DH_get_ex_new_index(3SSL) OpenSSL DH_get_ex_new_index(3SSL)NAME
DH_get_ex_new_index, DH_set_ex_data, DH_get_ex_data - add application specific data to DH structures
SYNOPSIS
#include <openssl/dh.h>
int DH_get_ex_new_index(long argl, void *argp,
CRYPTO_EX_new *new_func,
CRYPTO_EX_dup *dup_func,
CRYPTO_EX_free *free_func);
int DH_set_ex_data(DH *d, int idx, void *arg);
char *DH_get_ex_data(DH *d, int idx);
DESCRIPTION
These functions handle application specific data in DH structures. Their usage is identical to that of RSA_get_ex_new_index(),
RSA_set_ex_data() and RSA_get_ex_data() as described in RSA_get_ex_new_index(3).
SEE ALSO RSA_get_ex_new_index(3), dh(3)HISTORY
DH_get_ex_new_index(), DH_set_ex_data() and DH_get_ex_data() are available since OpenSSL 0.9.5.
1.0.1e 2013-02-11 DH_get_ex_new_index(3SSL)
Check Out this Related Man Page
X509_STORE_CTX_get_ex_new_index(3SSL) OpenSSL X509_STORE_CTX_get_ex_new_index(3SSL)NAME
X509_STORE_CTX_get_ex_new_index, X509_STORE_CTX_set_ex_data, X509_STORE_CTX_get_ex_data - add application specific data to X509_STORE_CTX
structures
SYNOPSIS
#include <openssl/x509_vfy.h>
int X509_STORE_CTX_get_ex_new_index(long argl, void *argp,
CRYPTO_EX_new *new_func,
CRYPTO_EX_dup *dup_func,
CRYPTO_EX_free *free_func);
int X509_STORE_CTX_set_ex_data(X509_STORE_CTX *d, int idx, void *arg);
char *X509_STORE_CTX_get_ex_data(X509_STORE_CTX *d, int idx);
DESCRIPTION
These functions handle application specific data in X509_STORE_CTX structures. Their usage is identical to that of RSA_get_ex_new_index(),
RSA_set_ex_data() and RSA_get_ex_data() as described in RSA_get_ex_new_index(3).
NOTES
This mechanism is used internally by the ssl library to store the SSL structure associated with a verification operation in an
X509_STORE_CTX structure.
SEE ALSO RSA_get_ex_new_index(3)HISTORY
X509_STORE_CTX_get_ex_new_index(), X509_STORE_CTX_set_ex_data() and X509_STORE_CTX_get_ex_data() are available since OpenSSL 0.9.5.
1.0.0e 2009-10-18 X509_STORE_CTX_get_ex_new_index(3SSL)
<h1>A short history of UNIX</h1>
<p>In the late 1960's Ken Thompsom joined the computing-science research group at Bell
Laboratories, which is the research arm of the giant American corporation ATT. He and many
colleagues had been collaborating with MIT and GE on the development of an... (0 Replies)
We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
I'm writing a command shell, and I want to be able to detect when the user presses an arrow key (otherwise it just prints [[A, [[B, etc.). I know it's relatively easy (although somewhat more time-consuming) to detect keystrokes in noncanonical mode, but I've noticed that the bash shell detects... (4 Replies)
I'm learning off Linux (Ubuntu) right now. I want to move up to Unix, but I don't want to rush like I did when it came to Windows --> to Linux. What is the best Unix OS that fits in pretty well with Ubuntu.
In other words is there kind of an equal Linux with Unix?
Also what do I need to... (10 Replies)
I noticed my hostname is <my-full-name>s-macbook.local. I'm not sure exactly what information leaves the local network, and whether the hostname is included, but if it is, this would mean people on the Internet can look at my hostname and see who I am. Before anyone says that's not possible,... (4 Replies)