SSL_CTX_new.pod (72613) | SSL_CTX_new.pod (76866) |
---|---|
1=pod 2 3=head1 NAME 4 5SSL_CTX_new - create a new SSL_CTX object as framework for TLS/SSL enabled functions 6 7=head1 SYNOPSIS 8 --- 45 unchanged lines hidden (view full) --- 54A TLS/SSL connection established with these methods will understand the SSLv2, 55SSLv3, and TLSv1 protocol. A client will send out SSLv2 client hello messages 56and will indicate that it also understands SSLv3 and TLSv1. A server will 57understand SSLv2, SSLv3, and TLSv1 client hello messages. This is the best 58choice when compatibility is a concern. 59 60=back 61 | 1=pod 2 3=head1 NAME 4 5SSL_CTX_new - create a new SSL_CTX object as framework for TLS/SSL enabled functions 6 7=head1 SYNOPSIS 8 --- 45 unchanged lines hidden (view full) --- 54A TLS/SSL connection established with these methods will understand the SSLv2, 55SSLv3, and TLSv1 protocol. A client will send out SSLv2 client hello messages 56and will indicate that it also understands SSLv3 and TLSv1. A server will 57understand SSLv2, SSLv3, and TLSv1 client hello messages. This is the best 58choice when compatibility is a concern. 59 60=back 61 |
62If a generic method is used, it is necessary to explicitly set client or 63server mode with L<SSL_set_connect_state(3)|SSL_set_connect_state(3)> 64or SSL_set_accept_state(). 65 |
|
62The list of protocols available can later be limited using the SSL_OP_NO_SSLv2, 63SSL_OP_NO_SSLv3, SSL_OP_NO_TLSv1 options of the B<SSL_CTX_set_options()> or 64B<SSL_set_options()> functions. Using these options it is possible to choose 65e.g. SSLv23_server_method() and be able to negotiate with all possible 66clients, but to only allow newer protocols like SSLv3 or TLSv1. 67 68SSL_CTX_new() initializes the list of ciphers, the session cache setting, 69the callbacks, the keys and certificates, and the options to its default --- 14 unchanged lines hidden (view full) --- 84 85The return value points to an allocated SSL_CTX object. 86 87=back 88 89=head1 SEE ALSO 90 91L<SSL_CTX_free(3)|SSL_CTX_free(3)>, L<SSL_accept(3)|SSL_accept(3)>, | 66The list of protocols available can later be limited using the SSL_OP_NO_SSLv2, 67SSL_OP_NO_SSLv3, SSL_OP_NO_TLSv1 options of the B<SSL_CTX_set_options()> or 68B<SSL_set_options()> functions. Using these options it is possible to choose 69e.g. SSLv23_server_method() and be able to negotiate with all possible 70clients, but to only allow newer protocols like SSLv3 or TLSv1. 71 72SSL_CTX_new() initializes the list of ciphers, the session cache setting, 73the callbacks, the keys and certificates, and the options to its default --- 14 unchanged lines hidden (view full) --- 88 89The return value points to an allocated SSL_CTX object. 90 91=back 92 93=head1 SEE ALSO 94 95L<SSL_CTX_free(3)|SSL_CTX_free(3)>, L<SSL_accept(3)|SSL_accept(3)>, |
92L | 96L<ssl(3)|ssl(3)>, L<SSL_set_connect_state(3)|SSL_set_connect_state(3)> |
93 94=cut | 97 98=cut |