SSL_CTX_new.pod 3.2 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394
  1. =pod
  2. =head1 NAME
  3. SSL_CTX_new - create a new SSL_CTX object as framework for TLS/SSL enabled functions
  4. =head1 SYNOPSIS
  5. #include <openssl/ssl.h>
  6. SSL_CTX *SSL_CTX_new(const SSL_METHOD *method);
  7. =head1 DESCRIPTION
  8. SSL_CTX_new() creates a new B<SSL_CTX> object as framework to establish
  9. TLS/SSL enabled connections.
  10. =head1 NOTES
  11. The SSL_CTX object uses B<method> as connection method. The methods exist
  12. in a generic type (for client and server use), a server only type, and a
  13. client only type. B<method> can be of the following types:
  14. =over 4
  15. =item SSLv2_method(void), SSLv2_server_method(void), SSLv2_client_method(void)
  16. A TLS/SSL connection established with these methods will only understand
  17. the SSLv2 protocol. A client will send out SSLv2 client hello messages
  18. and will also indicate that it only understand SSLv2. A server will only
  19. understand SSLv2 client hello messages.
  20. =item SSLv3_method(void), SSLv3_server_method(void), SSLv3_client_method(void)
  21. A TLS/SSL connection established with these methods will only understand the
  22. SSLv3 protocol. A client will send out SSLv3 client hello messages
  23. and will indicate that it only understands SSLv3. A server will only understand
  24. SSLv3 client hello messages. This especially means, that it will
  25. not understand SSLv2 client hello messages which are widely used for
  26. compatibility reasons, see SSLv23_*_method().
  27. =item TLSv1_method(void), TLSv1_server_method(void), TLSv1_client_method(void)
  28. A TLS/SSL connection established with these methods will only understand the
  29. TLSv1 protocol. A client will send out TLSv1 client hello messages
  30. and will indicate that it only understands TLSv1. A server will only understand
  31. TLSv1 client hello messages. This especially means, that it will
  32. not understand SSLv2 client hello messages which are widely used for
  33. compatibility reasons, see SSLv23_*_method(). It will also not understand
  34. SSLv3 client hello messages.
  35. =item SSLv23_method(void), SSLv23_server_method(void), SSLv23_client_method(void)
  36. A TLS/SSL connection established with these methods will understand the SSLv2,
  37. SSLv3, and TLSv1 protocol. A client will send out SSLv2 client hello messages
  38. and will indicate that it also understands SSLv3 and TLSv1. A server will
  39. understand SSLv2, SSLv3, and TLSv1 client hello messages. This is the best
  40. choice when compatibility is a concern.
  41. =back
  42. The list of protocols available can later be limited using the SSL_OP_NO_SSLv2,
  43. SSL_OP_NO_SSLv3, SSL_OP_NO_TLSv1 options of the B<SSL_CTX_set_options()> or
  44. B<SSL_set_options()> functions. Using these options it is possible to choose
  45. e.g. SSLv23_server_method() and be able to negotiate with all possible
  46. clients, but to only allow newer protocols like SSLv3 or TLSv1.
  47. SSL_CTX_new() initializes the list of ciphers, the session cache setting,
  48. the callbacks, the keys and certificates, and the options to its default
  49. values.
  50. =head1 RETURN VALUES
  51. The following return values can occur:
  52. =over 4
  53. =item NULL
  54. The creation of a new SSL_CTX object failed. Check the error stack to
  55. find out the reason.
  56. =item Pointer to an SSL_CTX object
  57. The return value points to an allocated SSL_CTX object.
  58. =back
  59. =head1 SEE ALSO
  60. L<SSL_CTX_free(3)|SSL_CTX_free(3)>, L<SSL_accept(3)|SSL_accept(3)>,
  61. L<ssl(3)|ssl(3)>, L<SSL_set_connect_state(3)|SSL_set_connect_state(3)>
  62. =cut