mirror of
https://github.com/openssl/openssl.git
synced 2024-11-25 02:53:30 +08:00
Import the first cut for manual pages.
They are written in Perl's POD format for two reasons: First Perl is already needed for SSLeay and second, POD is easy to write and maintain _AND_ created nice looking NRoff manpages. The idea is to have three manual pages: openssl(1) ... The manpage for the `openssl' program (formerly ssleay) crypto(3) .... The manpage for crypto.h/libcrypto.a ssl(3) ....... The manpage for ssl.h/libssl.a The openssl(1) should be very similar to cvs(1), i.e. it should document all commands in a compact way. And I've even created the first cut for an overview of all 243 functions of the SSL API for ssl.pod. More to come...
This commit is contained in:
parent
f2d4be3b84
commit
cb496082f8
27
doc/crypto.pod
Normal file
27
doc/crypto.pod
Normal file
@ -0,0 +1,27 @@
|
||||
|
||||
=pod
|
||||
|
||||
=head1 NAME
|
||||
|
||||
Crypto - OpenSSL Cryptography library
|
||||
|
||||
=head1 SYNOPSIS
|
||||
|
||||
=head1 DESCRIPTION
|
||||
|
||||
The OpenSSL B<crypto> library implements various cryptography standards
|
||||
related to the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security
|
||||
(TLS v1) protocols. It provides a rich API which is documented here.
|
||||
|
||||
...
|
||||
|
||||
=head1 SEE ALSO
|
||||
|
||||
openssl(1), ssl(3)
|
||||
|
||||
=head1 AUTHORS
|
||||
|
||||
Ralf S. Engelschall
|
||||
|
||||
=cut
|
||||
|
132
doc/openssl.pod
Normal file
132
doc/openssl.pod
Normal file
@ -0,0 +1,132 @@
|
||||
|
||||
=pod
|
||||
|
||||
=head1 NAME
|
||||
|
||||
openssl - OpenSSL command line tool
|
||||
|
||||
=head1 SYNOPSIS
|
||||
|
||||
B<openssl>
|
||||
I<command>
|
||||
[ I<command_opts> ]
|
||||
[ I<command_args> ]
|
||||
|
||||
=head1 DESCRIPTION
|
||||
|
||||
OpenSSL is a cryptography toolkit implementing the Secure Sockets Layer (SSL
|
||||
v2/v3) and Transport Layer Security (TLS v1) network protocols and related
|
||||
cryptography standards required by them.
|
||||
|
||||
The B<openssl> program is a command line tool for using the various
|
||||
cryptography functions of OpenSSL's B<crypto> library from the shell.
|
||||
It can be used for
|
||||
|
||||
o Creation of RSA, DH and DSA key parameters
|
||||
o Creattion of X.509 certificates, CSRs and CRLs
|
||||
o Calculation of Message Digests
|
||||
o Encryption and Decryption with Ciphers
|
||||
o SSL/TLS Client and Server Tests
|
||||
|
||||
=head1 COMMAND SUMMARY
|
||||
|
||||
The B<openssl> program provides a rich variety of commands (I<command> in the
|
||||
SYNOPSIS above), each of which often has a wealth of options and arguments
|
||||
(I<command_opts> and I<command_args> in the SYNOPSIS).
|
||||
|
||||
=over 10
|
||||
|
||||
=item B<s_client>
|
||||
|
||||
This implements a generic SSL/TLS client which can establish a transparent
|
||||
connection to a remote server speaking SSL/TLS. It's intended for testing
|
||||
purposes only and provides only rudimentary interface functionality but
|
||||
internally uses mostly all functionality of the OpenSSL B<ssl> library.
|
||||
|
||||
=item B<s_server>
|
||||
|
||||
This implements a generic SSL/TLS server which accepts connections from remote
|
||||
clients speaking SSL/TLS. It's intended for testing purposes only and provides
|
||||
only rudimentary interface functionality but internally uses mostly all
|
||||
functionality of the OpenSSL B<ssl> library. It provides both an own command
|
||||
line oriented protocol for testing SSL functions and a simple HTTP response
|
||||
facility to emulate an SSL/TLS-aware webserver.
|
||||
|
||||
=back
|
||||
|
||||
=head1 DETAILED COMMAND DESCRIPTION
|
||||
|
||||
The following is a detailed description of every B<openssl> I<command>.
|
||||
|
||||
=over 4
|
||||
|
||||
=item B<openssl> B<s_client>
|
||||
[B<-connect> I<host>B<:>I<port>]
|
||||
[B<-verify> I<arg>]
|
||||
[B<-cert> I<arg>]
|
||||
[B<-key> I<arg>]
|
||||
[B<-CApath> I<arg>]
|
||||
[B<-CAfile> I<arg>]
|
||||
[B<-reconnect>]
|
||||
[B<-pause>]
|
||||
[B<-debug>]
|
||||
[B<-nbio_test>]
|
||||
[B<-state>]
|
||||
[B<-nbio>]
|
||||
[B<-quiet>]
|
||||
[B<-ssl2>]
|
||||
[B<-ssl3>]
|
||||
[B<-tls1>]
|
||||
[B<-no_ssl2>]
|
||||
[B<-no_ssl3>]
|
||||
[B<-no_tls1>]
|
||||
[B<-bugs>]
|
||||
[B<-cipher>]
|
||||
|
||||
The B<s_client> command implements a generic SSL/TLS client which can
|
||||
establish a transparent connection to a remote I<host> and I<port> speaking
|
||||
SSL/TLS.
|
||||
|
||||
=item B<openssl> B<s_server>
|
||||
[B<-accept> I<port>]
|
||||
[B<-verify> I<arg>]
|
||||
[B<-Verify> I<arg>]
|
||||
[B<-cert> I<arg>]
|
||||
[B<-key> I<arg>]
|
||||
[B<-nbio>]
|
||||
[B<-nbio_test>]
|
||||
[B<-debug>]
|
||||
[B<-state>]
|
||||
[B<-CApath> I<arg>]
|
||||
[B<-CAfile> I<arg>]
|
||||
[B<-nocert>]
|
||||
[B<-cipher> I<arg>]
|
||||
[B<-quiet>]
|
||||
[B<-no_tmp_rsa>]
|
||||
[B<-ssl2>]
|
||||
[B<-ssl3>]
|
||||
[B<-tls1>]
|
||||
[B<-no_ssl2>]
|
||||
[B<-no_ssl3>]
|
||||
[B<-no_tls1>]
|
||||
[B<-bugs>]
|
||||
[B<-www>]
|
||||
[B<-WWW>]
|
||||
|
||||
The B<s_server> command implements a generic SSL/TLS server which accepts
|
||||
connections from remote clients on I<port> speaking SSL/TLS.
|
||||
|
||||
=back
|
||||
|
||||
...
|
||||
|
||||
=head1 SEE ALSO
|
||||
|
||||
crypto(3), ssl(3)
|
||||
|
||||
=head1 AUTHORS
|
||||
|
||||
Ralf S. Engelschall
|
||||
|
||||
=cut
|
||||
|
543
doc/ssl.pod
Normal file
543
doc/ssl.pod
Normal file
@ -0,0 +1,543 @@
|
||||
|
||||
=pod
|
||||
|
||||
=head1 NAME
|
||||
|
||||
SSL - OpenSSL SSL/TLS library
|
||||
|
||||
=head1 SYNOPSIS
|
||||
|
||||
=head1 DESCRIPTION
|
||||
|
||||
The OpenSSL B<ssl> library implements the Secure Sockets Layer (SSL v2/v3) and
|
||||
Transport Layer Security (TLS v1) protocols. It provides a rich API which is
|
||||
documented here.
|
||||
|
||||
=head1 HEADERS
|
||||
|
||||
Currently the OpenSSL B<ssl> library provides the following C header files
|
||||
containing the prototypes for the data structures and and functions:
|
||||
|
||||
=over 4
|
||||
|
||||
=item B<ssl.h>
|
||||
|
||||
That's the common header file for the SSL/TLS API. Include it into your
|
||||
program to make the API of the B<ssl> library available. It internally
|
||||
includes both more private SSL headers and headers from the B<crypto> library.
|
||||
|
||||
=back
|
||||
|
||||
=head1 STRUCTURES
|
||||
|
||||
Currently the OpenSSL B<ssl> library functions deal with the following data
|
||||
structures:
|
||||
|
||||
=over 4
|
||||
|
||||
=item B<SSL_CTX> (SSL Context)
|
||||
|
||||
=item B<SSL> (SSL Connection)
|
||||
|
||||
That's the SSL/TLS structure which is created by
|
||||
a server or client per established connection.
|
||||
|
||||
=item B<SSL_METHOD> (SSL Method)
|
||||
|
||||
=item B<SSL_CIPHER> (SSL Cipher)
|
||||
|
||||
=item B<SSL_SESSION> (SSL Session)
|
||||
|
||||
=back
|
||||
|
||||
=head1 FUNCTIONS
|
||||
|
||||
Currently the OpenSSL B<ssl> library exports 143 API functions.
|
||||
They are documented in the following:
|
||||
|
||||
=over 4
|
||||
|
||||
=item [MACRO] B<SSL_ADH>(SSL_kEDH|SSL_aNULL);
|
||||
|
||||
=item [MACRO] B<SSL_CB_ACCEPT_EXIT>(SSL_ST_ACCEPT|SSL_CB_EXIT);
|
||||
|
||||
=item [MACRO] B<SSL_CB_ACCEPT_LOOP>(SSL_ST_ACCEPT|SSL_CB_LOOP);
|
||||
|
||||
=item [MACRO] B<SSL_CB_CONNECT_EXIT>(SSL_ST_CONNECT|SSL_CB_EXIT);
|
||||
|
||||
=item [MACRO] B<SSL_CB_CONNECT_LOOP>(SSL_ST_CONNECT|SSL_CB_LOOP);
|
||||
|
||||
=item [MACRO] B<SSL_CB_READ_ALERT>(SSL_CB_ALERT|SSL_CB_READ);
|
||||
|
||||
=item [MACRO] B<SSL_CB_WRITE_ALERT>(SSL_CB_ALERT|SSL_CB_WRITE);
|
||||
|
||||
=item char *B<SSL_CIPHER_description>(SSL_CIPHER *cipher, char *buf, int len);
|
||||
|
||||
=item int B<SSL_CIPHER_get_bits>(SSL_CIPHER *c, int *alg_bits);
|
||||
|
||||
=item char *B<SSL_CIPHER_get_name>(SSL_CIPHER *c);
|
||||
|
||||
=item char *B<SSL_CIPHER_get_version>(SSL_CIPHER *c);
|
||||
|
||||
=item int B<SSL_CTX_add_client_CA>(SSL_CTX *ctx, X509 *x);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_add_extra_chain_cert>(ctx,x509);
|
||||
|
||||
=item int B<SSL_CTX_add_session>(SSL_CTX *ctx, SSL_SESSION *c);
|
||||
|
||||
=item int B<SSL_CTX_check_private_key>(SSL_CTX *ctx);
|
||||
|
||||
=item long B<SSL_CTX_ctrl>(SSL_CTX *ctx, int cmd, long larg, char *parg);
|
||||
|
||||
=item void B<SSL_CTX_flush_sessions>(SSL_CTX *s, long t);
|
||||
|
||||
=item void B<SSL_CTX_free>(SSL_CTX *a);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_get_app_data>(ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_get_cert_store>(ctx);
|
||||
|
||||
=item STACK *B<SSL_CTX_get_client_CA_list>(SSL_CTX *ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_get_client_cert_cb>(ctx);
|
||||
|
||||
=item char *B<SSL_CTX_get_ex_data>(SSL_CTX *s, int idx);
|
||||
|
||||
=item int B<SSL_CTX_get_ex_new_index>(long argl, char *argp, int (*new_func);(void), int (*dup_func)(void), void (*free_func)(void))
|
||||
|
||||
=item [MACRO] B<SSL_CTX_get_info_callback>(ctx);
|
||||
|
||||
=item int B<SSL_CTX_get_quiet_shutdown>(SSL_CTX *ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_get_session_cache_mode>(ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_get_timeout>(ctx);
|
||||
|
||||
=item int (*B<SSL_CTX_get_verify_callback>(SSL_CTX *ctx);)(void)
|
||||
|
||||
=item int B<SSL_CTX_get_verify_mode>(SSL_CTX *ctx);
|
||||
|
||||
=item int B<SSL_CTX_load_verify_locations>(SSL_CTX *ctx, char *CAfile, char *CApath);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_need_tmp_RSA>(ctx);
|
||||
|
||||
=item SSL_CTX *B<SSL_CTX_new>(SSL_METHOD *meth);
|
||||
|
||||
=item int B<SSL_CTX_remove_session>(SSL_CTX *ctx, SSL_SESSION *c);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_accept>(ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_accept_good>(ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_accept_renegotiate>(ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_cache_full>(ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_cb_hits>(ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_connect>(ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_connect_good>(ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_connect_renegotiate>(ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_get_cache_size>(ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_get_get_cb>(ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_get_new_cb>(ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_get_remove_cb>(ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_hits>(ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_misses>(ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_number>(ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_set_cache_size>(ctx,t);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_set_get_cb>(ctx,cb);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_set_new_cb>(ctx,cb);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_set_remove_cb>(ctx,cb);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sess_timeouts>(ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_sessions>(ctx);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_set_app_data>(ctx,arg);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_set_cert_store>(ctx,cs);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_set_cert_verify_callback>(a,b,c);
|
||||
|
||||
=item void B<SSL_CTX_set_cert_verify_cb>(SSL_CTX *ctx, int (*cb);(void), char *arg)
|
||||
|
||||
=item int B<SSL_CTX_set_cipher_list>(SSL_CTX *ctx, char *str);
|
||||
|
||||
=item void B<SSL_CTX_set_client_CA_list>(SSL_CTX *ctx, STACK *list);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_set_client_cert_cb>(ctx,cb);
|
||||
|
||||
=item void B<SSL_CTX_set_default_passwd_cb>(SSL_CTX *ctx, int (*cb);(void))
|
||||
|
||||
=item [MACRO] B<SSL_CTX_set_default_read_ahead>(ctx,m);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_set_default_verify>(a,b,c);
|
||||
|
||||
=item int B<SSL_CTX_set_default_verify_paths>(SSL_CTX *ctx);
|
||||
|
||||
=item int B<SSL_CTX_set_ex_data>(SSL_CTX *s, int idx, char *arg);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_set_info_callback>(ctx,cb);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_set_options>(ctx,op);
|
||||
|
||||
=item void B<SSL_CTX_set_quiet_shutdown>(SSL_CTX *ctx, int mode);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_set_session_cache_mode>(ctx,m);
|
||||
|
||||
=item int B<SSL_CTX_set_ssl_version>(SSL_CTX *ctx, SSL_METHOD *meth);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_set_timeout>(ctx,t);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_set_tmp_dh>(ctx,dh);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_set_tmp_dh_callback>(ctx,dh);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_set_tmp_rsa>(ctx,rsa);
|
||||
|
||||
=item [MACRO] B<SSL_CTX_set_tmp_rsa_callback>(ctx,cb);
|
||||
|
||||
=item void B<SSL_CTX_set_verify>(SSL_CTX *ctx, int mode, int (*cb);(void))
|
||||
|
||||
=item int B<SSL_CTX_use_PrivateKey>(SSL_CTX *ctx, EVP_PKEY *pkey);
|
||||
|
||||
=item int B<SSL_CTX_use_PrivateKey_ASN1>(int type, SSL_CTX *ctx, unsigned char *d, long len);
|
||||
|
||||
=item int B<SSL_CTX_use_PrivateKey_file>(SSL_CTX *ctx, char *file, int type);
|
||||
|
||||
=item int B<SSL_CTX_use_RSAPrivateKey>(SSL_CTX *ctx, RSA *rsa);
|
||||
|
||||
=item int B<SSL_CTX_use_RSAPrivateKey_ASN1>(SSL_CTX *ctx, unsigned char *d, long len);
|
||||
|
||||
=item int B<SSL_CTX_use_RSAPrivateKey_file>(SSL_CTX *ctx, char *file, int type);
|
||||
|
||||
=item int B<SSL_CTX_use_certificate>(SSL_CTX *ctx, X509 *x);
|
||||
|
||||
=item int B<SSL_CTX_use_certificate_ASN1>(SSL_CTX *ctx, int len, unsigned char *d);
|
||||
|
||||
=item int B<SSL_CTX_use_certificate_file>(SSL_CTX *ctx, char *file, int type);
|
||||
|
||||
=item [MACRO] B<SSL_DH>(SSL_kDHr|SSL_kDHd|SSL_kEDH);
|
||||
|
||||
=item [MACRO] B<SSL_EDH>(SSL_kEDH|(SSL_AUTH_MASK^SSL_aNULL);
|
||||
|
||||
=item [MACRO] B<SSL_FZA>(SSL_aFZA|SSL_kFZA|SSL_eFZA);
|
||||
|
||||
=item [MACRO] B<SSL_MIN_RSA_MODULUS_LENGTH_IN_BYTES>(512/8);
|
||||
|
||||
=item [MACRO] B<SSL_NULL>(SSL_eNULL);
|
||||
|
||||
=item [MACRO] B<SSL_RSA>(SSL_kRSA|SSL_aRSA);
|
||||
|
||||
=item [MACRO] B<SSL_SESSION_CACHE_MAX_SIZE_DEFAULT>(1024*20);
|
||||
|
||||
=item int B<SSL_SESSION_cmp>(SSL_SESSION *a, SSL_SESSION *b);
|
||||
|
||||
=item void B<SSL_SESSION_free>(SSL_SESSION *ss);
|
||||
|
||||
=item [MACRO] B<SSL_SESSION_get_app_data>(s);
|
||||
|
||||
=item char *B<SSL_SESSION_get_ex_data>(SSL_SESSION *s, int idx);
|
||||
|
||||
=item int B<SSL_SESSION_get_ex_new_index>(long argl, char *argp, int (*new_func);(void), int (*dup_func)(void), void (*free_func)(void))
|
||||
|
||||
=item long B<SSL_SESSION_get_time>(SSL_SESSION *s);
|
||||
|
||||
=item long B<SSL_SESSION_get_timeout>(SSL_SESSION *s);
|
||||
|
||||
=item unsigned long B<SSL_SESSION_hash>(SSL_SESSION *a);
|
||||
|
||||
=item SSL_SESSION *B<SSL_SESSION_new>(void);
|
||||
|
||||
=item int B<SSL_SESSION_print>(BIO *bp, SSL_SESSION *x);
|
||||
|
||||
=item int B<SSL_SESSION_print_fp>(FILE *fp, SSL_SESSION *x);
|
||||
|
||||
=item [MACRO] B<SSL_SESSION_set_app_data>(s,a);
|
||||
|
||||
=item int B<SSL_SESSION_set_ex_data>(SSL_SESSION *s, int idx, char *arg);
|
||||
|
||||
=item long B<SSL_SESSION_set_time>(SSL_SESSION *s, long t);
|
||||
|
||||
=item long B<SSL_SESSION_set_timeout>(SSL_SESSION *s, long t);
|
||||
|
||||
=item [MACRO] B<SSL_SESS_CACHE_BOTH>(SSL_SESS_CACHE_CLIENT|SSL_SESS_CACHE_SERVER);
|
||||
|
||||
=item [MACRO] B<SSL_SHA>(SSL_SHA1);
|
||||
|
||||
=item [MACRO] B<SSL_ST_INIT>(SSL_ST_CONNECT|SSL_ST_ACCEPT);
|
||||
|
||||
=item [MACRO] B<SSL_ST_RENEGOTIATE>(0x04|SSL_ST_INIT);
|
||||
|
||||
=item int B<SSL_accept>(SSL *s);
|
||||
|
||||
=item int B<SSL_add_client_CA>(SSL *ssl, X509 *x);
|
||||
|
||||
=item [MACRO] B<SSL_add_session>(a,b);
|
||||
|
||||
=item char *B<SSL_alert_desc_string>(int value);
|
||||
|
||||
=item char *B<SSL_alert_desc_string_long>(int value);
|
||||
|
||||
=item char *B<SSL_alert_type_string>(int value);
|
||||
|
||||
=item char *B<SSL_alert_type_string_long>(int value);
|
||||
|
||||
=item int B<SSL_check_private_key>(SSL *ssl);
|
||||
|
||||
=item void B<SSL_clear>(SSL *s);
|
||||
|
||||
=item [MACRO] B<SSL_clear_num_renegotiations>(ssl);
|
||||
|
||||
=item int B<SSL_connect>(SSL *s);
|
||||
|
||||
=item void B<SSL_copy_session_id>(SSL *t, SSL *f);
|
||||
|
||||
=item long B<SSL_ctrl>(SSL *s, int cmd, long larg, char *parg);
|
||||
|
||||
=item int B<SSL_do_handshake>(SSL *s);
|
||||
|
||||
=item SSL *B<SSL_dup>(SSL *s);
|
||||
|
||||
=item STACK *B<SSL_dup_CA_list>(STACK *sk);
|
||||
|
||||
=item [MACRO] B<SSL_flush_sessions>(a,b);
|
||||
|
||||
=item void B<SSL_free>(SSL *s);
|
||||
|
||||
=item SSL_CTX *B<SSL_get_SSL_CTX>(SSL *ssl);
|
||||
|
||||
=item [MACRO] B<SSL_get_app_data>(s);
|
||||
|
||||
=item X509 *B<SSL_get_certificate>(SSL *s);
|
||||
|
||||
=item [MACRO] B<SSL_get_cipher>(s);
|
||||
|
||||
=item [MACRO] B<SSL_get_cipher_bits>(s,np);
|
||||
|
||||
=item char *B<SSL_get_cipher_list>(SSL *s, int n);
|
||||
|
||||
=item [MACRO] B<SSL_get_cipher_name>(s);
|
||||
|
||||
=item [MACRO] B<SSL_get_cipher_version>(s);
|
||||
|
||||
=item STACK *B<SSL_get_ciphers>(SSL *s);
|
||||
|
||||
=item STACK *B<SSL_get_client_CA_list>(SSL *s);
|
||||
|
||||
=item SSL_CIPHER *B<SSL_get_current_cipher>(SSL *s);
|
||||
|
||||
=item long B<SSL_get_default_timeout>(SSL *s);
|
||||
|
||||
=item int B<SSL_get_error>(SSL *s, int i);
|
||||
|
||||
=item char *B<SSL_get_ex_data>(SSL *s, int idx);
|
||||
|
||||
=item int B<SSL_get_ex_data_X509_STORE_CTX_idx>(void);
|
||||
|
||||
=item int B<SSL_get_ex_new_index>(long argl, char *argp, int (*new_func);(void), int (*dup_func)(void), void (*free_func)(void))
|
||||
|
||||
=item int B<SSL_get_fd>(SSL *s);
|
||||
|
||||
=item void (*B<SSL_get_info_callback>(SSL *ssl);)(void)
|
||||
|
||||
=item STACK *B<SSL_get_peer_cert_chain>(SSL *s);
|
||||
|
||||
=item X509 *B<SSL_get_peer_certificate>(SSL *s);
|
||||
|
||||
=item EVP_PKEY *B<SSL_get_privatekey>(SSL *s);
|
||||
|
||||
=item int B<SSL_get_quiet_shutdown>(SSL *s);
|
||||
|
||||
=item BIO *B<SSL_get_rbio>(SSL *s);
|
||||
|
||||
=item int B<SSL_get_read_ahead>(SSL *s);
|
||||
|
||||
=item SSL_SESSION *B<SSL_get_session>(SSL *ssl);
|
||||
|
||||
=item char *B<SSL_get_shared_ciphers>(SSL *s, char *buf, int len);
|
||||
|
||||
=item int B<SSL_get_shutdown>(SSL *s);
|
||||
|
||||
=item SSL_METHOD *B<SSL_get_ssl_method>(SSL *s);
|
||||
|
||||
=item [MACRO] B<SSL_get_state>(a);
|
||||
|
||||
=item [MACRO] B<SSL_get_time>(a);
|
||||
|
||||
=item [MACRO] B<SSL_get_timeout>(a);
|
||||
|
||||
=item int (*B<SSL_get_verify_callback>(SSL *s);)(void)
|
||||
|
||||
=item int B<SSL_get_verify_mode>(SSL *s);
|
||||
|
||||
=item long B<SSL_get_verify_result>(SSL *ssl);
|
||||
|
||||
=item char *B<SSL_get_version>(SSL *s);
|
||||
|
||||
=item BIO *B<SSL_get_wbio>(SSL *s);
|
||||
|
||||
=item [MACRO] B<SSL_in_accept_init>(a);
|
||||
|
||||
=item [MACRO] B<SSL_in_before>(a);
|
||||
|
||||
=item [MACRO] B<SSL_in_connect_init>(a);
|
||||
|
||||
=item [MACRO] B<SSL_in_init>(a);
|
||||
|
||||
=item [MACRO] B<SSL_is_init_finished>(a);
|
||||
|
||||
=item STACK *B<SSL_load_client_CA_file>(char *file);
|
||||
|
||||
=item void B<SSL_load_error_strings>(void);
|
||||
|
||||
=item SSL *B<SSL_new>(SSL_CTX *ctx);
|
||||
|
||||
=item [MACRO] B<SSL_num_renegotiations>(ssl);
|
||||
|
||||
=item int B<SSL_peek>(SSL *s, char *buf, int num);
|
||||
|
||||
=item int B<SSL_pending>(SSL *s);
|
||||
|
||||
=item int B<SSL_read>(SSL *s, char *buf, int num);
|
||||
|
||||
=item [MACRO] B<SSL_remove_session>(a,b);
|
||||
|
||||
=item int B<SSL_renegotiate>(SSL *s);
|
||||
|
||||
=item char *B<SSL_rstate_string>(SSL *s);
|
||||
|
||||
=item char *B<SSL_rstate_string_long>(SSL *s);
|
||||
|
||||
=item [MACRO] B<SSL_session_reused>(ssl);
|
||||
|
||||
=item void B<SSL_set_accept_state>(SSL *s);
|
||||
|
||||
=item [MACRO] B<SSL_set_app_data>(s,arg);
|
||||
|
||||
=item void B<SSL_set_bio>(SSL *s, BIO *rbio, BIO *wbio);
|
||||
|
||||
=item int B<SSL_set_cipher_list>(SSL *s, char *str);
|
||||
|
||||
=item void B<SSL_set_client_CA_list>(SSL *s, STACK *list);
|
||||
|
||||
=item void B<SSL_set_connect_state>(SSL *s);
|
||||
|
||||
=item int B<SSL_set_ex_data>(SSL *s, int idx, char *arg);
|
||||
|
||||
=item int B<SSL_set_fd>(SSL *s, int fd);
|
||||
|
||||
=item void B<SSL_set_info_callback>(SSL *ssl, void (*cb);(void))
|
||||
|
||||
=item [MACRO] B<SSL_set_options>(ssl,op);
|
||||
|
||||
=item [MACRO] B<SSL_set_pref_cipher>(c,n);
|
||||
|
||||
=item void B<SSL_set_quiet_shutdown>(SSL *s, int mode);
|
||||
|
||||
=item void B<SSL_set_read_ahead>(SSL *s, int yes);
|
||||
|
||||
=item int B<SSL_set_rfd>(SSL *s, int fd);
|
||||
|
||||
=item int B<SSL_set_session>(SSL *s, SSL_SESSION *session);
|
||||
|
||||
=item void B<SSL_set_shutdown>(SSL *s, int mode);
|
||||
|
||||
=item int B<SSL_set_ssl_method>(SSL *s, SSL_METHOD *meth);
|
||||
|
||||
=item [MACRO] B<SSL_set_time>(a,b);
|
||||
|
||||
=item [MACRO] B<SSL_set_timeout>(a,b);
|
||||
|
||||
=item void B<SSL_set_verify>(SSL *s, int mode, int (*callback);(void))
|
||||
|
||||
=item void B<SSL_set_verify_result>(SSL *ssl, long arg);
|
||||
|
||||
=item int B<SSL_set_wfd>(SSL *s, int fd);
|
||||
|
||||
=item int B<SSL_shutdown>(SSL *s);
|
||||
|
||||
=item int B<SSL_state>(SSL *ssl);
|
||||
|
||||
=item char *B<SSL_state_string>(SSL *s);
|
||||
|
||||
=item char *B<SSL_state_string_long>(SSL *s);
|
||||
|
||||
=item [MACRO] B<SSL_total_renegotiations>(ssl);
|
||||
|
||||
=item int B<SSL_use_PrivateKey>(SSL *ssl, EVP_PKEY *pkey);
|
||||
|
||||
=item int B<SSL_use_PrivateKey_ASN1>(int type, SSL *ssl, unsigned char *d, long len);
|
||||
|
||||
=item int B<SSL_use_PrivateKey_file>(SSL *ssl, char *file, int type);
|
||||
|
||||
=item int B<SSL_use_RSAPrivateKey>(SSL *ssl, RSA *rsa);
|
||||
|
||||
=item int B<SSL_use_RSAPrivateKey_ASN1>(SSL *ssl, unsigned char *d, long len);
|
||||
|
||||
=item int B<SSL_use_RSAPrivateKey_file>(SSL *ssl, char *file, int type);
|
||||
|
||||
=item int B<SSL_use_certificate>(SSL *ssl, X509 *x);
|
||||
|
||||
=item int B<SSL_use_certificate_ASN1>(SSL *ssl, int len, unsigned char *d);
|
||||
|
||||
=item int B<SSL_use_certificate_file>(SSL *ssl, char *file, int type);
|
||||
|
||||
=item int B<SSL_version>(SSL *s);
|
||||
|
||||
=item [MACRO] B<SSL_want>(s);
|
||||
|
||||
=item [MACRO] B<SSL_want_nothing>(s);
|
||||
|
||||
=item [MACRO] B<SSL_want_read>(s);
|
||||
|
||||
=item [MACRO] B<SSL_want_write>(s);
|
||||
|
||||
=item [MACRO] B<SSL_want_x509_lookup>(s);
|
||||
|
||||
=item int B<SSL_write>(SSL *s, char *buf, int num);
|
||||
|
||||
=item SSL_METHOD *B<SSLv2_client_method>(void);
|
||||
|
||||
=item SSL_METHOD *B<SSLv2_method>(void);
|
||||
|
||||
=item SSL_METHOD *B<SSLv2_server_method>(void);
|
||||
|
||||
=item SSL_METHOD *B<SSLv3_client_method>(void);
|
||||
|
||||
=item SSL_METHOD *B<SSLv3_method>(void);
|
||||
|
||||
=item SSL_METHOD *B<SSLv3_server_method>(void);
|
||||
|
||||
=item SSL_METHOD *B<TLSv1_client_method>(void);
|
||||
|
||||
=item SSL_METHOD *B<TLSv1_method>(void);
|
||||
|
||||
=item SSL_METHOD *B<TLSv1_server_method>(void);
|
||||
|
||||
=back
|
||||
|
||||
=head1 SEE ALSO
|
||||
|
||||
openssl(1), crypto(3)
|
||||
|
||||
=head1 AUTHORS
|
||||
|
||||
Ralf S. Engelschall
|
||||
|
||||
=cut
|
||||
|
Loading…
Reference in New Issue
Block a user