SSL_new(3SSL) OpenSSL SSL_new(3SSL)NAME
SSL_new - create a new SSL structure for a connection
SYNOPSIS
#include <openssl/ssl.h>
SSL *SSL_new(SSL_CTX *ctx);
DESCRIPTION
SSL_new() creates a new SSL structure which is needed to hold the data for a TLS/SSL connection. The new structure inherits the settings of
the underlying context ctx: connection method (SSLv2/v3/TLSv1), options, verification settings, timeout settings.
RETURN VALUES
The following return values can occur:
NULL
The creation of a new SSL structure failed. Check the error stack to find out the reason.
Pointer to an SSL structure
The return value points to an allocated SSL structure.
SEE ALSO SSL_free(3), SSL_clear(3), SSL_CTX_set_options(3), SSL_get_SSL_CTX(3), ssl(3)1.0.1e 2013-02-11 SSL_new(3SSL)
Check Out this Related Man Page
SSL_clear(3SSL) OpenSSL SSL_clear(3SSL)NAME
SSL_clear - reset SSL object to allow another connection
SYNOPSIS
#include <openssl/ssl.h>
int SSL_clear(SSL *ssl);
DESCRIPTION
Reset ssl to allow another connection. All settings (method, ciphers, BIOs) are kept.
NOTES
SSL_clear is used to prepare an SSL object for a new connection. While all settings are kept, a side effect is the handling of the current
SSL session. If a session is still open, it is considered bad and will be removed from the session cache, as required by RFC2246. A
session is considered open, if SSL_shutdown(3) was not called for the connection or at least SSL_set_shutdown(3) was used to set the
SSL_SENT_SHUTDOWN state.
If a session was closed cleanly, the session object will be kept and all settings corresponding. This explicitly means, that e.g. the
special method used during the session will be kept for the next handshake. So if the session was a TLSv1 session, a SSL client object will
use a TLSv1 client method for the next handshake and a SSL server object will use a TLSv1 server method, even if SSLv23_*_methods were
chosen on startup. This will might lead to connection failures (see SSL_new(3)) for a description of the method's properties.
WARNINGS
SSL_clear() resets the SSL object to allow for another connection. The reset operation however keeps several settings of the last sessions
(some of these settings were made automatically during the last handshake). It only makes sense for a new connection with the exact same
peer that shares these settings, and may fail if that peer changes its settings between connections. Use the sequence SSL_get_session(3);
SSL_new(3); SSL_set_session(3); SSL_free(3) instead to avoid such failures (or simply SSL_free(3); SSL_new(3) if session reuse is not
desired).
RETURN VALUES
The following return values can occur:
0 The SSL_clear() operation could not be performed. Check the error stack to find out the reason.
1 The SSL_clear() operation was successful.
SSL_new(3), SSL_free(3), SSL_shutdown(3), SSL_set_shutdown(3), SSL_CTX_set_options(3), ssl(3), SSL_CTX_set_client_cert_cb(3)1.0.1e 2013-02-11 SSL_clear(3SSL)
When i install SSH on AIX 5.1 I get the following message
{
A prerequisite package has not been installed. Open SSH
requires Open SSL (Secure Sockets Layer). Please install
Open SSL from the AIX Toolbox for Linux CD or Toolbox website:
}
I cannot find the AIX toolbox for linux CD, also on... (1 Reply)
I need to make an SSL FTP connection from my Unix machine to an SSL FTP server. I've found lots of SSL-capable FTP clients for windows machines, but can't seem to find any for Unix (HP-UX 11i, to be specific).
I found, and have tried a package called tlswrap, but that is not working.
Anybody... (2 Replies)
Hi All,
I m very new to SSL and unix .. I m trying to set up a client server communication using SSL .( C++ )
I m trying to write my code using open ssl libraries.
The problem which I m facing now is the certificate generation
Can any one explain me the concept of certificates and the... (0 Replies)
Hello Groups
I am trying to find out ways of comparing a value from a 'c' structure to a value in another 'C' structure. the 'C' structure can be a List or liked list as it contains lot many records.
if we loop it in both the structures it is going to consume time.
I am looking for a simple... (3 Replies)
Hello,
I need assistance with creating a shell script to generate SSL Certificate Requests on remote hosts. Below is my stab at this, but I cannot figure out how to pass the requested arguments into the openssl command correctly. I have a major problem with redirecting the "answers" into the... (2 Replies)
Hello,
I recently had a Retina scan of my system and there are some findings I do not understand.
SSL Week Cipher Strength Supported - Retina has detected that the targeted SSL Service supports a cryptographically weak cipher strength... Disable ciphers that support less than 128-bit... (4 Replies)
Dears ,
i have some points that must be fixed , this points are .
* SSL Weak Cipher Suites Supported
i need to remove the ciphers less than 56
* SSL Session Resume / Renegotiation Supported
i dont have any idea about it (1 Reply)
I have RHEL 5.8 in our production environment. We are using SSL, my query is how to find the port used for SSL. In /etc/services, it shows 443 but when I give
netstat -tulpn | grep 443
Or
netstat -tulp | grep https
I do not get any output.
I hope, my question is clear of how to find... (4 Replies)
Hi Team,
I am currently working on an integration project where in we have planned to receive files from an external source onto our system via FTPS(SSL). I am new to this part and would like to know the points for consideration and the points to learn to get this done. The files we receive from... (1 Reply)
Hello everyone,
Newbie to the forum.
I have a requirement for a script to check Queue Manager SSL certificates - However I have no previous scripting skills what so ever. I need a script which from high level point of view does the following:
#For each Queue Manager on the server go to... (1 Reply)