diff options
Diffstat (limited to 'src/lib/libssl/src/doc')
21 files changed, 583 insertions, 30 deletions
diff --git a/src/lib/libssl/src/doc/apps/config.pod b/src/lib/libssl/src/doc/apps/config.pod index ce874a42ce..8f823fa6d6 100644 --- a/src/lib/libssl/src/doc/apps/config.pod +++ b/src/lib/libssl/src/doc/apps/config.pod | |||
@@ -10,7 +10,8 @@ config - OpenSSL CONF library configuration files | |||
10 | The OpenSSL CONF library can be used to read configuration files. | 10 | The OpenSSL CONF library can be used to read configuration files. |
11 | It is used for the OpenSSL master configuration file B<openssl.cnf> | 11 | It is used for the OpenSSL master configuration file B<openssl.cnf> |
12 | and in a few other places like B<SPKAC> files and certificate extension | 12 | and in a few other places like B<SPKAC> files and certificate extension |
13 | files for the B<x509> utility. | 13 | files for the B<x509> utility. OpenSSL applications can also use the |
14 | CONF library for their own purposes. | ||
14 | 15 | ||
15 | A configuration file is divided into a number of sections. Each section | 16 | A configuration file is divided into a number of sections. Each section |
16 | starts with a line B<[ section_name ]> and ends when a new section is | 17 | starts with a line B<[ section_name ]> and ends when a new section is |
@@ -51,13 +52,146 @@ or the B<\> character. By making the last character of a line a B<\> | |||
51 | a B<value> string can be spread across multiple lines. In addition | 52 | a B<value> string can be spread across multiple lines. In addition |
52 | the sequences B<\n>, B<\r>, B<\b> and B<\t> are recognized. | 53 | the sequences B<\n>, B<\r>, B<\b> and B<\t> are recognized. |
53 | 54 | ||
55 | =head1 OPENSSL LIBRARY CONFIGURATION | ||
56 | |||
57 | In OpenSSL 0.9.7 and later applications can automatically configure certain | ||
58 | aspects of OpenSSL using the master OpenSSL configuration file, or optionally | ||
59 | an alternative configuration file. The B<openssl> utility includes this | ||
60 | functionality: any sub command uses the master OpenSSL configuration file | ||
61 | unless an option is used in the sub command to use an alternative configuration | ||
62 | file. | ||
63 | |||
64 | To enable library configuration the default section needs to contain an | ||
65 | appropriate line which points to the main configuration section. The default | ||
66 | name is B<openssl_conf> which is used by the B<openssl> utility. Other | ||
67 | applications may use an alternative name such as B<myapplicaton_conf>. | ||
68 | |||
69 | The configuration section should consist of a set of name value pairs which | ||
70 | contain specific module configuration information. The B<name> represents | ||
71 | the name of the I<configuration module> the meaning of the B<value> is | ||
72 | module specific: it may, for example, represent a further configuration | ||
73 | section containing configuration module specific information. E.g. | ||
74 | |||
75 | openssl_conf = openssl_init | ||
76 | |||
77 | [openssl_init] | ||
78 | |||
79 | oid_section = new_oids | ||
80 | engines = engine_section | ||
81 | |||
82 | [new_oids] | ||
83 | |||
84 | ... new oids here ... | ||
85 | |||
86 | [engine_section] | ||
87 | |||
88 | ... engine stuff here ... | ||
89 | |||
90 | Currently there are two configuration modules. One for ASN1 objects another | ||
91 | for ENGINE configuration. | ||
92 | |||
93 | =head2 ASN1 OBJECT CONFIGURATION MODULE | ||
94 | |||
95 | This module has the name B<oid_section>. The value of this variable points | ||
96 | to a section containing name value pairs of OIDs: the name is the OID short | ||
97 | and long name, the value is the numerical form of the OID. Although some of | ||
98 | the B<openssl> utility sub commands already have their own ASN1 OBJECT section | ||
99 | functionality not all do. By using the ASN1 OBJECT configuration module | ||
100 | B<all> the B<openssl> utility sub commands can see the new objects as well | ||
101 | as any compliant applications. For example: | ||
102 | |||
103 | [new_oids] | ||
104 | |||
105 | some_new_oid = 1.2.3.4 | ||
106 | some_other_oid = 1.2.3.5 | ||
107 | |||
108 | =head2 ENGINE CONFIGURATION MODULE | ||
109 | |||
110 | This ENGINE configuration module has the name B<engines>. The value of this | ||
111 | variable points to a section containing further ENGINE configuration | ||
112 | information. | ||
113 | |||
114 | The section pointed to by B<engines> is a table of engine names (though see | ||
115 | B<engine_id> below) and further sections containing configuration informations | ||
116 | specific to each ENGINE. | ||
117 | |||
118 | Each ENGINE specific section is used to set default algorithms, load | ||
119 | dynamic, perform initialization and send ctrls. The actual operation performed | ||
120 | depends on the I<command> name which is the name of the name value pair. The | ||
121 | currently supported commands are listed below. | ||
122 | |||
123 | For example: | ||
124 | |||
125 | [engine_section] | ||
126 | |||
127 | # Configure ENGINE named "foo" | ||
128 | foo = foo_section | ||
129 | # Configure ENGINE named "bar" | ||
130 | bar = bar_section | ||
131 | |||
132 | [foo_section] | ||
133 | ... foo ENGINE specific commands ... | ||
134 | |||
135 | [bar_section] | ||
136 | ... "bar" ENGINE specific commands ... | ||
137 | |||
138 | The command B<engine_id> is used to give the ENGINE name. If used this | ||
139 | command must be first. For example: | ||
140 | |||
141 | [engine_section] | ||
142 | # This would normally handle an ENGINE named "foo" | ||
143 | foo = foo_section | ||
144 | |||
145 | [foo_section] | ||
146 | # Override default name and use "myfoo" instead. | ||
147 | engine_id = myfoo | ||
148 | |||
149 | The command B<dynamic_path> loads and adds an ENGINE from the given path. It | ||
150 | is equivalent to sending the ctrls B<SO_PATH> with the path argument followed | ||
151 | by B<LIST_ADD> with value 2 and B<LOAD> to the dynamic ENGINE. If this is | ||
152 | not the required behaviour then alternative ctrls can be sent directly | ||
153 | to the dynamic ENGINE using ctrl commands. | ||
154 | |||
155 | The command B<init> determines whether to initialize the ENGINE. If the value | ||
156 | is B<0> the ENGINE will not be initialized, if B<1> and attempt it made to | ||
157 | initialized the ENGINE immediately. If the B<init> command is not present | ||
158 | then an attempt will be made to initialize the ENGINE after all commands in | ||
159 | its section have been processed. | ||
160 | |||
161 | The command B<default_algorithms> sets the default algorithms an ENGINE will | ||
162 | supply using the functions B<ENGINE_set_default_string()> | ||
163 | |||
164 | If the name matches none of the above command names it is assumed to be a | ||
165 | ctrl command which is sent to the ENGINE. The value of the command is the | ||
166 | argument to the ctrl command. If the value is the string B<EMPTY> then no | ||
167 | value is sent to the command. | ||
168 | |||
169 | For example: | ||
170 | |||
171 | |||
172 | [engine_section] | ||
173 | |||
174 | # Configure ENGINE named "foo" | ||
175 | foo = foo_section | ||
176 | |||
177 | [foo_section] | ||
178 | # Load engine from DSO | ||
179 | dynamic_path = /some/path/fooengine.so | ||
180 | # A foo specific ctrl. | ||
181 | some_ctrl = some_value | ||
182 | # Another ctrl that doesn't take a value. | ||
183 | other_ctrl = EMPTY | ||
184 | # Supply all default algorithms | ||
185 | default_algorithms = ALL | ||
186 | |||
54 | =head1 NOTES | 187 | =head1 NOTES |
55 | 188 | ||
56 | If a configuration file attempts to expand a variable that doesn't exist | 189 | If a configuration file attempts to expand a variable that doesn't exist |
57 | then an error is flagged and the file will not load. This can happen | 190 | then an error is flagged and the file will not load. This can happen |
58 | if an attempt is made to expand an environment variable that doesn't | 191 | if an attempt is made to expand an environment variable that doesn't |
59 | exist. For example the default OpenSSL master configuration file used | 192 | exist. For example in a previous version of OpenSSL the default OpenSSL |
60 | the value of B<HOME> which may not be defined on non Unix systems. | 193 | master configuration file used the value of B<HOME> which may not be |
194 | defined on non Unix systems and would cause an error. | ||
61 | 195 | ||
62 | This can be worked around by including a B<default> section to provide | 196 | This can be worked around by including a B<default> section to provide |
63 | a default value: then if the environment lookup fails the default value | 197 | a default value: then if the environment lookup fails the default value |
diff --git a/src/lib/libssl/src/doc/apps/openssl.pod b/src/lib/libssl/src/doc/apps/openssl.pod index 07dd80eabe..dc0f49ddca 100644 --- a/src/lib/libssl/src/doc/apps/openssl.pod +++ b/src/lib/libssl/src/doc/apps/openssl.pod | |||
@@ -329,7 +329,8 @@ L<passwd(1)|passwd(1)>, | |||
329 | L<pkcs12(1)|pkcs12(1)>, L<pkcs7(1)|pkcs7(1)>, L<pkcs8(1)|pkcs8(1)>, | 329 | L<pkcs12(1)|pkcs12(1)>, L<pkcs7(1)|pkcs7(1)>, L<pkcs8(1)|pkcs8(1)>, |
330 | L<rand(1)|rand(1)>, L<req(1)|req(1)>, L<rsa(1)|rsa(1)>, | 330 | L<rand(1)|rand(1)>, L<req(1)|req(1)>, L<rsa(1)|rsa(1)>, |
331 | L<rsautl(1)|rsautl(1)>, L<s_client(1)|s_client(1)>, | 331 | L<rsautl(1)|rsautl(1)>, L<s_client(1)|s_client(1)>, |
332 | L<s_server(1)|s_server(1)>, L<smime(1)|smime(1)>, L<spkac(1)|spkac(1)>, | 332 | L<s_server(1)|s_server(1)>, L<s_time(1)|s_time(1)>, |
333 | L<smime(1)|smime(1)>, L<spkac(1)|spkac(1)>, | ||
333 | L<verify(1)|verify(1)>, L<version(1)|version(1)>, L<x509(1)|x509(1)>, | 334 | L<verify(1)|verify(1)>, L<version(1)|version(1)>, L<x509(1)|x509(1)>, |
334 | L<crypto(3)|crypto(3)>, L<ssl(3)|ssl(3)> | 335 | L<crypto(3)|crypto(3)>, L<ssl(3)|ssl(3)> |
335 | 336 | ||
diff --git a/src/lib/libssl/src/doc/apps/s_client.pod b/src/lib/libssl/src/doc/apps/s_client.pod index d061326c1f..8d19079973 100644 --- a/src/lib/libssl/src/doc/apps/s_client.pod +++ b/src/lib/libssl/src/doc/apps/s_client.pod | |||
@@ -8,7 +8,7 @@ s_client - SSL/TLS client program | |||
8 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
9 | 9 | ||
10 | B<openssl> B<s_client> | 10 | B<openssl> B<s_client> |
11 | [B<-connect> host:port>] | 11 | [B<-connect host:port>] |
12 | [B<-verify depth>] | 12 | [B<-verify depth>] |
13 | [B<-cert filename>] | 13 | [B<-cert filename>] |
14 | [B<-key filename>] | 14 | [B<-key filename>] |
@@ -208,7 +208,7 @@ then an HTTP command can be given such as "GET /" to retrieve a web page. | |||
208 | 208 | ||
209 | If the handshake fails then there are several possible causes, if it is | 209 | If the handshake fails then there are several possible causes, if it is |
210 | nothing obvious like no client certificate then the B<-bugs>, B<-ssl2>, | 210 | nothing obvious like no client certificate then the B<-bugs>, B<-ssl2>, |
211 | B<-ssl3>, B<-tls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1> can be tried | 211 | B<-ssl3>, B<-tls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1> options can be tried |
212 | in case it is a buggy server. In particular you should play with these | 212 | in case it is a buggy server. In particular you should play with these |
213 | options B<before> submitting a bug report to an OpenSSL mailing list. | 213 | options B<before> submitting a bug report to an OpenSSL mailing list. |
214 | 214 | ||
@@ -219,7 +219,7 @@ the clients certificate authority in its "acceptable CA list" when it | |||
219 | requests a certificate. By using B<s_client> the CA list can be viewed | 219 | requests a certificate. By using B<s_client> the CA list can be viewed |
220 | and checked. However some servers only request client authentication | 220 | and checked. However some servers only request client authentication |
221 | after a specific URL is requested. To obtain the list in this case it | 221 | after a specific URL is requested. To obtain the list in this case it |
222 | is necessary to use the B<-prexit> command and send an HTTP request | 222 | is necessary to use the B<-prexit> option and send an HTTP request |
223 | for an appropriate page. | 223 | for an appropriate page. |
224 | 224 | ||
225 | If a certificate is specified on the command line using the B<-cert> | 225 | If a certificate is specified on the command line using the B<-cert> |
diff --git a/src/lib/libssl/src/doc/apps/s_time.pod b/src/lib/libssl/src/doc/apps/s_time.pod new file mode 100644 index 0000000000..5a38aa2e03 --- /dev/null +++ b/src/lib/libssl/src/doc/apps/s_time.pod | |||
@@ -0,0 +1,173 @@ | |||
1 | |||
2 | =pod | ||
3 | |||
4 | =head1 NAME | ||
5 | |||
6 | s_time - SSL/TLS performance timing program | ||
7 | |||
8 | =head1 SYNOPSIS | ||
9 | |||
10 | B<openssl> B<s_time> | ||
11 | [B<-connect host:port>] | ||
12 | [B<-www page>] | ||
13 | [B<-cert filename>] | ||
14 | [B<-key filename>] | ||
15 | [B<-CApath directory>] | ||
16 | [B<-CAfile filename>] | ||
17 | [B<-reuse>] | ||
18 | [B<-new>] | ||
19 | [B<-verify depth>] | ||
20 | [B<-nbio>] | ||
21 | [B<-time seconds>] | ||
22 | [B<-ssl2>] | ||
23 | [B<-ssl3>] | ||
24 | [B<-bugs>] | ||
25 | [B<-cipher cipherlist>] | ||
26 | |||
27 | =head1 DESCRIPTION | ||
28 | |||
29 | The B<s_client> command implements a generic SSL/TLS client which connects to a | ||
30 | remote host using SSL/TLS. It can request a page from the server and includes | ||
31 | the time to transfer the payload data in its timing measurements. It measures | ||
32 | the number of connections within a given timeframe, the amount of data | ||
33 | transferred (if any), and calculates the average time spent for one connection. | ||
34 | |||
35 | =head1 OPTIONS | ||
36 | |||
37 | =over 4 | ||
38 | |||
39 | =item B<-connect host:port> | ||
40 | |||
41 | This specifies the host and optional port to connect to. | ||
42 | |||
43 | =item B<-www page> | ||
44 | |||
45 | This specifies the page to GET from the server. A value of '/' gets the | ||
46 | index.htm[l] page. If this parameter is not specified, then B<s_time> will only | ||
47 | perform the handshake to establish SSL connections but not transfer any | ||
48 | payload data. | ||
49 | |||
50 | =item B<-cert certname> | ||
51 | |||
52 | The certificate to use, if one is requested by the server. The default is | ||
53 | not to use a certificate. The file is in PEM format. | ||
54 | |||
55 | =item B<-key keyfile> | ||
56 | |||
57 | The private key to use. If not specified then the certificate file will | ||
58 | be used. The file is in PEM format. | ||
59 | |||
60 | =item B<-verify depth> | ||
61 | |||
62 | The verify depth to use. This specifies the maximum length of the | ||
63 | server certificate chain and turns on server certificate verification. | ||
64 | Currently the verify operation continues after errors so all the problems | ||
65 | with a certificate chain can be seen. As a side effect the connection | ||
66 | will never fail due to a server certificate verify failure. | ||
67 | |||
68 | =item B<-CApath directory> | ||
69 | |||
70 | The directory to use for server certificate verification. This directory | ||
71 | must be in "hash format", see B<verify> for more information. These are | ||
72 | also used when building the client certificate chain. | ||
73 | |||
74 | =item B<-CAfile file> | ||
75 | |||
76 | A file containing trusted certificates to use during server authentication | ||
77 | and to use when attempting to build the client certificate chain. | ||
78 | |||
79 | =item B<-new> | ||
80 | |||
81 | performs the timing test using a new session ID for each connection. | ||
82 | If neither B<-new> nor B<-reuse> are specified, they are both on by default | ||
83 | and executed in sequence. | ||
84 | |||
85 | =item B<-reuse> | ||
86 | |||
87 | performs the timing test using the same session ID; this can be used as a test | ||
88 | that session caching is working. If neither B<-new> nor B<-reuse> are | ||
89 | specified, they are both on by default and executed in sequence. | ||
90 | |||
91 | =item B<-nbio> | ||
92 | |||
93 | turns on non-blocking I/O. | ||
94 | |||
95 | =item B<-ssl2>, B<-ssl3> | ||
96 | |||
97 | these options disable the use of certain SSL or TLS protocols. By default | ||
98 | the initial handshake uses a method which should be compatible with all | ||
99 | servers and permit them to use SSL v3, SSL v2 or TLS as appropriate. | ||
100 | The timing program is not as rich in options to turn protocols on and off as | ||
101 | the L<s_client(1)|s_client(1)> program and may not connect to all servers. | ||
102 | |||
103 | Unfortunately there are a lot of ancient and broken servers in use which | ||
104 | cannot handle this technique and will fail to connect. Some servers only | ||
105 | work if TLS is turned off with the B<-ssl3> option; others | ||
106 | will only support SSL v2 and may need the B<-ssl2> option. | ||
107 | |||
108 | =item B<-bugs> | ||
109 | |||
110 | there are several known bug in SSL and TLS implementations. Adding this | ||
111 | option enables various workarounds. | ||
112 | |||
113 | =item B<-cipher cipherlist> | ||
114 | |||
115 | this allows the cipher list sent by the client to be modified. Although | ||
116 | the server determines which cipher suite is used it should take the first | ||
117 | supported cipher in the list sent by the client. | ||
118 | See the L<ciphers(1)|ciphers(1)> command for more information. | ||
119 | |||
120 | =item B<-time length> | ||
121 | |||
122 | specifies how long (in seconds) B<s_time> should establish connections and | ||
123 | optionally transfer payload data from a server. Server and client performance | ||
124 | and the link speed determine how many connections B<s_time> can establish. | ||
125 | |||
126 | =back | ||
127 | |||
128 | =head1 NOTES | ||
129 | |||
130 | B<s_client> can be used to measure the performance of an SSL connection. | ||
131 | To connect to an SSL HTTP server and get the default page the command | ||
132 | |||
133 | openssl s_time -connect servername:443 -www / -CApath yourdir -CAfile yourfile.pem -cipher commoncipher [-ssl3] | ||
134 | |||
135 | would typically be used (https uses port 443). 'commoncipher' is a cipher to | ||
136 | which both client and server can agree, see the L<ciphers(1)|ciphers(1)> command | ||
137 | for details. | ||
138 | |||
139 | If the handshake fails then there are several possible causes, if it is | ||
140 | nothing obvious like no client certificate then the B<-bugs>, B<-ssl2>, | ||
141 | B<-ssl3> options can be tried | ||
142 | in case it is a buggy server. In particular you should play with these | ||
143 | options B<before> submitting a bug report to an OpenSSL mailing list. | ||
144 | |||
145 | A frequent problem when attempting to get client certificates working | ||
146 | is that a web client complains it has no certificates or gives an empty | ||
147 | list to choose from. This is normally because the server is not sending | ||
148 | the clients certificate authority in its "acceptable CA list" when it | ||
149 | requests a certificate. By using L<s_client(1)|s_client(1)> the CA list can be | ||
150 | viewed and checked. However some servers only request client authentication | ||
151 | after a specific URL is requested. To obtain the list in this case it | ||
152 | is necessary to use the B<-prexit> option of L<s_client(1)|s_client(1)> and | ||
153 | send an HTTP request for an appropriate page. | ||
154 | |||
155 | If a certificate is specified on the command line using the B<-cert> | ||
156 | option it will not be used unless the server specifically requests | ||
157 | a client certificate. Therefor merely including a client certificate | ||
158 | on the command line is no guarantee that the certificate works. | ||
159 | |||
160 | =head1 BUGS | ||
161 | |||
162 | Because this program does not have all the options of the | ||
163 | L<s_client(1)|s_client(1)> program to turn protocols on and off, you may not be | ||
164 | able to measure the performance of all protocols with all servers. | ||
165 | |||
166 | The B<-verify> option should really exit if the server verification | ||
167 | fails. | ||
168 | |||
169 | =head1 SEE ALSO | ||
170 | |||
171 | L<s_client(1)|s_client(1)>, L<s_server(1)|s_server(1)>, L<ciphers(1)|ciphers(1)> | ||
172 | |||
173 | =cut | ||
diff --git a/src/lib/libssl/src/doc/apps/smime.pod b/src/lib/libssl/src/doc/apps/smime.pod index 2453dd2738..84b673f791 100644 --- a/src/lib/libssl/src/doc/apps/smime.pod +++ b/src/lib/libssl/src/doc/apps/smime.pod | |||
@@ -17,6 +17,9 @@ B<openssl> B<smime> | |||
17 | [B<-rc2-40>] | 17 | [B<-rc2-40>] |
18 | [B<-rc2-64>] | 18 | [B<-rc2-64>] |
19 | [B<-rc2-128>] | 19 | [B<-rc2-128>] |
20 | [B<-aes128>] | ||
21 | [B<-aes192>] | ||
22 | [B<-aes256>] | ||
20 | [B<-in file>] | 23 | [B<-in file>] |
21 | [B<-certfile file>] | 24 | [B<-certfile file>] |
22 | [B<-signer file>] | 25 | [B<-signer file>] |
@@ -126,11 +129,11 @@ B<-verify>. This directory must be a standard certificate directory: that | |||
126 | is a hash of each subject name (using B<x509 -hash>) should be linked | 129 | is a hash of each subject name (using B<x509 -hash>) should be linked |
127 | to each certificate. | 130 | to each certificate. |
128 | 131 | ||
129 | =item B<-des -des3 -rc2-40 -rc2-64 -rc2-128> | 132 | =item B<-des -des3 -rc2-40 -rc2-64 -rc2-128 -aes128 -aes192 -aes256> |
130 | 133 | ||
131 | the encryption algorithm to use. DES (56 bits), triple DES (168 bits) | 134 | the encryption algorithm to use. DES (56 bits), triple DES (168 bits), |
132 | or 40, 64 or 128 bit RC2 respectively if not specified 40 bit RC2 is | 135 | 40, 64 or 128 bit RC2 or 128, 192 or 256 bit AES respectively. If not |
133 | used. Only used with B<-encrypt>. | 136 | specified 40 bit RC2 is used. Only used with B<-encrypt>. |
134 | 137 | ||
135 | =item B<-nointern> | 138 | =item B<-nointern> |
136 | 139 | ||
diff --git a/src/lib/libssl/src/doc/crypto/BIO_f_ssl.pod b/src/lib/libssl/src/doc/crypto/BIO_f_ssl.pod index a56ee2b92f..f0b731731f 100644 --- a/src/lib/libssl/src/doc/crypto/BIO_f_ssl.pod +++ b/src/lib/libssl/src/doc/crypto/BIO_f_ssl.pod | |||
@@ -287,8 +287,8 @@ a client and also echoes the request to standard output. | |||
287 | return 0; | 287 | return 0; |
288 | } | 288 | } |
289 | 289 | ||
290 | BIO_puts(sbio, "HTTP/1.0 200 OK\r\nContent-type: text/html\r\n\r\n"); | 290 | BIO_puts(sbio, "HTTP/1.0 200 OK\r\nContent-type: text/plain\r\n\r\n"); |
291 | BIO_puts(sbio, "<pre>\r\nConnection Established\r\nRequest headers:\r\n"); | 291 | BIO_puts(sbio, "\r\nConnection Established\r\nRequest headers:\r\n"); |
292 | BIO_puts(sbio, "--------------------------------------------------\r\n"); | 292 | BIO_puts(sbio, "--------------------------------------------------\r\n"); |
293 | 293 | ||
294 | for(;;) { | 294 | for(;;) { |
@@ -301,7 +301,7 @@ a client and also echoes the request to standard output. | |||
301 | } | 301 | } |
302 | 302 | ||
303 | BIO_puts(sbio, "--------------------------------------------------\r\n"); | 303 | BIO_puts(sbio, "--------------------------------------------------\r\n"); |
304 | BIO_puts(sbio, "</pre>\r\n"); | 304 | BIO_puts(sbio, "\r\n"); |
305 | 305 | ||
306 | /* Since there is a buffering BIO present we had better flush it */ | 306 | /* Since there is a buffering BIO present we had better flush it */ |
307 | BIO_flush(sbio); | 307 | BIO_flush(sbio); |
diff --git a/src/lib/libssl/src/doc/crypto/CONF_modules_free.pod b/src/lib/libssl/src/doc/crypto/CONF_modules_free.pod new file mode 100644 index 0000000000..af8ae6a5c9 --- /dev/null +++ b/src/lib/libssl/src/doc/crypto/CONF_modules_free.pod | |||
@@ -0,0 +1,47 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | CONF_modules_free, CONF_modules_load, CONF_modules_unload - | ||
6 | OpenSSL configuration cleanup functions | ||
7 | |||
8 | =head1 SYNOPSIS | ||
9 | |||
10 | #include <openssl/conf.h> | ||
11 | |||
12 | void CONF_modules_free(void); | ||
13 | void CONF_modules_unload(int all); | ||
14 | void CONF_modules_finish(void); | ||
15 | |||
16 | =head1 DESCRIPTION | ||
17 | |||
18 | CONF_modules_free() closes down and frees up all memory allocated by all | ||
19 | configuration modules. | ||
20 | |||
21 | CONF_modules_finish() calls each configuration modules B<finish> handler | ||
22 | to free up any configuration that module may have performed. | ||
23 | |||
24 | CONF_modules_unload() finishes and unloads configuration modules. If | ||
25 | B<all> is set to B<0> only modules loaded from DSOs will be unloads. If | ||
26 | B<all> is B<1> all modules, including builtin modules will be unloaded. | ||
27 | |||
28 | =head1 NOTES | ||
29 | |||
30 | Normally applications will only call CONF_modules_free() at application to | ||
31 | tidy up any configuration performed. | ||
32 | |||
33 | =head1 RETURN VALUE | ||
34 | |||
35 | None of the functions return a value. | ||
36 | |||
37 | =head1 SEE ALSO | ||
38 | |||
39 | L<conf(5)|conf(5)>, L<OPENSSL_config(3)|OPENSSL_config(3)>, | ||
40 | L<CONF_modules_load_file(3), CONF_modules_load_file(3)> | ||
41 | |||
42 | =head1 HISTORY | ||
43 | |||
44 | CONF_modules_free(), CONF_modules_unload(), and CONF_modules_finish() | ||
45 | first appeared in OpenSSL 0.9.7. | ||
46 | |||
47 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/CONF_modules_load_file.pod b/src/lib/libssl/src/doc/crypto/CONF_modules_load_file.pod new file mode 100644 index 0000000000..9965d69bf2 --- /dev/null +++ b/src/lib/libssl/src/doc/crypto/CONF_modules_load_file.pod | |||
@@ -0,0 +1,60 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | CONF_modules_load_file, CONF_modules_load - OpenSSL configuration functions | ||
6 | |||
7 | =head1 SYNOPSIS | ||
8 | |||
9 | #include <openssl/conf.h> | ||
10 | |||
11 | int CONF_modules_load_file(const char *filename, const char *appname, | ||
12 | unsigned long flags); | ||
13 | int CONF_modules_load(const CONF *cnf, const char *appname, | ||
14 | unsigned long flags); | ||
15 | |||
16 | =head1 DESCRIPTION | ||
17 | |||
18 | The function CONF_modules_load_file() configures OpenSSL using file | ||
19 | B<filename> and application name B<appname>. If B<filename> is NULL | ||
20 | the standard OpenSSL configuration file is used. If B<appname> is | ||
21 | NULL the standard OpenSSL application name B<openssl_conf> is used. | ||
22 | The behaviour can be cutomized using B<flags>. | ||
23 | |||
24 | CONF_modules_load() is idential to CONF_modules_load_file() except it | ||
25 | read configuration information from B<cnf>. | ||
26 | |||
27 | =head1 NOTES | ||
28 | |||
29 | The following B<flags> are currently recognized: | ||
30 | |||
31 | B<CONF_MFLAGS_IGNORE_ERRORS> if set errors returned by individual | ||
32 | configuration modules are ignored. If not set the first module error is | ||
33 | considered fatal and no further modules are loads. | ||
34 | |||
35 | Normally any modules errors will add error information to the error queue. If | ||
36 | B<CONF_MFLAGS_SILENT> is set no error information is added. | ||
37 | |||
38 | If B<CONF_MFLAGS_NO_DSO> is set configuration module loading from DSOs is | ||
39 | disabled. | ||
40 | |||
41 | B<CONF_MFLAGS_IGNORE_MISSING_FILE> if set will make CONF_load_modules_file() | ||
42 | ignore missing configuration files. Normally a missing configuration file | ||
43 | return an error. | ||
44 | |||
45 | =head1 RETURN VALUE | ||
46 | |||
47 | These functions return 1 for success and a zero or negative value for | ||
48 | failure. If module errors are not ignored the return code will reflect the | ||
49 | return value of the failing module (this will always be zero or negative). | ||
50 | |||
51 | =head1 SEE ALSO | ||
52 | |||
53 | L<conf(5)|conf(5)>, L<OPENSSL_config(3)|OPENSSL_config(3)>, | ||
54 | L<CONF_free(3), CONF_free(3)>, L<err(3),err(3)> | ||
55 | |||
56 | =head1 HISTORY | ||
57 | |||
58 | CONF_modules_load_file and CONF_modules_load first appeared in OpenSSL 0.9.7. | ||
59 | |||
60 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod b/src/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod index 5ce4add082..016381f3e9 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod | |||
@@ -2,7 +2,7 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | EVP_BytesToKey - password based encryption routine | 5 | EVP_BytesToKey - password based encryption routine |
6 | 6 | ||
7 | =head1 SYNOPSIS | 7 | =head1 SYNOPSIS |
8 | 8 | ||
diff --git a/src/lib/libssl/src/doc/crypto/EVP_DigestInit.pod b/src/lib/libssl/src/doc/crypto/EVP_DigestInit.pod index 5901c39526..1cb315e739 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_DigestInit.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_DigestInit.pod | |||
@@ -4,7 +4,7 @@ | |||
4 | 4 | ||
5 | EVP_MD_CTX_init, EVP_MD_CTX_create, EVP_DigestInit_ex, EVP_DigestUpdate, | 5 | EVP_MD_CTX_init, EVP_MD_CTX_create, EVP_DigestInit_ex, EVP_DigestUpdate, |
6 | EVP_DigestFinal_ex, EVP_MD_CTX_cleanup, EVP_MD_CTX_destroy, EVP_MAX_MD_SIZE, | 6 | EVP_DigestFinal_ex, EVP_MD_CTX_cleanup, EVP_MD_CTX_destroy, EVP_MAX_MD_SIZE, |
7 | EVP_MD_CTX_copy_ex EVP_MD_CTX_copy, EVP_MD_type, EVP_MD_pkey_type, EVP_MD_size, | 7 | EVP_MD_CTX_copy_ex, EVP_MD_CTX_copy, EVP_MD_type, EVP_MD_pkey_type, EVP_MD_size, |
8 | EVP_MD_block_size, EVP_MD_CTX_md, EVP_MD_CTX_size, EVP_MD_CTX_block_size, EVP_MD_CTX_type, | 8 | EVP_MD_block_size, EVP_MD_CTX_md, EVP_MD_CTX_size, EVP_MD_CTX_block_size, EVP_MD_CTX_type, |
9 | EVP_md_null, EVP_md2, EVP_md5, EVP_sha, EVP_sha1, EVP_dss, EVP_dss1, EVP_mdc2, | 9 | EVP_md_null, EVP_md2, EVP_md5, EVP_sha, EVP_sha1, EVP_dss, EVP_dss1, EVP_mdc2, |
10 | EVP_ripemd160, EVP_get_digestbyname, EVP_get_digestbynid, EVP_get_digestbyobj - | 10 | EVP_ripemd160, EVP_get_digestbyname, EVP_get_digestbynid, EVP_get_digestbyobj - |
diff --git a/src/lib/libssl/src/doc/crypto/OPENSSL_config.pod b/src/lib/libssl/src/doc/crypto/OPENSSL_config.pod new file mode 100644 index 0000000000..16600620cc --- /dev/null +++ b/src/lib/libssl/src/doc/crypto/OPENSSL_config.pod | |||
@@ -0,0 +1,82 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | OPENSSL_config, OPENSSL_no_config - simple OpenSSL configuration functions | ||
6 | |||
7 | =head1 SYNOPSIS | ||
8 | |||
9 | #include <openssl/conf.h> | ||
10 | |||
11 | void OPENSSL_config(const char *config_name); | ||
12 | void OPENSSL_no_config(void); | ||
13 | |||
14 | =head1 DESCRIPTION | ||
15 | |||
16 | OPENSSL_config() configures OpenSSL using the standard B<openssl.cnf> | ||
17 | configuration file name using B<config_name>. If B<config_name> is NULL then | ||
18 | the default name B<openssl_conf> will be used. Any errors are ignored. Further | ||
19 | calls to OPENSSL_config() will have no effect. The configuration file format | ||
20 | is documented in the L<conf(5)|conf(5)> manual page. | ||
21 | |||
22 | OPENSSL_no_config() disables configuration. If called before OPENSSL_config() | ||
23 | no configuration takes place. | ||
24 | |||
25 | =head1 NOTES | ||
26 | |||
27 | It is B<strongly> recommended that B<all> new applications call OPENSSL_config() | ||
28 | or the more sophisticated functions such as CONF_modules_load() during | ||
29 | initialization (that is before starting any threads). By doing this | ||
30 | an application does not need to keep track of all configuration options | ||
31 | and some new functionality can be supported automatically. | ||
32 | |||
33 | It is also possible to automatically call OPENSSL_config() when an application | ||
34 | calls OPENSSL_add_all_algorithms() by compiling an application with the | ||
35 | preprocessor symbol B<OPENSSL_LOAD_CONF> #define'd. In this way configuration | ||
36 | can be added without source changes. | ||
37 | |||
38 | The environment variable B<OPENSSL_CONFIG> can be set to specify the location | ||
39 | of the configuration file. | ||
40 | |||
41 | Currently ASN1 OBJECTs and ENGINE configuration can be performed future | ||
42 | versions of OpenSSL will add new configuration options. | ||
43 | |||
44 | There are several reasons why calling the OpenSSL configuration routines is | ||
45 | advisable. For example new ENGINE functionality was added to OpenSSL 0.9.7. | ||
46 | In OpenSSL 0.9.7 control functions can be supported by ENGINEs, this can be | ||
47 | used (among other things) to load dynamic ENGINEs from shared libraries (DSOs). | ||
48 | However very few applications currently support the control interface and so | ||
49 | very few can load and use dynamic ENGINEs. Equally in future more sophisticated | ||
50 | ENGINEs will require certain control operations to customize them. If an | ||
51 | application calls OPENSSL_config() it doesn't need to know or care about | ||
52 | ENGINE control operations because they can be performed by editing a | ||
53 | configuration file. | ||
54 | |||
55 | Applications should free up configuration at application closedown by calling | ||
56 | CONF_modules_free(). | ||
57 | |||
58 | =head1 RESTRICTIONS | ||
59 | |||
60 | The OPENSSL_config() function is designed to be a very simple "call it and | ||
61 | forget it" function. As a result its behaviour is somewhat limited. It ignores | ||
62 | all errors silently and it can only load from the standard configuration file | ||
63 | location for example. | ||
64 | |||
65 | It is however B<much> better than nothing. Applications which need finer | ||
66 | control over their configuration functionality should use the configuration | ||
67 | functions such as CONF_load_modules() directly. | ||
68 | |||
69 | =head1 RETURN VALUES | ||
70 | |||
71 | Neither OPENSSL_config() nor OPENSSL_no_config() return a value. | ||
72 | |||
73 | =head1 SEE ALSO | ||
74 | |||
75 | L<conf(5)|conf(5)>, L<CONF_load_modules_file(3)|CONF_load_modules_file(3)>, | ||
76 | L<CONF_modules_free(3),CONF_modules_free(3)> | ||
77 | |||
78 | =head1 HISTORY | ||
79 | |||
80 | OPENSSL_config() and OPENSSL_no_config() first appeared in OpenSSL 0.9.7 | ||
81 | |||
82 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/OPENSSL_load_builtin_modules.pod b/src/lib/libssl/src/doc/crypto/OPENSSL_load_builtin_modules.pod new file mode 100644 index 0000000000..f14dfaf005 --- /dev/null +++ b/src/lib/libssl/src/doc/crypto/OPENSSL_load_builtin_modules.pod | |||
@@ -0,0 +1,51 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | OPENSSL_load_builtin_modules - add standard configuration modules | ||
6 | |||
7 | =head1 SYNOPSIS | ||
8 | |||
9 | #include <openssl/conf.h> | ||
10 | |||
11 | void OPENSSL_load_builtin_modules(void); | ||
12 | void ASN1_add_oid_module(void); | ||
13 | ENGINE_add_conf_module(); | ||
14 | |||
15 | =head1 DESCRIPTION | ||
16 | |||
17 | The function OPENSSL_load_builtin_modules() adds all the standard OpenSSL | ||
18 | configuration modules to the internal list. They can then be used by the | ||
19 | OpenSSL configuration code. | ||
20 | |||
21 | ASN1_add_oid_module() adds just the ASN1 OBJECT module. | ||
22 | |||
23 | ENGINE_add_conf_module() adds just the ENGINE configuration module. | ||
24 | |||
25 | =head1 NOTES | ||
26 | |||
27 | If the simple configuration function OPENSSL_config() is called then | ||
28 | OPENSSL_load_builtin_modules() is called automatically. | ||
29 | |||
30 | Applications which use the configuration functions directly will need to | ||
31 | call OPENSSL_load_builtin_modules() themselves I<before> any other | ||
32 | configuration code. | ||
33 | |||
34 | Applications should call OPENSSL_load_builtin_modules() to load all | ||
35 | configuration modules instead of adding modules selectively: otherwise | ||
36 | functionality may be missing from the application if an when new | ||
37 | modules are added. | ||
38 | |||
39 | =head1 RETURN VALUE | ||
40 | |||
41 | None of the functions return a value. | ||
42 | |||
43 | =head1 SEE ALSO | ||
44 | |||
45 | L<conf(3)|conf(3)>, L<OPENSSL_config(3)|OPENSSL_config(3)> | ||
46 | |||
47 | =head1 HISTORY | ||
48 | |||
49 | These functions first appeared in OpenSSL 0.9.7. | ||
50 | |||
51 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/OpenSSL_add_all_algorithms.pod b/src/lib/libssl/src/doc/crypto/OpenSSL_add_all_algorithms.pod index 486c903430..e63411b5bb 100644 --- a/src/lib/libssl/src/doc/crypto/OpenSSL_add_all_algorithms.pod +++ b/src/lib/libssl/src/doc/crypto/OpenSSL_add_all_algorithms.pod | |||
@@ -36,7 +36,7 @@ None of the functions return a value. | |||
36 | 36 | ||
37 | =head1 NOTES | 37 | =head1 NOTES |
38 | 38 | ||
39 | A typical application will will call OpenSSL_add_all_algorithms() initially and | 39 | A typical application will call OpenSSL_add_all_algorithms() initially and |
40 | EVP_cleanup() before exiting. | 40 | EVP_cleanup() before exiting. |
41 | 41 | ||
42 | An application does not need to add algorithms to use them explicitly, for example | 42 | An application does not need to add algorithms to use them explicitly, for example |
diff --git a/src/lib/libssl/src/doc/crypto/RSA_print.pod b/src/lib/libssl/src/doc/crypto/RSA_print.pod index e28d107d1c..c971e91f4d 100644 --- a/src/lib/libssl/src/doc/crypto/RSA_print.pod +++ b/src/lib/libssl/src/doc/crypto/RSA_print.pod | |||
@@ -44,6 +44,6 @@ L<dh(3)|dh(3)>, L<dsa(3)|dsa(3)>, L<rsa(3)|rsa(3)>, L<BN_bn2bin(3)|BN_bn2bin(3)> | |||
44 | 44 | ||
45 | RSA_print(), RSA_print_fp(), DSA_print(), DSA_print_fp(), DH_print(), | 45 | RSA_print(), RSA_print_fp(), DSA_print(), DSA_print_fp(), DH_print(), |
46 | DH_print_fp() are available in all versions of SSLeay and OpenSSL. | 46 | DH_print_fp() are available in all versions of SSLeay and OpenSSL. |
47 | DSAparams_print() and DSAparams_print_pf() were added in SSLeay 0.8. | 47 | DSAparams_print() and DSAparams_print_fp() were added in SSLeay 0.8. |
48 | 48 | ||
49 | =cut | 49 | =cut |
diff --git a/src/lib/libssl/src/doc/crypto/d2i_DSAPublicKey.pod b/src/lib/libssl/src/doc/crypto/d2i_DSAPublicKey.pod index 6ebd30427b..22c1b50f22 100644 --- a/src/lib/libssl/src/doc/crypto/d2i_DSAPublicKey.pod +++ b/src/lib/libssl/src/doc/crypto/d2i_DSAPublicKey.pod | |||
@@ -9,6 +9,7 @@ and parsing functions. | |||
9 | =head1 SYNOPSIS | 9 | =head1 SYNOPSIS |
10 | 10 | ||
11 | #include <openssl/dsa.h> | 11 | #include <openssl/dsa.h> |
12 | #include <openssl/x509.h> | ||
12 | 13 | ||
13 | DSA * d2i_DSAPublicKey(DSA **a, const unsigned char **pp, long length); | 14 | DSA * d2i_DSAPublicKey(DSA **a, const unsigned char **pp, long length); |
14 | 15 | ||
@@ -35,8 +36,8 @@ and parsing functions. | |||
35 | d2i_DSAPublicKey() and i2d_DSAPublicKey() decode and encode the DSA public key | 36 | d2i_DSAPublicKey() and i2d_DSAPublicKey() decode and encode the DSA public key |
36 | components structure. | 37 | components structure. |
37 | 38 | ||
38 | d2i_DSA_PUKEY() and i2d_DSA_PUKEY() decode and encode an DSA public key using a | 39 | d2i_DSA_PUBKEY() and i2d_DSA_PUBKEY() decode and encode an DSA public key using |
39 | SubjectPublicKeyInfo (certificate public key) structure. | 40 | a SubjectPublicKeyInfo (certificate public key) structure. |
40 | 41 | ||
41 | d2i_DSAPrivateKey(), i2d_DSAPrivateKey() decode and encode the DSA private key | 42 | d2i_DSAPrivateKey(), i2d_DSAPrivateKey() decode and encode the DSA private key |
42 | components. | 43 | components. |
diff --git a/src/lib/libssl/src/doc/crypto/d2i_RSAPublicKey.pod b/src/lib/libssl/src/doc/crypto/d2i_RSAPublicKey.pod index 7c71bcbf3d..279b29c873 100644 --- a/src/lib/libssl/src/doc/crypto/d2i_RSAPublicKey.pod +++ b/src/lib/libssl/src/doc/crypto/d2i_RSAPublicKey.pod | |||
@@ -9,6 +9,7 @@ d2i_Netscape_RSA - RSA public and private key encoding functions. | |||
9 | =head1 SYNOPSIS | 9 | =head1 SYNOPSIS |
10 | 10 | ||
11 | #include <openssl/rsa.h> | 11 | #include <openssl/rsa.h> |
12 | #include <openssl/x509.h> | ||
12 | 13 | ||
13 | RSA * d2i_RSAPublicKey(RSA **a, unsigned char **pp, long length); | 14 | RSA * d2i_RSAPublicKey(RSA **a, unsigned char **pp, long length); |
14 | 15 | ||
@@ -31,8 +32,8 @@ d2i_Netscape_RSA - RSA public and private key encoding functions. | |||
31 | d2i_RSAPublicKey() and i2d_RSAPublicKey() decode and encode a PKCS#1 RSAPublicKey | 32 | d2i_RSAPublicKey() and i2d_RSAPublicKey() decode and encode a PKCS#1 RSAPublicKey |
32 | structure. | 33 | structure. |
33 | 34 | ||
34 | d2i_RSA_PUKEY() and i2d_RSA_PUKEY() decode and encode an RSA public key using a | 35 | d2i_RSA_PUBKEY() and i2d_RSA_PUBKEY() decode and encode an RSA public key using |
35 | SubjectPublicKeyInfo (certificate public key) structure. | 36 | a SubjectPublicKeyInfo (certificate public key) structure. |
36 | 37 | ||
37 | d2i_RSAPrivateKey(), i2d_RSAPrivateKey() decode and encode a PKCS#1 RSAPrivateKey | 38 | d2i_RSAPrivateKey(), i2d_RSAPrivateKey() decode and encode a PKCS#1 RSAPrivateKey |
38 | structure. | 39 | structure. |
diff --git a/src/lib/libssl/src/doc/crypto/des.pod b/src/lib/libssl/src/doc/crypto/des.pod index 528c73acac..6f0cf1cc5e 100644 --- a/src/lib/libssl/src/doc/crypto/des.pod +++ b/src/lib/libssl/src/doc/crypto/des.pod | |||
@@ -283,7 +283,7 @@ DES_cbc_encrypt is used. | |||
283 | =head1 NOTES | 283 | =head1 NOTES |
284 | 284 | ||
285 | Single-key DES is insecure due to its short key size. ECB mode is | 285 | Single-key DES is insecure due to its short key size. ECB mode is |
286 | not suitable for most applications; see L<DES_modes(7)|DES_modes(7)>. | 286 | not suitable for most applications; see L<des_modes(7)|des_modes(7)>. |
287 | 287 | ||
288 | The L<evp(3)|evp(3)> library provides higher-level encryption functions. | 288 | The L<evp(3)|evp(3)> library provides higher-level encryption functions. |
289 | 289 | ||
diff --git a/src/lib/libssl/src/doc/crypto/pem.pod b/src/lib/libssl/src/doc/crypto/pem.pod index a4f8cc3337..8613114452 100644 --- a/src/lib/libssl/src/doc/crypto/pem.pod +++ b/src/lib/libssl/src/doc/crypto/pem.pod | |||
@@ -330,7 +330,7 @@ most of them are set to 0 or NULL. | |||
330 | Read a certificate in PEM format from a BIO: | 330 | Read a certificate in PEM format from a BIO: |
331 | 331 | ||
332 | X509 *x; | 332 | X509 *x; |
333 | x = PEM_read_bio(bp, NULL, 0, NULL); | 333 | x = PEM_read_bio_X509(bp, NULL, 0, NULL); |
334 | if (x == NULL) | 334 | if (x == NULL) |
335 | { | 335 | { |
336 | /* Error */ | 336 | /* Error */ |
@@ -459,12 +459,12 @@ returned by EVP_bytestokey(). | |||
459 | The PEM read routines in some versions of OpenSSL will not correctly reuse | 459 | The PEM read routines in some versions of OpenSSL will not correctly reuse |
460 | an existing structure. Therefore the following: | 460 | an existing structure. Therefore the following: |
461 | 461 | ||
462 | PEM_read_bio(bp, &x, 0, NULL); | 462 | PEM_read_bio_X509(bp, &x, 0, NULL); |
463 | 463 | ||
464 | where B<x> already contains a valid certificate, may not work, whereas: | 464 | where B<x> already contains a valid certificate, may not work, whereas: |
465 | 465 | ||
466 | X509_free(x); | 466 | X509_free(x); |
467 | x = PEM_read_bio(bp, NULL, 0, NULL); | 467 | x = PEM_read_bio_X509(bp, NULL, 0, NULL); |
468 | 468 | ||
469 | is guaranteed to work. | 469 | is guaranteed to work. |
470 | 470 | ||
diff --git a/src/lib/libssl/src/doc/crypto/ui.pod b/src/lib/libssl/src/doc/crypto/ui.pod index 2b3535a746..6df68d604a 100644 --- a/src/lib/libssl/src/doc/crypto/ui.pod +++ b/src/lib/libssl/src/doc/crypto/ui.pod | |||
@@ -5,7 +5,7 @@ | |||
5 | UI_new, UI_new_method, UI_free, UI_add_input_string, UI_dup_input_string, | 5 | UI_new, UI_new_method, UI_free, UI_add_input_string, UI_dup_input_string, |
6 | UI_add_verify_string, UI_dup_verify_string, UI_add_input_boolean, | 6 | UI_add_verify_string, UI_dup_verify_string, UI_add_input_boolean, |
7 | UI_dup_input_boolean, UI_add_info_string, UI_dup_info_string, | 7 | UI_dup_input_boolean, UI_add_info_string, UI_dup_info_string, |
8 | UI_add_error_string, UI_dup_error_string, UI_construct_prompt | 8 | UI_add_error_string, UI_dup_error_string, UI_construct_prompt, |
9 | UI_add_user_data, UI_get0_user_data, UI_get0_result, UI_process, | 9 | UI_add_user_data, UI_get0_user_data, UI_get0_result, UI_process, |
10 | UI_ctrl, UI_set_default_method, UI_get_default_method, UI_get_method, | 10 | UI_ctrl, UI_set_default_method, UI_get_default_method, UI_get_method, |
11 | UI_set_method, UI_OpenSSL, ERR_load_UI_strings - New User Interface | 11 | UI_set_method, UI_OpenSSL, ERR_load_UI_strings - New User Interface |
diff --git a/src/lib/libssl/src/doc/ssl/SSL_COMP_add_compression_method.pod b/src/lib/libssl/src/doc/ssl/SSL_COMP_add_compression_method.pod index 2a98739114..42fa66b197 100644 --- a/src/lib/libssl/src/doc/ssl/SSL_COMP_add_compression_method.pod +++ b/src/lib/libssl/src/doc/ssl/SSL_COMP_add_compression_method.pod | |||
@@ -53,11 +53,11 @@ SSL_COMP_add_compression_method() may return the following values: | |||
53 | 53 | ||
54 | =over 4 | 54 | =over 4 |
55 | 55 | ||
56 | =item 1 | 56 | =item 0 |
57 | 57 | ||
58 | The operation succeeded. | 58 | The operation succeeded. |
59 | 59 | ||
60 | =item 0 | 60 | =item 1 |
61 | 61 | ||
62 | The operation failed. Check the error queue to find out the reason. | 62 | The operation failed. Check the error queue to find out the reason. |
63 | 63 | ||
diff --git a/src/lib/libssl/src/doc/ssleay.txt b/src/lib/libssl/src/doc/ssleay.txt index c6049d5e53..d44d2f04a0 100644 --- a/src/lib/libssl/src/doc/ssleay.txt +++ b/src/lib/libssl/src/doc/ssleay.txt | |||
@@ -6245,7 +6245,7 @@ SSL_get_app_data | |||
6245 | void SSL_CTX_set_default_verify | 6245 | void SSL_CTX_set_default_verify |
6246 | 6246 | ||
6247 | /* This callback, if set, totaly overrides the normal SSLeay verification | 6247 | /* This callback, if set, totaly overrides the normal SSLeay verification |
6248 | * functions and should return 1 on sucesss and 0 on failure */ | 6248 | * functions and should return 1 on success and 0 on failure */ |
6249 | void SSL_CTX_set_cert_verify_callback | 6249 | void SSL_CTX_set_cert_verify_callback |
6250 | 6250 | ||
6251 | /* The following are the same as the equivilent SSL_xxx functions. | 6251 | /* The following are the same as the equivilent SSL_xxx functions. |