Deleted Added
full compact
SSL_CTX_new.pod (72613) SSL_CTX_new.pod (76866)
1=pod
2
3=head1 NAME
4
5SSL_CTX_new - create a new SSL_CTX object as framework for TLS/SSL enabled functions
6
7=head1 SYNOPSIS
8

--- 45 unchanged lines hidden (view full) ---

54A TLS/SSL connection established with these methods will understand the SSLv2,
55SSLv3, and TLSv1 protocol. A client will send out SSLv2 client hello messages
56and will indicate that it also understands SSLv3 and TLSv1. A server will
57understand SSLv2, SSLv3, and TLSv1 client hello messages. This is the best
58choice when compatibility is a concern.
59
60=back
61
1=pod
2
3=head1 NAME
4
5SSL_CTX_new - create a new SSL_CTX object as framework for TLS/SSL enabled functions
6
7=head1 SYNOPSIS
8

--- 45 unchanged lines hidden (view full) ---

54A TLS/SSL connection established with these methods will understand the SSLv2,
55SSLv3, and TLSv1 protocol. A client will send out SSLv2 client hello messages
56and will indicate that it also understands SSLv3 and TLSv1. A server will
57understand SSLv2, SSLv3, and TLSv1 client hello messages. This is the best
58choice when compatibility is a concern.
59
60=back
61
62If a generic method is used, it is necessary to explicitly set client or
63server mode with L<SSL_set_connect_state(3)|SSL_set_connect_state(3)>
64or SSL_set_accept_state().
65
62The list of protocols available can later be limited using the SSL_OP_NO_SSLv2,
63SSL_OP_NO_SSLv3, SSL_OP_NO_TLSv1 options of the B<SSL_CTX_set_options()> or
64B<SSL_set_options()> functions. Using these options it is possible to choose
65e.g. SSLv23_server_method() and be able to negotiate with all possible
66clients, but to only allow newer protocols like SSLv3 or TLSv1.
67
68SSL_CTX_new() initializes the list of ciphers, the session cache setting,
69the callbacks, the keys and certificates, and the options to its default

--- 14 unchanged lines hidden (view full) ---

84
85The return value points to an allocated SSL_CTX object.
86
87=back
88
89=head1 SEE ALSO
90
91L<SSL_CTX_free(3)|SSL_CTX_free(3)>, L<SSL_accept(3)|SSL_accept(3)>,
66The list of protocols available can later be limited using the SSL_OP_NO_SSLv2,
67SSL_OP_NO_SSLv3, SSL_OP_NO_TLSv1 options of the B<SSL_CTX_set_options()> or
68B<SSL_set_options()> functions. Using these options it is possible to choose
69e.g. SSLv23_server_method() and be able to negotiate with all possible
70clients, but to only allow newer protocols like SSLv3 or TLSv1.
71
72SSL_CTX_new() initializes the list of ciphers, the session cache setting,
73the callbacks, the keys and certificates, and the options to its default

--- 14 unchanged lines hidden (view full) ---

88
89The return value points to an allocated SSL_CTX object.
90
91=back
92
93=head1 SEE ALSO
94
95L<SSL_CTX_free(3)|SSL_CTX_free(3)>, L<SSL_accept(3)|SSL_accept(3)>,
92L
96L<ssl(3)|ssl(3)>, L<SSL_set_connect_state(3)|SSL_set_connect_state(3)>
93
94=cut
97
98=cut