Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

ssl_get_ssl_method(3ssl) [opendarwin man page]

SSL_CTX_set_ssl_version(3SSL)                                         OpenSSL                                        SSL_CTX_set_ssl_version(3SSL)

NAME
SSL_CTX_set_ssl_version, SSL_set_ssl_method, SSL_get_ssl_method - choose a new TLS/SSL method SYNOPSIS
#include <openssl/ssl.h> int SSL_CTX_set_ssl_version(SSL_CTX *ctx, const SSL_METHOD *method); int SSL_set_ssl_method(SSL *s, const SSL_METHOD *method); const SSL_METHOD *SSL_get_ssl_method(SSL *ssl); DESCRIPTION
SSL_CTX_set_ssl_version() sets a new default TLS/SSL method for SSL objects newly created from this ctx. SSL objects already created with SSL_new(3) are not affected, except when SSL_clear(3) is being called. SSL_set_ssl_method() sets a new TLS/SSL method for a particular ssl object. It may be reset, when SSL_clear() is called. SSL_get_ssl_method() returns a function pointer to the TLS/SSL method set in ssl. NOTES
The available method choices are described in SSL_CTX_new(3). When SSL_clear(3) is called and no session is connected to an SSL object, the method of the SSL object is reset to the method currently set in the corresponding SSL_CTX object. RETURN VALUES
The following return values can occur for SSL_CTX_set_ssl_version() and SSL_set_ssl_method(): 0 The new choice failed, check the error stack to find out the reason. 1 The operation succeeded. SEE ALSO
SSL_CTX_new(3), SSL_new(3), SSL_clear(3), ssl(3), SSL_set_connect_state(3) 1.0.1e 2013-02-11 SSL_CTX_set_ssl_version(3SSL)

Check Out this Related Man Page

SSL_clear(3SSL)                                                       OpenSSL                                                      SSL_clear(3SSL)

NAME
SSL_clear - reset SSL object to allow another connection SYNOPSIS
#include <openssl/ssl.h> int SSL_clear(SSL *ssl); DESCRIPTION
Reset ssl to allow another connection. All settings (method, ciphers, BIOs) are kept. NOTES
SSL_clear is used to prepare an SSL object for a new connection. While all settings are kept, a side effect is the handling of the current SSL session. If a session is still open, it is considered bad and will be removed from the session cache, as required by RFC2246. A session is considered open, if SSL_shutdown(3) was not called for the connection or at least SSL_set_shutdown(3) was used to set the SSL_SENT_SHUTDOWN state. If a session was closed cleanly, the session object will be kept and all settings corresponding. This explicitly means, that e.g. the special method used during the session will be kept for the next handshake. So if the session was a TLSv1 session, a SSL client object will use a TLSv1 client method for the next handshake and a SSL server object will use a TLSv1 server method, even if SSLv23_*_methods were chosen on startup. This will might lead to connection failures (see SSL_new(3)) for a description of the method's properties. WARNINGS
SSL_clear() resets the SSL object to allow for another connection. The reset operation however keeps several settings of the last sessions (some of these settings were made automatically during the last handshake). It only makes sense for a new connection with the exact same peer that shares these settings, and may fail if that peer changes its settings between connections. Use the sequence SSL_get_session(3); SSL_new(3); SSL_set_session(3); SSL_free(3) instead to avoid such failures (or simply SSL_free(3); SSL_new(3) if session reuse is not desired). RETURN VALUES
The following return values can occur: 0 The SSL_clear() operation could not be performed. Check the error stack to find out the reason. 1 The SSL_clear() operation was successful. SSL_new(3), SSL_free(3), SSL_shutdown(3), SSL_set_shutdown(3), SSL_CTX_set_options(3), ssl(3), SSL_CTX_set_client_cert_cb(3) 1.0.1e 2013-02-11 SSL_clear(3SSL)
Man Page