B<SSL_SESSION_get_ex_new_index>(long argl, char *argp, int (*new_func);(void), int (*dup_func)(void), void (*free_func)(void))
+
+=item long B<SSL_SESSION_get_time>(SSL_SESSION *s);
+
+=item long B<SSL_SESSION_get_timeout>(SSL_SESSION *s);
+
+=item unsigned long B<SSL_SESSION_hash>(SSL_SESSION *a);
+
+=item SSL_SESSION *B<SSL_SESSION_new>(void);
+
+=item int B<SSL_SESSION_print>(BIO *bp, SSL_SESSION *x);
+
+=item int B<SSL_SESSION_print_fp>(FILE *fp, SSL_SESSION *x);
+
+=item [MACRO] B<SSL_SESSION_set_app_data>(s,a);
+
+=item int B<SSL_SESSION_set_ex_data>(SSL_SESSION *s, int idx, char *arg);
+
+=item long B<SSL_SESSION_set_time>(SSL_SESSION *s, long t);
+
+=item long B<SSL_SESSION_set_timeout>(SSL_SESSION *s, long t);
+
+=item [MACRO] B<SSL_SESS_CACHE_BOTH>(SSL_SESS_CACHE_CLIENT|SSL_SESS_CACHE_SERVER);
+
+=item [MACRO] B<SSL_SHA>(SSL_SHA1);
+
+=item [MACRO] B<SSL_ST_INIT>(SSL_ST_CONNECT|SSL_ST_ACCEPT);
+
+=item [MACRO] B<SSL_ST_RENEGOTIATE>(0x04|SSL_ST_INIT);
+
+=item int B<SSL_accept>(SSL *s);
+
+=item int B<SSL_add_client_CA>(SSL *ssl, X509 *x);
+
+=item [MACRO] B<SSL_add_session>(a,b);
+
+=item char *B<SSL_alert_desc_string>(int value);
+
+=item char *B<SSL_alert_desc_string_long>(int value);
+
+=item char *B<SSL_alert_type_string>(int value);
+
+=item char *B<SSL_alert_type_string_long>(int value);
+
+=item int B<SSL_check_private_key>(SSL *ssl);
+
+=item void B<SSL_clear>(SSL *s);
+
+=item [MACRO] B<SSL_clear_num_renegotiations>(ssl);
+
+=item int B<SSL_connect>(SSL *s);
+
+=item void B<SSL_copy_session_id>(SSL *t, SSL *f);
+
+=item long B<SSL_ctrl>(SSL *s, int cmd, long larg, char *parg);
+
+=item int B<SSL_do_handshake>(SSL *s);
+
+=item SSL *B<SSL_dup>(SSL *s);
+
+=item STACK *B<SSL_dup_CA_list>(STACK *sk);
+
+=item [MACRO] B<SSL_flush_sessions>(a,b);
+
+=item void B<SSL_free>(SSL *s);
+
+=item SSL_CTX *B<SSL_get_SSL_CTX>(SSL *ssl);
+
+=item [MACRO] B<SSL_get_app_data>(s);
+
+=item X509 *B<SSL_get_certificate>(SSL *s);
+
+=item [MACRO] B<SSL_get_cipher>(s);
+
+=item [MACRO] B<SSL_get_cipher_bits>(s,np);
+
+=item char *B<SSL_get_cipher_list>(SSL *s, int n);
+
+=item [MACRO] B<SSL_get_cipher_name>(s);
+
+=item [MACRO] B<SSL_get_cipher_version>(s);
+
+=item STACK *B<SSL_get_ciphers>(SSL *s);
+
+=item STACK *B<SSL_get_client_CA_list>(SSL *s);
+
+=item SSL_CIPHER *B<SSL_get_current_cipher>(SSL *s);
+
+=item long B<SSL_get_default_timeout>(SSL *s);
+
+=item int B<SSL_get_error>(SSL *s, int i);
+
+=item char *B<SSL_get_ex_data>(SSL *s, int idx);
+
+=item int B<SSL_get_ex_data_X509_STORE_CTX_idx>(void);
+
+=item int B<SSL_get_ex_new_index>(long argl, char *argp, int (*new_func);(void), int (*dup_func)(void), void (*free_func)(void))
+
+=item int B<SSL_get_fd>(SSL *s);
+
+=item void (*B<SSL_get_info_callback>(SSL *ssl);)(void)
+
+=item STACK *B<SSL_get_peer_cert_chain>(SSL *s);
+
+=item X509 *B<SSL_get_peer_certificate>(SSL *s);
+
+=item EVP_PKEY *B<SSL_get_privatekey>(SSL *s);
+
+=item int B<SSL_get_quiet_shutdown>(SSL *s);
+
+=item BIO *B<SSL_get_rbio>(SSL *s);
+
+=item int B<SSL_get_read_ahead>(SSL *s);
+
+=item SSL_SESSION *B<SSL_get_session>(SSL *ssl);
+
+=item char *B<SSL_get_shared_ciphers>(SSL *s, char *buf, int len);
+
+=item int B<SSL_get_shutdown>(SSL *s);
+
+=item SSL_METHOD *B<SSL_get_ssl_method>(SSL *s);
+
+=item [MACRO] B<SSL_get_state>(a);
+
+=item [MACRO] B<SSL_get_time>(a);
+
+=item [MACRO] B<SSL_get_timeout>(a);
+
+=item int (*B<SSL_get_verify_callback>(SSL *s);)(void)
+
+=item int B<SSL_get_verify_mode>(SSL *s);
+
+=item long B<SSL_get_verify_result>(SSL *ssl);
+
+=item char *B<SSL_get_version>(SSL *s);
+
+=item BIO *B<SSL_get_wbio>(SSL *s);
+
+=item [MACRO] B<SSL_in_accept_init>(a);
+
+=item [MACRO] B<SSL_in_before>(a);
+
+=item [MACRO] B<SSL_in_connect_init>(a);
+
+=item [MACRO] B<SSL_in_init>(a);
+
+=item [MACRO] B<SSL_is_init_finished>(a);
+
+=item STACK *B<SSL_load_client_CA_file>(char *file);
+
+=item void B<SSL_load_error_strings>(void);
+
+=item SSL *B<SSL_new>(SSL_CTX *ctx);
+
+=item [MACRO] B<SSL_num_renegotiations>(ssl);
+
+=item int B<SSL_peek>(SSL *s, char *buf, int num);
+
+=item int B<SSL_pending>(SSL *s);
+
+=item int B<SSL_read>(SSL *s, char *buf, int num);
+
+=item [MACRO] B<SSL_remove_session>(a,b);
+
+=item int B<SSL_renegotiate>(SSL *s);
+
+=item char *B<SSL_rstate_string>(SSL *s);
+
+=item char *B<SSL_rstate_string_long>(SSL *s);
+
+=item [MACRO] B<SSL_session_reused>(ssl);
+
+=item void B<SSL_set_accept_state>(SSL *s);
+
+=item [MACRO] B<SSL_set_app_data>(s,arg);
+
+=item void B<SSL_set_bio>(SSL *s, BIO *rbio, BIO *wbio);
+
+=item int B<SSL_set_cipher_list>(SSL *s, char *str);
+
+=item void B<SSL_set_client_CA_list>(SSL *s, STACK *list);
+
+=item void B<SSL_set_connect_state>(SSL *s);
+
+=item int B<SSL_set_ex_data>(SSL *s, int idx, char *arg);
+
+=item int B<SSL_set_fd>(SSL *s, int fd);
+
+=item void B<SSL_set_info_callback>(SSL *ssl, void (*cb);(void))
+
+=item [MACRO] B<SSL_set_options>(ssl,op);
+
+=item [MACRO] B<SSL_set_pref_cipher>(c,n);
+
+=item void B<SSL_set_quiet_shutdown>(SSL *s, int mode);
+
+=item void B<SSL_set_read_ahead>(SSL *s, int yes);
+
+=item int B<SSL_set_rfd>(SSL *s, int fd);
+
+=item int B<SSL_set_session>(SSL *s, SSL_SESSION *session);
+
+=item void B<SSL_set_shutdown>(SSL *s, int mode);
+
+=item int B<SSL_set_ssl_method>(SSL *s, SSL_METHOD *meth);
+
+=item [MACRO] B<SSL_set_time>(a,b);
+
+=item [MACRO] B<SSL_set_timeout>(a,b);
+
+=item void B<SSL_set_verify>(SSL *s, int mode, int (*callback);(void))
+
+=item void B<SSL_set_verify_result>(SSL *ssl, long arg);
+
+=item int B<SSL_set_wfd>(SSL *s, int fd);
+
+=item int B<SSL_shutdown>(SSL *s);
+
+=item int B<SSL_state>(SSL *ssl);
+
+=item char *B<SSL_state_string>(SSL *s);
+
+=item char *B<SSL_state_string_long>(SSL *s);
+
+=item [MACRO] B<SSL_total_renegotiations>(ssl);
+
+=item int B<SSL_use_PrivateKey>(SSL *ssl, EVP_PKEY *pkey);
+
+=item int B<SSL_use_PrivateKey_ASN1>(int type, SSL *ssl, unsigned char *d, long len);
+
+=item int B<SSL_use_PrivateKey_file>(SSL *ssl, char *file, int type);
+
+=item int B<SSL_use_RSAPrivateKey>(SSL *ssl, RSA *rsa);
+
+=item int B<SSL_use_RSAPrivateKey_ASN1>(SSL *ssl, unsigned char *d, long len);
+
+=item int B<SSL_use_RSAPrivateKey_file>(SSL *ssl, char *file, int type);
+
+=item int B<SSL_use_certificate>(SSL *ssl, X509 *x);
+
+=item int B<SSL_use_certificate_ASN1>(SSL *ssl, int len, unsigned char *d);
+
+=item int B<SSL_use_certificate_file>(SSL *ssl, char *file, int type);
+
+=item int B<SSL_version>(SSL *s);
+
+=item [MACRO] B<SSL_want>(s);
+
+=item [MACRO] B<SSL_want_nothing>(s);
+
+=item [MACRO] B<SSL_want_read>(s);
+
+=item [MACRO] B<SSL_want_write>(s);
+
+=item [MACRO] B<SSL_want_x509_lookup>(s);
+
+=item int B<SSL_write>(SSL *s, char *buf, int num);
+
+=item SSL_METHOD *B<SSLv2_client_method>(void);
+
+=item SSL_METHOD *B<SSLv2_method>(void);
+
+=item SSL_METHOD *B<SSLv2_server_method>(void);
+
+=item SSL_METHOD *B<SSLv3_client_method>(void);
+
+=item SSL_METHOD *B<SSLv3_method>(void);
+
+=item SSL_METHOD *B<SSLv3_server_method>(void);
+
+=item SSL_METHOD *B<TLSv1_client_method>(void);
+
+=item SSL_METHOD *B<TLSv1_method>(void);
+
+=item SSL_METHOD *B<TLSv1_server_method>(void);
+
+=back
+
+=head1 SEE ALSO
+
+openssl(1), crypto(3)
+
+=head1 AUTHORS
+
+Ralf S. Engelschall
+
+=cut
+