Sophie

Sophie

distrib > Fedora > 15 > i386 > by-pkgid > 1f9eb832ba1e4b88d9a5c2b384813bb4 > files > 5750

kdelibs3-apidocs-3.5.10-31.fc15.noarch.rpm

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en_US" xml:lang="en_US">

<head>
  <title>kio/kssl: kopenssl.h Source File (kio/kssl)</title>
  <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />

  <meta http-equiv="Content-Style-Type" content="text/css" />

  <meta http-equiv="pics-label" content='(pics-1.1 "http://www.icra.org/ratingsv02.html" comment "ICRAonline DE v2.0" l gen true for "http://www.kde.org"  r (nz 1 vz 1 lz 1 oz 1 cb 1) "http://www.rsac.org/ratingsv01.html" l gen true for "http://www.kde.org"  r (n 0 s 0 v 0 l 0))' />

  <meta name="trademark" content="KDE e.V." />
  <meta name="description" content="K Desktop Environment Homepage, KDE.org" />
  <meta name="MSSmartTagsPreventParsing" content="true" />
  <meta name="robots" content="all" />

  <link rel="shortcut icon" href="../../../favicon.ico" />

<link rel="stylesheet" media="screen" type="text/css" title="APIDOX" href="doxygen.css" />



</head>

<body>

<div id="nav_header_top" align="right">
  <a href="#content" class="doNotDisplay" accesskey="2">Skip to main content ::</a>

  <a href="../../.."><img id="nav_header_logo" alt="Home" align="left" src="../../../kde_gear_64.png" border="0" /></a>
  <span class="doNotDisplay">::</span>

  <div id="nav_header_title" align="left">KDE API Reference</div>


</div>

<div id="nav_header_bottom" align="right">
  <span class="doNotDisplay">:: <a href="#navigation" accesskey="5">Skip to Link Menu</a><br/></span>
  <div id="nav_header_bottom_right" style="text-align: left;">
/ <a href="../../..">API Reference</a>
 / <a href="../../html/index.html">kio</a> / <a href=".">kssl</a>
  </div>
</div>


<table id="main" border="0" cellpadding="0" cellspacing="0" width="100%">
<tr>
      <td valign="top" class="menuheader" height="0"></td>

  <td id="contentcolumn" valign="top" rowspan="2" >
    <div id="content" style="padding-top: 0px;"><div style="width:100%; margin: 0px; padding: 0px;">
    <a name="content"></a>


<!-- Generated by Doxygen 1.7.4 -->
<div class="header">
  <div class="headertitle">
<div class="title">kopenssl.h</div>  </div>
</div>
<div class="contents">
<div class="fragment"><pre class="fragment"><a name="l00001"></a>00001 <span class="comment">/* This file is part of the KDE libraries</span>
<a name="l00002"></a>00002 <span class="comment">   Copyright (C) 2001-2003 George Staikos &lt;staikos@kde.org&gt;</span>
<a name="l00003"></a>00003 <span class="comment"> </span>
<a name="l00004"></a>00004 <span class="comment">   This library is free software; you can redistribute it and/or</span>
<a name="l00005"></a>00005 <span class="comment">   modify it under the terms of the GNU Library General Public</span>
<a name="l00006"></a>00006 <span class="comment">   License version 2 as published by the Free Software Foundation.</span>
<a name="l00007"></a>00007 <span class="comment"> </span>
<a name="l00008"></a>00008 <span class="comment">   This library is distributed in the hope that it will be useful,</span>
<a name="l00009"></a>00009 <span class="comment">   but WITHOUT ANY WARRANTY; without even the implied warranty of</span>
<a name="l00010"></a>00010 <span class="comment">   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU</span>
<a name="l00011"></a>00011 <span class="comment">   Library General Public License for more details.</span>
<a name="l00012"></a>00012 <span class="comment"> </span>
<a name="l00013"></a>00013 <span class="comment">   You should have received a copy of the GNU Library General Public License</span>
<a name="l00014"></a>00014 <span class="comment">   along with this library; see the file COPYING.LIB.  If not, write to</span>
<a name="l00015"></a>00015 <span class="comment">   the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,</span>
<a name="l00016"></a>00016 <span class="comment">   Boston, MA 02110-1301, USA.</span>
<a name="l00017"></a>00017 <span class="comment">*/</span>
<a name="l00018"></a>00018 
<a name="l00019"></a>00019 
<a name="l00020"></a>00020 <span class="comment">// IF YOU ARE USING THIS CLASS, YOU ARE MAKING A MISTAKE.</span>
<a name="l00021"></a>00021 
<a name="l00022"></a>00022 <span class="preprocessor">#ifndef __KOPENSSLPROXY_H </span>
<a name="l00023"></a>00023 <span class="preprocessor"></span><span class="preprocessor">#define __KOPENSSLPROXY_H</span>
<a name="l00024"></a>00024 <span class="preprocessor"></span>
<a name="l00025"></a>00025 <span class="preprocessor">#define KOSSL KOpenSSLProxy</span>
<a name="l00026"></a>00026 <span class="preprocessor"></span><span class="keyword">class </span>KOpenSSLProxyPrivate;
<a name="l00027"></a>00027 
<a name="l00028"></a>00028 <span class="preprocessor">#include &lt;klibloader.h&gt;</span>
<a name="l00029"></a>00029 
<a name="l00030"></a>00030 <span class="preprocessor">#ifdef Q_WS_WIN</span>
<a name="l00031"></a>00031 <span class="preprocessor"></span><span class="preprocessor">#include &quot;ksslconfig_win.h&quot;</span>
<a name="l00032"></a>00032 <span class="preprocessor">#else</span>
<a name="l00033"></a>00033 <span class="preprocessor"></span><span class="preprocessor">#include &quot;ksslconfig.h&quot;</span>
<a name="l00034"></a>00034 <span class="preprocessor">#endif</span>
<a name="l00035"></a>00035 <span class="preprocessor"></span>
<a name="l00036"></a>00036 <span class="preprocessor">#ifdef KSSL_HAVE_SSL</span>
<a name="l00037"></a>00037 <span class="preprocessor"></span><span class="preprocessor">#define crypt _openssl_crypt</span>
<a name="l00038"></a>00038 <span class="preprocessor"></span><span class="preprocessor">#include &lt;openssl/ssl.h&gt;</span>
<a name="l00039"></a>00039 <span class="preprocessor">#include &lt;openssl/x509.h&gt;</span>
<a name="l00040"></a>00040 <span class="preprocessor">#include &lt;openssl/x509v3.h&gt;</span>
<a name="l00041"></a>00041 <span class="preprocessor">#include &lt;openssl/pem.h&gt;</span>
<a name="l00042"></a>00042 <span class="preprocessor">#include &lt;openssl/bio.h&gt;</span>
<a name="l00043"></a>00043 <span class="preprocessor">#include &lt;openssl/rand.h&gt;</span>
<a name="l00044"></a>00044 <span class="preprocessor">#include &lt;openssl/asn1.h&gt;</span>
<a name="l00045"></a>00045 <span class="preprocessor">#include &lt;openssl/pkcs7.h&gt;</span>
<a name="l00046"></a>00046 <span class="preprocessor">#include &lt;openssl/pkcs12.h&gt;</span>
<a name="l00047"></a>00047 <span class="preprocessor">#include &lt;openssl/evp.h&gt;</span>
<a name="l00048"></a>00048 <span class="preprocessor">#include &lt;openssl/stack.h&gt;</span>
<a name="l00049"></a>00049 <span class="preprocessor">#include &lt;openssl/bn.h&gt;</span>
<a name="l00050"></a>00050 <span class="preprocessor">#undef crypt</span>
<a name="l00051"></a>00051 <span class="preprocessor"></span><span class="preprocessor">#if OPENSSL_VERSION_NUMBER &gt;= 0x10000000L</span>
<a name="l00052"></a>00052 <span class="preprocessor"></span><span class="preprocessor">#define STACK _STACK</span>
<a name="l00053"></a>00053 <span class="preprocessor"></span><span class="preprocessor">#endif</span>
<a name="l00054"></a>00054 <span class="preprocessor"></span><span class="preprocessor">#endif</span>
<a name="l00055"></a>00055 <span class="preprocessor"></span>
<a name="l00056"></a>00056 <span class="preprocessor">#include &lt;kstaticdeleter.h&gt;</span>
<a name="l00057"></a>00057 
<a name="l00066"></a><a class="code" href="classKOpenSSLProxy.html">00066</a> <span class="keyword">class </span>KIO_EXPORT <a class="code" href="classKOpenSSLProxy.html" title="Dynamically load and wrap OpenSSL.">KOpenSSLProxy</a> {
<a name="l00067"></a>00067 <span class="keyword">friend</span> <span class="keyword">class </span>KStaticDeleter&lt;KOpenSSLProxy&gt;;
<a name="l00068"></a>00068 <span class="keyword">public</span>:
<a name="l00069"></a>00069 
<a name="l00074"></a>00074    <span class="keyword">static</span> KOpenSSLProxy *<span class="keyword">self</span>();
<a name="l00075"></a>00075 
<a name="l00079"></a>00079    <span class="keywordtype">bool</span> hasLibCrypto() <span class="keyword">const</span>;
<a name="l00080"></a>00080 
<a name="l00084"></a>00084    <span class="keywordtype">bool</span> hasLibSSL() <span class="keyword">const</span>;
<a name="l00085"></a>00085 
<a name="l00090"></a>00090    <span class="keywordtype">void</span> destroy();
<a name="l00091"></a>00091 
<a name="l00092"></a>00092    <span class="comment">// Here are the symbols that we need.</span>
<a name="l00093"></a>00093 <span class="preprocessor">#ifdef KSSL_HAVE_SSL</span>
<a name="l00094"></a>00094 <span class="preprocessor"></span>
<a name="l00095"></a>00095    <span class="comment">/*</span>
<a name="l00096"></a>00096 <span class="comment">    *   SSL_connect - initiate the TLS/SSL handshake with an TLS/SSL server</span>
<a name="l00097"></a>00097 <span class="comment">    */</span>
<a name="l00098"></a>00098    <span class="keywordtype">int</span> SSL_connect(SSL *ssl);
<a name="l00099"></a>00099 
<a name="l00100"></a>00100    <span class="comment">/*</span>
<a name="l00101"></a>00101 <span class="comment">    *   SSL_accept - initiate the TLS/SSL handshake with an TLS/SSL server</span>
<a name="l00102"></a>00102 <span class="comment">    */</span>
<a name="l00103"></a>00103    <span class="keywordtype">int</span> SSL_accept(SSL *ssl);
<a name="l00104"></a>00104 
<a name="l00105"></a>00105    <span class="comment">/*</span>
<a name="l00106"></a>00106 <span class="comment">    *   SSL_get_error - get the error code</span>
<a name="l00107"></a>00107 <span class="comment">    */</span>
<a name="l00108"></a>00108    <span class="keywordtype">int</span> SSL_get_error(SSL *ssl, <span class="keywordtype">int</span> rc);
<a name="l00109"></a>00109 
<a name="l00110"></a>00110    <span class="comment">/*</span>
<a name="l00111"></a>00111 <span class="comment">    *   SSL_read - read bytes from a TLS/SSL connection.</span>
<a name="l00112"></a>00112 <span class="comment">    */</span>
<a name="l00113"></a>00113    <span class="keywordtype">int</span> SSL_read(SSL *ssl, <span class="keywordtype">void</span> *buf, <span class="keywordtype">int</span> num);
<a name="l00114"></a>00114 
<a name="l00115"></a>00115    <span class="comment">/*</span>
<a name="l00116"></a>00116 <span class="comment">    *   SSL_write - write bytes to a TLS/SSL connection.</span>
<a name="l00117"></a>00117 <span class="comment">    */</span>
<a name="l00118"></a>00118    <span class="keywordtype">int</span> SSL_write(SSL *ssl, <span class="keyword">const</span> <span class="keywordtype">void</span> *buf, <span class="keywordtype">int</span> num);
<a name="l00119"></a>00119 
<a name="l00120"></a>00120    <span class="comment">/*</span>
<a name="l00121"></a>00121 <span class="comment">    *   SSL_new - create a new SSL structure for a connection</span>
<a name="l00122"></a>00122 <span class="comment">    */</span>
<a name="l00123"></a>00123    SSL *SSL_new(SSL_CTX *ctx);
<a name="l00124"></a>00124 
<a name="l00125"></a>00125    <span class="comment">/*</span>
<a name="l00126"></a>00126 <span class="comment">    *   SSL_free - free an allocated SSL structure</span>
<a name="l00127"></a>00127 <span class="comment">    */</span>
<a name="l00128"></a>00128    <span class="keywordtype">void</span> SSL_free(SSL *ssl);
<a name="l00129"></a>00129 
<a name="l00130"></a>00130    <span class="comment">/*</span>
<a name="l00131"></a>00131 <span class="comment">    *   SSL_shutdown - shutdown an allocated SSL connection</span>
<a name="l00132"></a>00132 <span class="comment">    */</span>
<a name="l00133"></a>00133    <span class="keywordtype">int</span> SSL_shutdown(SSL *ssl);
<a name="l00134"></a>00134 
<a name="l00135"></a>00135    <span class="comment">/*</span>
<a name="l00136"></a>00136 <span class="comment">    *   SSL_CTX_new - create a new SSL_CTX object as framework for TLS/SSL enabled functions</span>
<a name="l00137"></a>00137 <span class="comment">    */</span>
<a name="l00138"></a>00138    SSL_CTX *SSL_CTX_new(SSL_METHOD *method);
<a name="l00139"></a>00139 
<a name="l00140"></a>00140    <span class="comment">/*</span>
<a name="l00141"></a>00141 <span class="comment">    *   SSL_CTX_free - free an allocated SSL_CTX object</span>
<a name="l00142"></a>00142 <span class="comment">    */</span>
<a name="l00143"></a>00143    <span class="keywordtype">void</span> SSL_CTX_free(SSL_CTX *ctx);
<a name="l00144"></a>00144 
<a name="l00145"></a>00145    <span class="comment">/*</span>
<a name="l00146"></a>00146 <span class="comment">    *   SSL_set_fd - connect the SSL object with a file descriptor</span>
<a name="l00147"></a>00147 <span class="comment">    */</span>
<a name="l00148"></a>00148    <span class="keywordtype">int</span> SSL_set_fd(SSL *ssl, <span class="keywordtype">int</span> fd);
<a name="l00149"></a>00149 
<a name="l00150"></a>00150    <span class="comment">/*</span>
<a name="l00151"></a>00151 <span class="comment">    *   SSL_pending - obtain number of readable bytes buffered in an SSL object</span>
<a name="l00152"></a>00152 <span class="comment">    */</span>
<a name="l00153"></a>00153    <span class="keywordtype">int</span> SSL_pending(SSL *ssl);
<a name="l00154"></a>00154 
<a name="l00155"></a>00155    <span class="comment">/*</span>
<a name="l00156"></a>00156 <span class="comment">    *   SSL_peek - obtain bytes buffered in an SSL object</span>
<a name="l00157"></a>00157 <span class="comment">    */</span>
<a name="l00158"></a>00158    <span class="keywordtype">int</span> SSL_peek(SSL *ssl, <span class="keywordtype">void</span> *buf, <span class="keywordtype">int</span> num);
<a name="l00159"></a>00159 
<a name="l00160"></a>00160    <span class="comment">/*</span>
<a name="l00161"></a>00161 <span class="comment">    *   SSL_CTX_set_cipher_list - choose list of available SSL_CIPHERs</span>
<a name="l00162"></a>00162 <span class="comment">    */</span>
<a name="l00163"></a>00163    <span class="keywordtype">int</span> SSL_CTX_set_cipher_list(SSL_CTX *ctx, <span class="keyword">const</span> <span class="keywordtype">char</span> *str);
<a name="l00164"></a>00164 
<a name="l00165"></a>00165    <span class="comment">/*</span>
<a name="l00166"></a>00166 <span class="comment">    *   SSL_CTX_set_verify - set peer certificate verification parameters</span>
<a name="l00167"></a>00167 <span class="comment">    */</span>
<a name="l00168"></a>00168    <span class="keywordtype">void</span> SSL_CTX_set_verify(SSL_CTX *ctx, <span class="keywordtype">int</span> mode,
<a name="l00169"></a>00169                          <span class="keywordtype">int</span> (*verify_callback)(<span class="keywordtype">int</span>, X509_STORE_CTX *));
<a name="l00170"></a>00170 
<a name="l00171"></a>00171    <span class="comment">/*</span>
<a name="l00172"></a>00172 <span class="comment">    *   SSL_use_certificate - load certificate</span>
<a name="l00173"></a>00173 <span class="comment">    */</span>
<a name="l00174"></a>00174    <span class="keywordtype">int</span> SSL_use_certificate(SSL *ssl, X509 *x);
<a name="l00175"></a>00175 
<a name="l00176"></a>00176    <span class="comment">/*</span>
<a name="l00177"></a>00177 <span class="comment">    *   SSL_get_current_cipher - get SSL_CIPHER of a connection</span>
<a name="l00178"></a>00178 <span class="comment">    */</span>
<a name="l00179"></a>00179    SSL_CIPHER *SSL_get_current_cipher(SSL *ssl);
<a name="l00180"></a>00180 
<a name="l00181"></a>00181    <span class="comment">/*</span>
<a name="l00182"></a>00182 <span class="comment">    *   SSL_set_options - manipulate SSL engine options</span>
<a name="l00183"></a>00183 <span class="comment">    *   Note: These are all mapped to SSL_ctrl so call them as the comment</span>
<a name="l00184"></a>00184 <span class="comment">    *         specifies but know that they use SSL_ctrl.  They are #define</span>
<a name="l00185"></a>00185 <span class="comment">    *         so they will map to the one in this class if called as a</span>
<a name="l00186"></a>00186 <span class="comment">    *         member function of this class.</span>
<a name="l00187"></a>00187 <span class="comment">    */</span>
<a name="l00188"></a>00188    <span class="comment">/* long SSL_set_options(SSL *ssl, long options); */</span>
<a name="l00189"></a>00189    <span class="comment">/*   Returns 0 if not reused, 1 if session id is reused */</span>
<a name="l00190"></a>00190    <span class="comment">/*   int SSL_session_reused(SSL *ssl); */</span>
<a name="l00191"></a>00191    <span class="keywordtype">long</span>    SSL_ctrl(SSL *ssl,<span class="keywordtype">int</span> cmd, <span class="keywordtype">long</span> larg, <span class="keywordtype">char</span> *parg);
<a name="l00192"></a>00192 
<a name="l00193"></a>00193    <span class="comment">/*</span>
<a name="l00194"></a>00194 <span class="comment">    *   RAND_egd - set the path to the EGD</span>
<a name="l00195"></a>00195 <span class="comment">    */</span>
<a name="l00196"></a>00196    <span class="keywordtype">int</span> RAND_egd(<span class="keyword">const</span> <span class="keywordtype">char</span> *path);
<a name="l00197"></a>00197 
<a name="l00198"></a>00198 
<a name="l00199"></a>00199    <span class="comment">/*</span>
<a name="l00200"></a>00200 <span class="comment">    *   RAND_file_name </span>
<a name="l00201"></a>00201 <span class="comment">    */</span>
<a name="l00202"></a>00202    <span class="keyword">const</span> <span class="keywordtype">char</span> *RAND_file_name(<span class="keywordtype">char</span> *buf, <span class="keywordtype">size_t</span> num);
<a name="l00203"></a>00203 
<a name="l00204"></a>00204 
<a name="l00205"></a>00205    <span class="comment">/*</span>
<a name="l00206"></a>00206 <span class="comment">    *   RAND_load_file </span>
<a name="l00207"></a>00207 <span class="comment">    */</span>
<a name="l00208"></a>00208    <span class="keywordtype">int</span> RAND_load_file(<span class="keyword">const</span> <span class="keywordtype">char</span> *filename, <span class="keywordtype">long</span> max_bytes);
<a name="l00209"></a>00209 
<a name="l00210"></a>00210 
<a name="l00211"></a>00211    <span class="comment">/*</span>
<a name="l00212"></a>00212 <span class="comment">    *   RAND_write_file </span>
<a name="l00213"></a>00213 <span class="comment">    */</span>
<a name="l00214"></a>00214    <span class="keywordtype">int</span> RAND_write_file(<span class="keyword">const</span> <span class="keywordtype">char</span> *filename);
<a name="l00215"></a>00215 
<a name="l00216"></a>00216 
<a name="l00217"></a>00217    <span class="comment">/*</span>
<a name="l00218"></a>00218 <span class="comment">    *   TLSv1_client_method - return a TLSv1 client method object</span>
<a name="l00219"></a>00219 <span class="comment">    */</span>
<a name="l00220"></a>00220    SSL_METHOD *TLSv1_client_method();
<a name="l00221"></a>00221 
<a name="l00222"></a>00222 
<a name="l00223"></a>00223    <span class="comment">/*</span>
<a name="l00224"></a>00224 <span class="comment">    *   SSLv2_client_method - return a SSLv2 client method object</span>
<a name="l00225"></a>00225 <span class="comment">    */</span>
<a name="l00226"></a>00226    SSL_METHOD *SSLv2_client_method();
<a name="l00227"></a>00227 
<a name="l00228"></a>00228 
<a name="l00229"></a>00229    <span class="comment">/*</span>
<a name="l00230"></a>00230 <span class="comment">    *   SSLv3_client_method - return a SSLv3 client method object</span>
<a name="l00231"></a>00231 <span class="comment">    */</span>
<a name="l00232"></a>00232    SSL_METHOD *SSLv3_client_method();
<a name="l00233"></a>00233 
<a name="l00234"></a>00234 
<a name="l00235"></a>00235    <span class="comment">/*</span>
<a name="l00236"></a>00236 <span class="comment">    *   SSLv23_client_method - return a SSLv23 client method object</span>
<a name="l00237"></a>00237 <span class="comment">    */</span>
<a name="l00238"></a>00238    SSL_METHOD *SSLv23_client_method();
<a name="l00239"></a>00239 
<a name="l00240"></a>00240 
<a name="l00241"></a>00241    <span class="comment">/*</span>
<a name="l00242"></a>00242 <span class="comment">    *   SSL_get_peer_certificate - return the peer&#39;s certificate</span>
<a name="l00243"></a>00243 <span class="comment">    */</span>
<a name="l00244"></a>00244    X509 *SSL_get_peer_certificate(SSL *s);
<a name="l00245"></a>00245 
<a name="l00246"></a>00246 
<a name="l00247"></a>00247    <span class="comment">/*</span>
<a name="l00248"></a>00248 <span class="comment">    *   SSL_get_peer_cert_chain - get the peer&#39;s certificate chain</span>
<a name="l00249"></a>00249 <span class="comment">    */</span>
<a name="l00250"></a>00250    STACK_OF(X509) *SSL_get_peer_cert_chain(SSL *s);
<a name="l00251"></a>00251 
<a name="l00252"></a>00252    <span class="comment">/*</span>
<a name="l00253"></a>00253 <span class="comment">    *   SSL_CIPHER_get_bits - get the number of bits in this cipher</span>
<a name="l00254"></a>00254 <span class="comment">    */</span>
<a name="l00255"></a>00255    <span class="keywordtype">int</span> SSL_CIPHER_get_bits(SSL_CIPHER *c,<span class="keywordtype">int</span> *alg_bits);
<a name="l00256"></a>00256 
<a name="l00257"></a>00257 
<a name="l00258"></a>00258    <span class="comment">/*</span>
<a name="l00259"></a>00259 <span class="comment">    *   SSL_CIPHER_get_version - get the version of this cipher</span>
<a name="l00260"></a>00260 <span class="comment">    */</span>
<a name="l00261"></a>00261    <span class="keywordtype">char</span> *SSL_CIPHER_get_version(SSL_CIPHER *c);
<a name="l00262"></a>00262 
<a name="l00263"></a>00263 
<a name="l00264"></a>00264    <span class="comment">/*</span>
<a name="l00265"></a>00265 <span class="comment">    *   SSL_CIPHER_get_name - get the name of this cipher</span>
<a name="l00266"></a>00266 <span class="comment">    */</span>
<a name="l00267"></a>00267    <span class="keyword">const</span> <span class="keywordtype">char</span> *SSL_CIPHER_get_name(SSL_CIPHER *c);
<a name="l00268"></a>00268 
<a name="l00269"></a>00269 
<a name="l00270"></a>00270    <span class="comment">/*</span>
<a name="l00271"></a>00271 <span class="comment">    *   SSL_CIPHER_description - get the description of this cipher</span>
<a name="l00272"></a>00272 <span class="comment">    */</span>
<a name="l00273"></a>00273    <span class="keywordtype">char</span> *SSL_CIPHER_description(SSL_CIPHER *,<span class="keywordtype">char</span> *buf,<span class="keywordtype">int</span> size);
<a name="l00274"></a>00274 
<a name="l00275"></a>00275 
<a name="l00276"></a>00276    <span class="comment">/*</span>
<a name="l00277"></a>00277 <span class="comment">    *   SSL_CTX_use_PrivateKey - set the private key for the session.</span>
<a name="l00278"></a>00278 <span class="comment">    *                          - for use with client certificates</span>
<a name="l00279"></a>00279 <span class="comment">    */</span>
<a name="l00280"></a>00280    <span class="keywordtype">int</span> SSL_CTX_use_PrivateKey(SSL_CTX *ctx, EVP_PKEY *pkey);
<a name="l00281"></a>00281 
<a name="l00282"></a>00282 
<a name="l00283"></a>00283    <span class="comment">/*</span>
<a name="l00284"></a>00284 <span class="comment">    *   SSL_CTX_use_certificate - set the client certificate for the session.</span>
<a name="l00285"></a>00285 <span class="comment">    */</span>
<a name="l00286"></a>00286    <span class="keywordtype">int</span> SSL_CTX_use_certificate(SSL_CTX *ctx, X509 *x);
<a name="l00287"></a>00287 
<a name="l00288"></a>00288 
<a name="l00289"></a>00289    <span class="comment">/*</span>
<a name="l00290"></a>00290 <span class="comment">    *   d2i_X509 - Covert a text representation of X509 to an X509 object</span>
<a name="l00291"></a>00291 <span class="comment">    */</span>
<a name="l00292"></a>00292    X509 * d2i_X509(X509 **a,<span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> **pp,<span class="keywordtype">long</span> length);
<a name="l00293"></a>00293 
<a name="l00294"></a>00294 
<a name="l00295"></a>00295    <span class="comment">/*</span>
<a name="l00296"></a>00296 <span class="comment">    *   i2d_X509 - Covert an X509 object into a text representation</span>
<a name="l00297"></a>00297 <span class="comment">    */</span>
<a name="l00298"></a>00298    <span class="keywordtype">int</span> i2d_X509(X509 *a,<span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> **pp);
<a name="l00299"></a>00299 
<a name="l00300"></a>00300 
<a name="l00301"></a>00301    <span class="comment">/*</span>
<a name="l00302"></a>00302 <span class="comment">    *   X509_cmp - compare two X509 objects</span>
<a name="l00303"></a>00303 <span class="comment">    */</span>
<a name="l00304"></a>00304    <span class="keywordtype">int</span> X509_cmp(X509 *a, X509 *b);
<a name="l00305"></a>00305 
<a name="l00306"></a>00306 
<a name="l00307"></a>00307    <span class="comment">/*</span>
<a name="l00308"></a>00308 <span class="comment">    *   X509_dup - duplicate an X509 object</span>
<a name="l00309"></a>00309 <span class="comment">    */</span>
<a name="l00310"></a>00310    X509 *X509_dup(X509 *x509);
<a name="l00311"></a>00311 
<a name="l00312"></a>00312 
<a name="l00313"></a>00313    <span class="comment">/*</span>
<a name="l00314"></a>00314 <span class="comment">    *   X509_STORE_CTX_new - create an X509 store context</span>
<a name="l00315"></a>00315 <span class="comment">    */</span>
<a name="l00316"></a>00316    X509_STORE_CTX *X509_STORE_CTX_new(<span class="keywordtype">void</span>);
<a name="l00317"></a>00317 
<a name="l00318"></a>00318 
<a name="l00319"></a>00319    <span class="comment">/*</span>
<a name="l00320"></a>00320 <span class="comment">    *   X509_STORE_CTX_free - free up an X509 store context</span>
<a name="l00321"></a>00321 <span class="comment">    */</span>
<a name="l00322"></a>00322    <span class="keywordtype">void</span> X509_STORE_CTX_free(X509_STORE_CTX *v);
<a name="l00323"></a>00323 
<a name="l00324"></a>00324 
<a name="l00325"></a>00325    <span class="comment">/*</span>
<a name="l00326"></a>00326 <span class="comment">    *   X509_STORE_CTX_set_chain - set the certificate chain</span>
<a name="l00327"></a>00327 <span class="comment">    */</span>
<a name="l00328"></a>00328    <span class="keywordtype">void</span> X509_STORE_CTX_set_chain(X509_STORE_CTX *v, STACK_OF(X509)* x);
<a name="l00329"></a>00329 
<a name="l00330"></a>00330    <span class="comment">/*</span>
<a name="l00331"></a>00331 <span class="comment">    *   X509_STORE_CTX_set_purpose - set the purpose of the certificate </span>
<a name="l00332"></a>00332 <span class="comment">    */</span>
<a name="l00333"></a>00333    <span class="keywordtype">void</span> X509_STORE_CTX_set_purpose(X509_STORE_CTX *v, <span class="keywordtype">int</span> purpose);
<a name="l00334"></a>00334 
<a name="l00335"></a>00335    <span class="comment">/*</span>
<a name="l00336"></a>00336 <span class="comment">    *   X509_verify_cert - verify the certificate</span>
<a name="l00337"></a>00337 <span class="comment">    */</span>
<a name="l00338"></a>00338    <span class="keywordtype">int</span> X509_verify_cert(X509_STORE_CTX *v);
<a name="l00339"></a>00339 
<a name="l00340"></a>00340 
<a name="l00341"></a>00341    <span class="comment">/*</span>
<a name="l00342"></a>00342 <span class="comment">    *   X509_STORE_new - create an X509 store</span>
<a name="l00343"></a>00343 <span class="comment">    */</span>
<a name="l00344"></a>00344    X509_STORE *X509_STORE_new(<span class="keywordtype">void</span>);
<a name="l00345"></a>00345 
<a name="l00346"></a>00346 
<a name="l00347"></a>00347    <span class="comment">/*</span>
<a name="l00348"></a>00348 <span class="comment">    *   X509_STORE_free - free up an X509 store</span>
<a name="l00349"></a>00349 <span class="comment">    */</span>
<a name="l00350"></a>00350    <span class="keywordtype">void</span> X509_STORE_free(X509_STORE *v);
<a name="l00351"></a>00351 
<a name="l00352"></a>00352 
<a name="l00353"></a>00353    <span class="comment">/*</span>
<a name="l00354"></a>00354 <span class="comment">    *   X509_free - free up an X509</span>
<a name="l00355"></a>00355 <span class="comment">    */</span>
<a name="l00356"></a>00356    <span class="keywordtype">void</span> X509_free(X509 *v);
<a name="l00357"></a>00357 
<a name="l00358"></a>00358 
<a name="l00359"></a>00359    <span class="comment">/*</span>
<a name="l00360"></a>00360 <span class="comment">    *   X509_NAME_oneline - return the X509 data in a string</span>
<a name="l00361"></a>00361 <span class="comment">    */</span>
<a name="l00362"></a>00362    <span class="keywordtype">char</span> *X509_NAME_oneline(X509_NAME *a, <span class="keywordtype">char</span> *buf, <span class="keywordtype">int</span> size);
<a name="l00363"></a>00363 
<a name="l00364"></a>00364 
<a name="l00365"></a>00365    <span class="comment">/*</span>
<a name="l00366"></a>00366 <span class="comment">    *   X509_get_subject_name - return the X509_NAME for the subject field</span>
<a name="l00367"></a>00367 <span class="comment">    */</span>
<a name="l00368"></a>00368    X509_NAME *X509_get_subject_name(X509 *a);
<a name="l00369"></a>00369 
<a name="l00370"></a>00370 
<a name="l00371"></a>00371    <span class="comment">/*</span>
<a name="l00372"></a>00372 <span class="comment">    *   X509_get_issuer_name - return the X509_NAME for the issuer field</span>
<a name="l00373"></a>00373 <span class="comment">    */</span>
<a name="l00374"></a>00374    X509_NAME *X509_get_issuer_name(X509 *a);
<a name="l00375"></a>00375 
<a name="l00376"></a>00376 
<a name="l00377"></a>00377    <span class="comment">/*</span>
<a name="l00378"></a>00378 <span class="comment">    *   X509_STORE_add_lookup - add a lookup file/method to an X509 store</span>
<a name="l00379"></a>00379 <span class="comment">    */</span>
<a name="l00380"></a>00380    X509_LOOKUP *X509_STORE_add_lookup(X509_STORE *v, X509_LOOKUP_METHOD *m);
<a name="l00381"></a>00381 
<a name="l00382"></a>00382 
<a name="l00383"></a>00383    <span class="comment">/*</span>
<a name="l00384"></a>00384 <span class="comment">    *   X509_LOOKUP_file - Definition of the LOOKUP_file method</span>
<a name="l00385"></a>00385 <span class="comment">    */</span>
<a name="l00386"></a>00386    X509_LOOKUP_METHOD *X509_LOOKUP_file(<span class="keywordtype">void</span>);
<a name="l00387"></a>00387 
<a name="l00388"></a>00388 
<a name="l00389"></a>00389    <span class="comment">/*</span>
<a name="l00390"></a>00390 <span class="comment">    *   X509_LOOKUP_free - Free an X509_LOOKUP</span>
<a name="l00391"></a>00391 <span class="comment">    */</span>
<a name="l00392"></a>00392    <span class="keywordtype">void</span> X509_LOOKUP_free(X509_LOOKUP *x);
<a name="l00393"></a>00393 
<a name="l00394"></a>00394 
<a name="l00395"></a>00395    <span class="comment">/*</span>
<a name="l00396"></a>00396 <span class="comment">    *   X509_LOOKUP_ctrl - This is not normally called directly (use macros)</span>
<a name="l00397"></a>00397 <span class="comment">    */</span>
<a name="l00398"></a>00398    <span class="keywordtype">int</span> X509_LOOKUP_ctrl(X509_LOOKUP *ctx, <span class="keywordtype">int</span> cmd, <span class="keyword">const</span> <span class="keywordtype">char</span> *argc, <span class="keywordtype">long</span> argl, <span class="keywordtype">char</span> **ret);
<a name="l00399"></a>00399 
<a name="l00400"></a>00400 
<a name="l00401"></a>00401    <span class="comment">/*</span>
<a name="l00402"></a>00402 <span class="comment">    *   X509_STORE_CTX_init - initialize an X509 STORE context</span>
<a name="l00403"></a>00403 <span class="comment">    */</span>
<a name="l00404"></a>00404    <span class="keywordtype">void</span> X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, STACK_OF(X509) *chain);
<a name="l00405"></a>00405 
<a name="l00406"></a>00406 
<a name="l00407"></a>00407    <span class="comment">/*</span>
<a name="l00408"></a>00408 <span class="comment">    *   CRYPTO_free - free up an internally allocated object</span>
<a name="l00409"></a>00409 <span class="comment">    */</span>
<a name="l00410"></a>00410    <span class="keywordtype">void</span> CRYPTO_free(<span class="keywordtype">void</span> *x);
<a name="l00411"></a>00411 
<a name="l00412"></a>00412    <span class="comment">/*</span>
<a name="l00413"></a>00413 <span class="comment">    *   BIO_new - create new BIO</span>
<a name="l00414"></a>00414 <span class="comment">    */</span>
<a name="l00415"></a>00415    BIO *BIO_new(BIO_METHOD *type);
<a name="l00416"></a>00416 
<a name="l00417"></a>00417    <span class="comment">/*</span>
<a name="l00418"></a>00418 <span class="comment">    *   BIO methods - only one defined here yet</span>
<a name="l00419"></a>00419 <span class="comment">    */</span>
<a name="l00420"></a>00420    BIO_METHOD *BIO_s_mem(<span class="keywordtype">void</span>);
<a name="l00421"></a>00421 
<a name="l00422"></a>00422    <span class="comment">/*</span>
<a name="l00423"></a>00423 <span class="comment">    *   BIO_new_fp - nastiness called BIO - used to create BIO* from FILE*</span>
<a name="l00424"></a>00424 <span class="comment">    */</span>
<a name="l00425"></a>00425    BIO *BIO_new_fp(FILE *stream, <span class="keywordtype">int</span> close_flag);
<a name="l00426"></a>00426 
<a name="l00427"></a>00427    <span class="comment">/*</span>
<a name="l00428"></a>00428 <span class="comment">    *   BIO_new_mem_buf - read only BIO from memory region</span>
<a name="l00429"></a>00429 <span class="comment">    */</span>
<a name="l00430"></a>00430    BIO *BIO_new_mem_buf(<span class="keywordtype">void</span> *buf, <span class="keywordtype">int</span> len);
<a name="l00431"></a>00431 
<a name="l00432"></a>00432    <span class="comment">/*</span>
<a name="l00433"></a>00433 <span class="comment">    *   BIO_free - nastiness called BIO - used to destroy BIO*</span>
<a name="l00434"></a>00434 <span class="comment">    */</span>
<a name="l00435"></a>00435    <span class="keywordtype">int</span> BIO_free(BIO *a);
<a name="l00436"></a>00436 
<a name="l00437"></a>00437    <span class="comment">/*</span>
<a name="l00438"></a>00438 <span class="comment">    *   BIO_ctrl - BIO control method</span>
<a name="l00439"></a>00439 <span class="comment">    */</span>
<a name="l00440"></a>00440    <span class="keywordtype">long</span> BIO_ctrl(BIO *bp,<span class="keywordtype">int</span> cmd,<span class="keywordtype">long</span> larg,<span class="keywordtype">void</span> *parg);
<a name="l00441"></a>00441 
<a name="l00442"></a>00442    <span class="comment">/*</span>
<a name="l00443"></a>00443 <span class="comment">    *   BIO_write - equivalent to ::write for BIO</span>
<a name="l00444"></a>00444 <span class="comment">    */</span>
<a name="l00445"></a>00445    <span class="keywordtype">int</span> BIO_write(BIO *b, <span class="keyword">const</span> <span class="keywordtype">void</span> *data, <span class="keywordtype">int</span> len);
<a name="l00446"></a>00446 
<a name="l00447"></a>00447    <span class="comment">/*</span>
<a name="l00448"></a>00448 <span class="comment">    *   PEM_write_bio_X509 - write a PEM encoded cert to a BIO*</span>
<a name="l00449"></a>00449 <span class="comment">    */</span>
<a name="l00450"></a>00450    <span class="keywordtype">int</span> PEM_write_bio_X509(BIO *bp, X509 *x);
<a name="l00451"></a>00451 
<a name="l00452"></a>00452 <span class="preprocessor">#if OPENSSL_VERSION_NUMBER &lt; 0x10000000L</span>
<a name="l00453"></a>00453 <span class="preprocessor"></span>   <span class="comment">/*</span>
<a name="l00454"></a>00454 <span class="comment">    *   X509_asn1_meth - used for netscape output</span>
<a name="l00455"></a>00455 <span class="comment">    */</span>
<a name="l00456"></a>00456    ASN1_METHOD *X509_asn1_meth();
<a name="l00457"></a>00457 <span class="preprocessor">#endif</span>
<a name="l00458"></a>00458 <span class="preprocessor"></span>
<a name="l00459"></a>00459    <span class="comment">/*</span>
<a name="l00460"></a>00460 <span class="comment">    *   ASN1_i2d_fp - used for netscape output</span>
<a name="l00461"></a>00461 <span class="comment">    */</span>
<a name="l00462"></a>00462    <span class="keywordtype">int</span> ASN1_i2d_fp(FILE *out, <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *x);
<a name="l00463"></a>00463 
<a name="l00464"></a>00464 
<a name="l00465"></a>00465    <span class="comment">/*</span>
<a name="l00466"></a>00466 <span class="comment">    *   ASN1_d2i_fp - read an X509 from a DER encoded file (buf can be NULL)</span>
<a name="l00467"></a>00467 <span class="comment">    */</span>
<a name="l00468"></a>00468    X509 *X509_d2i_fp(FILE *out, X509** buf);
<a name="l00469"></a>00469 
<a name="l00470"></a>00470 
<a name="l00471"></a>00471    <span class="comment">/*</span>
<a name="l00472"></a>00472 <span class="comment">    *   X509_print - print the text form of an X509</span>
<a name="l00473"></a>00473 <span class="comment">    */</span>
<a name="l00474"></a>00474    <span class="keywordtype">int</span> X509_print(FILE *fp, X509 *x);
<a name="l00475"></a>00475 
<a name="l00476"></a>00476 
<a name="l00477"></a>00477    <span class="comment">/*</span>
<a name="l00478"></a>00478 <span class="comment">    *   Read a PKCS#12 cert from fp</span>
<a name="l00479"></a>00479 <span class="comment">    */</span>
<a name="l00480"></a>00480    PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12);
<a name="l00481"></a>00481 
<a name="l00482"></a>00482 
<a name="l00483"></a>00483    <span class="comment">/*</span>
<a name="l00484"></a>00484 <span class="comment">    *   Change the password on a PKCS#12 cert</span>
<a name="l00485"></a>00485 <span class="comment">    */</span>
<a name="l00486"></a>00486    <span class="keywordtype">int</span> PKCS12_newpass(PKCS12 *p12, <span class="keywordtype">char</span> *oldpass, <span class="keywordtype">char</span> *newpass);
<a name="l00487"></a>00487 
<a name="l00488"></a>00488 
<a name="l00489"></a>00489    <span class="comment">/*</span>
<a name="l00490"></a>00490 <span class="comment">    *   Write a PKCS#12 to mem</span>
<a name="l00491"></a>00491 <span class="comment">    */</span>
<a name="l00492"></a>00492    <span class="keywordtype">int</span> i2d_PKCS12(PKCS12 *p12, <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> **p);
<a name="l00493"></a>00493 
<a name="l00494"></a>00494 
<a name="l00495"></a>00495    <span class="comment">/*</span>
<a name="l00496"></a>00496 <span class="comment">    *   Write a PKCS#12 to FILE*</span>
<a name="l00497"></a>00497 <span class="comment">    */</span>
<a name="l00498"></a>00498    <span class="keywordtype">int</span> i2d_PKCS12_fp(FILE *fp, PKCS12 *p12);
<a name="l00499"></a>00499 
<a name="l00500"></a>00500 
<a name="l00501"></a>00501    <span class="comment">/*</span>
<a name="l00502"></a>00502 <span class="comment">    *   Create a new PKCS#12 object</span>
<a name="l00503"></a>00503 <span class="comment">    */</span>
<a name="l00504"></a>00504    PKCS12 *PKCS12_new(<span class="keywordtype">void</span>);
<a name="l00505"></a>00505 
<a name="l00506"></a>00506 
<a name="l00507"></a>00507    <span class="comment">/*</span>
<a name="l00508"></a>00508 <span class="comment">    *   Destroy that PKCS#12 that you created!</span>
<a name="l00509"></a>00509 <span class="comment">    */</span>
<a name="l00510"></a>00510    <span class="keywordtype">void</span> PKCS12_free(PKCS12 *a);
<a name="l00511"></a>00511 
<a name="l00512"></a>00512 
<a name="l00513"></a>00513    <span class="comment">/* </span>
<a name="l00514"></a>00514 <span class="comment">    *   Parse the PKCS#12 </span>
<a name="l00515"></a>00515 <span class="comment">    */</span>
<a name="l00516"></a>00516    <span class="keywordtype">int</span> PKCS12_parse(PKCS12 *p12, <span class="keyword">const</span> <span class="keywordtype">char</span> *pass, EVP_PKEY **pkey,
<a name="l00517"></a>00517                     X509 **cert, STACK_OF(X509) **ca);
<a name="l00518"></a>00518 
<a name="l00519"></a>00519 
<a name="l00520"></a>00520    <span class="comment">/* </span>
<a name="l00521"></a>00521 <span class="comment">    *   Free the Private Key</span>
<a name="l00522"></a>00522 <span class="comment">    */</span>
<a name="l00523"></a>00523    <span class="keywordtype">void</span> EVP_PKEY_free(EVP_PKEY *x);
<a name="l00524"></a>00524 
<a name="l00525"></a>00525 
<a name="l00526"></a>00526    <span class="comment">/* </span>
<a name="l00527"></a>00527 <span class="comment">    *   Pop off the stack</span>
<a name="l00528"></a>00528 <span class="comment">    */</span>
<a name="l00529"></a>00529    <span class="keywordtype">char</span> *sk_pop(STACK *s);
<a name="l00530"></a>00530 
<a name="l00531"></a>00531 
<a name="l00532"></a>00532    <span class="comment">/* </span>
<a name="l00533"></a>00533 <span class="comment">    *   Free the stack</span>
<a name="l00534"></a>00534 <span class="comment">    */</span>
<a name="l00535"></a>00535    <span class="keywordtype">void</span> sk_free(STACK *s);
<a name="l00536"></a>00536 
<a name="l00537"></a>00537 <span class="preprocessor">#if OPENSSL_VERSION_NUMBER &gt;= 0x10000000L</span>
<a name="l00538"></a>00538 <span class="preprocessor"></span>   <span class="keywordtype">void</span> sk_free(<span class="keywordtype">void</span> *s) { <span class="keywordflow">return</span> sk_free(reinterpret_cast&lt;STACK*&gt;(s)); }
<a name="l00539"></a>00539 <span class="preprocessor">#endif</span>
<a name="l00540"></a>00540 <span class="preprocessor"></span>
<a name="l00541"></a>00541    <span class="comment">/* </span>
<a name="l00542"></a>00542 <span class="comment">    *  Number of elements in the stack</span>
<a name="l00543"></a>00543 <span class="comment">    */</span>
<a name="l00544"></a>00544    <span class="keywordtype">int</span> sk_num(STACK *s);
<a name="l00545"></a>00545 
<a name="l00546"></a>00546 
<a name="l00547"></a>00547    <span class="comment">/* </span>
<a name="l00548"></a>00548 <span class="comment">    *  Value of element n in the stack</span>
<a name="l00549"></a>00549 <span class="comment">    */</span>
<a name="l00550"></a>00550    <span class="keywordtype">char</span> *sk_value(STACK *s, <span class="keywordtype">int</span> n);
<a name="l00551"></a>00551 
<a name="l00552"></a>00552 <span class="preprocessor">#if OPENSSL_VERSION_NUMBER &gt;= 0x10000000L</span>
<a name="l00553"></a>00553 <span class="preprocessor"></span>   <span class="keywordtype">char</span> *sk_value(<span class="keywordtype">void</span> *s, <span class="keywordtype">int</span> n) { <span class="keywordflow">return</span> sk_value(reinterpret_cast&lt;STACK*&gt;(s), n); }
<a name="l00554"></a>00554 <span class="preprocessor">#endif</span>
<a name="l00555"></a>00555 <span class="preprocessor"></span>
<a name="l00556"></a>00556    <span class="comment">/* </span>
<a name="l00557"></a>00557 <span class="comment">    *  Create a new stack</span>
<a name="l00558"></a>00558 <span class="comment">    */</span>
<a name="l00559"></a>00559    STACK *sk_new(<span class="keywordtype">int</span> (*cmp)());
<a name="l00560"></a>00560 
<a name="l00561"></a>00561 
<a name="l00562"></a>00562    <span class="comment">/* </span>
<a name="l00563"></a>00563 <span class="comment">    *  Add an element to the stack</span>
<a name="l00564"></a>00564 <span class="comment">    */</span>
<a name="l00565"></a>00565    <span class="keywordtype">int</span> sk_push(STACK *s, <span class="keywordtype">char</span> *d);
<a name="l00566"></a>00566 
<a name="l00567"></a>00567 <span class="preprocessor">#if OPENSSL_VERSION_NUMBER &gt;= 0x10000000L</span>
<a name="l00568"></a>00568 <span class="preprocessor"></span>   <span class="keywordtype">int</span> sk_push(<span class="keywordtype">void</span> *s, <span class="keywordtype">void</span> *d) { <span class="keywordflow">return</span> sk_push(reinterpret_cast&lt;STACK*&gt;(s), reinterpret_cast&lt;char*&gt;(d)); }
<a name="l00569"></a>00569 <span class="preprocessor">#endif</span>
<a name="l00570"></a>00570 <span class="preprocessor"></span>
<a name="l00571"></a>00571    <span class="comment">/* </span>
<a name="l00572"></a>00572 <span class="comment">    *  Duplicate the stack</span>
<a name="l00573"></a>00573 <span class="comment">    */</span>
<a name="l00574"></a>00574    STACK *sk_dup(STACK *s);
<a name="l00575"></a>00575 
<a name="l00576"></a>00576 
<a name="l00577"></a>00577    <span class="comment">/*</span>
<a name="l00578"></a>00578 <span class="comment">    *  Convert an ASN1_INTEGER to it&#39;s text form</span>
<a name="l00579"></a>00579 <span class="comment">    */</span>
<a name="l00580"></a>00580    <span class="keywordtype">char</span> *i2s_ASN1_INTEGER(X509V3_EXT_METHOD *meth, ASN1_INTEGER *aint);
<a name="l00581"></a>00581 
<a name="l00582"></a>00582 
<a name="l00583"></a>00583    <span class="comment">/*</span>
<a name="l00584"></a>00584 <span class="comment">    *  Get the certificate&#39;s serial number</span>
<a name="l00585"></a>00585 <span class="comment">    */</span>
<a name="l00586"></a>00586    ASN1_INTEGER *X509_get_serialNumber(X509 *x);
<a name="l00587"></a>00587 
<a name="l00588"></a>00588 
<a name="l00589"></a>00589    <span class="comment">/*</span>
<a name="l00590"></a>00590 <span class="comment">    *  Get the certificate&#39;s public key</span>
<a name="l00591"></a>00591 <span class="comment">    */</span>
<a name="l00592"></a>00592    EVP_PKEY *X509_get_pubkey(X509 *x);
<a name="l00593"></a>00593 
<a name="l00594"></a>00594 
<a name="l00595"></a>00595    <span class="comment">/*</span>
<a name="l00596"></a>00596 <span class="comment">    *  Convert the public key to a decimal form</span>
<a name="l00597"></a>00597 <span class="comment">    */</span>
<a name="l00598"></a>00598    <span class="keywordtype">int</span> i2d_PublicKey(EVP_PKEY *a, <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> **pp); 
<a name="l00599"></a>00599 
<a name="l00600"></a>00600 
<a name="l00601"></a>00601    <span class="comment">/*</span>
<a name="l00602"></a>00602 <span class="comment">    *  Check the private key of a PKCS bundle against the X509</span>
<a name="l00603"></a>00603 <span class="comment">    */</span>
<a name="l00604"></a>00604    <span class="keywordtype">int</span> X509_check_private_key(X509 *x, EVP_PKEY *p);
<a name="l00605"></a>00605 
<a name="l00606"></a>00606 
<a name="l00607"></a>00607    <span class="comment">/*</span>
<a name="l00608"></a>00608 <span class="comment">    *  Convert a BIGNUM to a hex string</span>
<a name="l00609"></a>00609 <span class="comment">    */</span>
<a name="l00610"></a>00610    <span class="keywordtype">char</span> *BN_bn2hex(<span class="keyword">const</span> BIGNUM *a);
<a name="l00611"></a>00611 
<a name="l00612"></a>00612 
<a name="l00613"></a>00613    <span class="comment">/*</span>
<a name="l00614"></a>00614 <span class="comment">    *  Compute the digest of an X.509</span>
<a name="l00615"></a>00615 <span class="comment">    */</span>
<a name="l00616"></a>00616    <span class="keywordtype">int</span> X509_digest(<span class="keyword">const</span> X509 *x,<span class="keyword">const</span> EVP_MD *t, <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *md, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> *len);
<a name="l00617"></a>00617 
<a name="l00618"></a>00618 
<a name="l00619"></a>00619    <span class="comment">/*</span>
<a name="l00620"></a>00620 <span class="comment">    *  EVP_md5</span>
<a name="l00621"></a>00621 <span class="comment">    */</span>
<a name="l00622"></a>00622    EVP_MD *EVP_md5();
<a name="l00623"></a>00623 
<a name="l00624"></a>00624 
<a name="l00625"></a>00625    <span class="comment">/*</span>
<a name="l00626"></a>00626 <span class="comment">    *  ASN1_INTEGER free</span>
<a name="l00627"></a>00627 <span class="comment">    */</span>
<a name="l00628"></a>00628    <span class="keywordtype">void</span> ASN1_INTEGER_free(ASN1_INTEGER *x);
<a name="l00629"></a>00629 
<a name="l00630"></a>00630 
<a name="l00631"></a>00631    <span class="comment">/*</span>
<a name="l00632"></a>00632 <span class="comment">    *  ASN1_STRING_data</span>
<a name="l00633"></a>00633 <span class="comment">    */</span>
<a name="l00634"></a>00634    <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *ASN1_STRING_data(ASN1_STRING *x);
<a name="l00635"></a>00635 
<a name="l00636"></a>00636    <span class="comment">/*</span>
<a name="l00637"></a>00637 <span class="comment">    *  ASN1_STRING_length</span>
<a name="l00638"></a>00638 <span class="comment">    */</span>
<a name="l00639"></a>00639    <span class="keywordtype">int</span> ASN1_STRING_length(ASN1_STRING *x);
<a name="l00640"></a>00640 
<a name="l00641"></a>00641    <span class="comment">/*</span>
<a name="l00642"></a>00642 <span class="comment">    *  </span>
<a name="l00643"></a>00643 <span class="comment">    */</span>
<a name="l00644"></a>00644    <span class="keywordtype">int</span> OBJ_obj2nid(ASN1_OBJECT *o);
<a name="l00645"></a>00645 
<a name="l00646"></a>00646    <span class="comment">/*</span>
<a name="l00647"></a>00647 <span class="comment">    *  </span>
<a name="l00648"></a>00648 <span class="comment">    */</span>
<a name="l00649"></a>00649    <span class="keyword">const</span> <span class="keywordtype">char</span> * OBJ_nid2ln(<span class="keywordtype">int</span> n);
<a name="l00650"></a>00650 
<a name="l00651"></a>00651    <span class="comment">/*</span>
<a name="l00652"></a>00652 <span class="comment">    * get the number of extensions</span>
<a name="l00653"></a>00653 <span class="comment">    */</span>
<a name="l00654"></a>00654    <span class="keywordtype">int</span> X509_get_ext_count(X509 *x);
<a name="l00655"></a>00655 
<a name="l00656"></a>00656    <span class="comment">/*</span>
<a name="l00657"></a>00657 <span class="comment">    * </span>
<a name="l00658"></a>00658 <span class="comment">    */</span>
<a name="l00659"></a>00659    <span class="keywordtype">int</span> X509_get_ext_by_NID(X509 *x, <span class="keywordtype">int</span> nid, <span class="keywordtype">int</span> lastpos);
<a name="l00660"></a>00660 
<a name="l00661"></a>00661    <span class="comment">/*</span>
<a name="l00662"></a>00662 <span class="comment">    *</span>
<a name="l00663"></a>00663 <span class="comment">    */</span>
<a name="l00664"></a>00664    <span class="keywordtype">int</span> X509_get_ext_by_OBJ(X509 *x,ASN1_OBJECT *obj,<span class="keywordtype">int</span> lastpos);
<a name="l00665"></a>00665 
<a name="l00666"></a>00666    <span class="comment">/*</span>
<a name="l00667"></a>00667 <span class="comment">    *</span>
<a name="l00668"></a>00668 <span class="comment">    */</span>
<a name="l00669"></a>00669    X509_EXTENSION *X509_get_ext(X509 *x, <span class="keywordtype">int</span> loc);
<a name="l00670"></a>00670 
<a name="l00671"></a>00671    <span class="comment">/*</span>
<a name="l00672"></a>00672 <span class="comment">    *</span>
<a name="l00673"></a>00673 <span class="comment">    */</span>
<a name="l00674"></a>00674    X509_EXTENSION *X509_delete_ext(X509 *x, <span class="keywordtype">int</span> loc);
<a name="l00675"></a>00675 
<a name="l00676"></a>00676    <span class="comment">/*</span>
<a name="l00677"></a>00677 <span class="comment">    *</span>
<a name="l00678"></a>00678 <span class="comment">    */</span>
<a name="l00679"></a>00679    <span class="keywordtype">int</span> X509_add_ext(X509 *x, X509_EXTENSION *ex, <span class="keywordtype">int</span> loc);
<a name="l00680"></a>00680 
<a name="l00681"></a>00681    <span class="comment">/*</span>
<a name="l00682"></a>00682 <span class="comment">    *</span>
<a name="l00683"></a>00683 <span class="comment">    */</span>
<a name="l00684"></a>00684    <span class="keywordtype">void</span> *X509_get_ext_d2i(X509 *x, <span class="keywordtype">int</span> nid, <span class="keywordtype">int</span> *crit, <span class="keywordtype">int</span> *idx);
<a name="l00685"></a>00685 
<a name="l00686"></a>00686    <span class="comment">/*</span>
<a name="l00687"></a>00687 <span class="comment">    *</span>
<a name="l00688"></a>00688 <span class="comment">    */</span>
<a name="l00689"></a>00689    <span class="keywordtype">char</span> *i2s_ASN1_OCTET_STRING(X509V3_EXT_METHOD *method, ASN1_OCTET_STRING *ia5);
<a name="l00690"></a>00690 
<a name="l00691"></a>00691    <span class="comment">/*</span>
<a name="l00692"></a>00692 <span class="comment">    *</span>
<a name="l00693"></a>00693 <span class="comment">    */</span>
<a name="l00694"></a>00694    <span class="keywordtype">int</span> ASN1_BIT_STRING_get_bit(ASN1_BIT_STRING *a, <span class="keywordtype">int</span> n);
<a name="l00695"></a>00695 
<a name="l00696"></a>00696    <span class="comment">/*</span>
<a name="l00697"></a>00697 <span class="comment">    *</span>
<a name="l00698"></a>00698 <span class="comment">    */</span>
<a name="l00699"></a>00699    PKCS7 *PKCS7_new(<span class="keywordtype">void</span>);
<a name="l00700"></a>00700 
<a name="l00701"></a>00701    <span class="comment">/*</span>
<a name="l00702"></a>00702 <span class="comment">    *</span>
<a name="l00703"></a>00703 <span class="comment">    */</span>
<a name="l00704"></a>00704    <span class="keywordtype">void</span> PKCS7_free(PKCS7 *a);
<a name="l00705"></a>00705 
<a name="l00706"></a>00706    <span class="comment">/*</span>
<a name="l00707"></a>00707 <span class="comment">    *</span>
<a name="l00708"></a>00708 <span class="comment">    */</span>
<a name="l00709"></a>00709    <span class="keywordtype">void</span> PKCS7_content_free(PKCS7 *a);
<a name="l00710"></a>00710 
<a name="l00711"></a>00711    <span class="comment">/*</span>
<a name="l00712"></a>00712 <span class="comment">    *</span>
<a name="l00713"></a>00713 <span class="comment">    */</span>
<a name="l00714"></a>00714    <span class="keywordtype">int</span> i2d_PKCS7(PKCS7 *a, <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> **pp);
<a name="l00715"></a>00715 
<a name="l00716"></a>00716    <span class="comment">/*</span>
<a name="l00717"></a>00717 <span class="comment">    *</span>
<a name="l00718"></a>00718 <span class="comment">    */</span>
<a name="l00719"></a>00719    PKCS7 *d2i_PKCS7(PKCS7 **a, <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> **pp,<span class="keywordtype">long</span> length);
<a name="l00720"></a>00720 
<a name="l00721"></a>00721    <span class="comment">/*</span>
<a name="l00722"></a>00722 <span class="comment">    *</span>
<a name="l00723"></a>00723 <span class="comment">    */</span>
<a name="l00724"></a>00724    <span class="keywordtype">int</span> i2d_PKCS7_fp(FILE *fp,PKCS7 *p7);
<a name="l00725"></a>00725 
<a name="l00726"></a>00726    <span class="comment">/*</span>
<a name="l00727"></a>00727 <span class="comment">    * </span>
<a name="l00728"></a>00728 <span class="comment">    */</span>
<a name="l00729"></a>00729    PKCS7 *d2i_PKCS7_fp(FILE *fp,PKCS7 **p7);
<a name="l00730"></a>00730 
<a name="l00731"></a>00731    <span class="comment">/*</span>
<a name="l00732"></a>00732 <span class="comment">    *</span>
<a name="l00733"></a>00733 <span class="comment">    */</span>
<a name="l00734"></a>00734    <span class="keywordtype">int</span> i2d_PKCS7_bio(BIO *bp,PKCS7 *p7);
<a name="l00735"></a>00735 
<a name="l00736"></a>00736    <span class="comment">/*</span>
<a name="l00737"></a>00737 <span class="comment">    *</span>
<a name="l00738"></a>00738 <span class="comment">    */</span>
<a name="l00739"></a>00739    PKCS7 *d2i_PKCS7_bio(BIO *bp,PKCS7 **p7);
<a name="l00740"></a>00740 
<a name="l00741"></a>00741    <span class="comment">/*</span>
<a name="l00742"></a>00742 <span class="comment">    *</span>
<a name="l00743"></a>00743 <span class="comment">    */</span>
<a name="l00744"></a>00744    PKCS7 *PKCS7_dup(PKCS7 *p7);
<a name="l00745"></a>00745 
<a name="l00746"></a>00746    <span class="comment">/*</span>
<a name="l00747"></a>00747 <span class="comment">    *  Create a PKCS7 signature / signed message</span>
<a name="l00748"></a>00748 <span class="comment">    */</span>
<a name="l00749"></a>00749    PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs,
<a name="l00750"></a>00750              BIO *data, <span class="keywordtype">int</span> flags);
<a name="l00751"></a>00751 
<a name="l00752"></a>00752    <span class="comment">/*</span>
<a name="l00753"></a>00753 <span class="comment">    *  Verify a PKCS7 signature.</span>
<a name="l00754"></a>00754 <span class="comment">    */</span>
<a name="l00755"></a>00755    <span class="keywordtype">int</span> PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store,
<a name="l00756"></a>00756                                               BIO *indata, BIO *out, <span class="keywordtype">int</span> flags);
<a name="l00757"></a>00757 
<a name="l00758"></a>00758    <span class="comment">/*</span>
<a name="l00759"></a>00759 <span class="comment">    *  Get signers of a verified PKCS7 signature</span>
<a name="l00760"></a>00760 <span class="comment">    */</span>
<a name="l00761"></a>00761    STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, <span class="keywordtype">int</span> flags);
<a name="l00762"></a>00762 
<a name="l00763"></a>00763    <span class="comment">/*</span>
<a name="l00764"></a>00764 <span class="comment">    *  PKCS7 encrypt message</span>
<a name="l00765"></a>00765 <span class="comment">    */</span>
<a name="l00766"></a>00766    PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, EVP_CIPHER *cipher,
<a name="l00767"></a>00767             <span class="keywordtype">int</span> flags);
<a name="l00768"></a>00768 
<a name="l00769"></a>00769    <span class="comment">/*</span>
<a name="l00770"></a>00770 <span class="comment">    *  decrypt PKCS7 message</span>
<a name="l00771"></a>00771 <span class="comment">    */</span>
<a name="l00772"></a>00772    <span class="keywordtype">int</span> PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, <span class="keywordtype">int</span> flags);
<a name="l00773"></a>00773 
<a name="l00774"></a>00774 
<a name="l00775"></a>00775    <span class="comment">/*</span>
<a name="l00776"></a>00776 <span class="comment">    * Load a CA list file.</span>
<a name="l00777"></a>00777 <span class="comment">    */</span>
<a name="l00778"></a>00778    STACK_OF(X509_NAME) *SSL_load_client_CA_file(<span class="keyword">const</span> <span class="keywordtype">char</span> *file);
<a name="l00779"></a>00779 
<a name="l00780"></a>00780    <span class="comment">/*</span>
<a name="l00781"></a>00781 <span class="comment">    * Load a file of PEM encoded objects.</span>
<a name="l00782"></a>00782 <span class="comment">    */</span>
<a name="l00783"></a>00783    STACK_OF(X509_INFO) *PEM_X509_INFO_read(FILE *fp, STACK_OF(X509_INFO) *sk,
<a name="l00784"></a>00784                    pem_password_cb *cb, <span class="keywordtype">void</span> *u);
<a name="l00785"></a>00785 
<a name="l00786"></a>00786    <span class="comment">/*</span>
<a name="l00787"></a>00787 <span class="comment">    * Get the number of purposes available</span>
<a name="l00788"></a>00788 <span class="comment">    */</span>
<a name="l00789"></a>00789    <span class="keywordtype">int</span> X509_PURPOSE_get_count();
<a name="l00790"></a>00790 
<a name="l00791"></a>00791 
<a name="l00792"></a>00792    <span class="comment">/*</span>
<a name="l00793"></a>00793 <span class="comment">    * Get the ID of a purpose</span>
<a name="l00794"></a>00794 <span class="comment">    */</span>
<a name="l00795"></a>00795    <span class="keywordtype">int</span> X509_PURPOSE_get_id(X509_PURPOSE *);
<a name="l00796"></a>00796 
<a name="l00797"></a>00797 
<a name="l00798"></a>00798    <span class="comment">/*</span>
<a name="l00799"></a>00799 <span class="comment">    * Check the existence of purpose id &quot;id&quot; in x.  for CA, set ca = 1, else 0</span>
<a name="l00800"></a>00800 <span class="comment">    */</span>
<a name="l00801"></a>00801    <span class="keywordtype">int</span> X509_check_purpose(X509 *x, <span class="keywordtype">int</span> <span class="keywordtype">id</span>, <span class="keywordtype">int</span> ca);
<a name="l00802"></a>00802 
<a name="l00803"></a>00803 
<a name="l00804"></a>00804    <span class="comment">/*</span>
<a name="l00805"></a>00805 <span class="comment">    * Get the purpose with index #idx</span>
<a name="l00806"></a>00806 <span class="comment">    */</span>
<a name="l00807"></a>00807    X509_PURPOSE * X509_PURPOSE_get0(<span class="keywordtype">int</span> idx);
<a name="l00808"></a>00808 
<a name="l00809"></a>00809 
<a name="l00810"></a>00810    <span class="comment">/*</span>
<a name="l00811"></a>00811 <span class="comment">    * Create a new Private KEY</span>
<a name="l00812"></a>00812 <span class="comment">    */</span>
<a name="l00813"></a>00813    EVP_PKEY* EVP_PKEY_new();
<a name="l00814"></a>00814 
<a name="l00815"></a>00815 
<a name="l00816"></a>00816    <span class="comment">/*</span>
<a name="l00817"></a>00817 <span class="comment">    * Assign a private key</span>
<a name="l00818"></a>00818 <span class="comment">    */</span>
<a name="l00819"></a>00819    <span class="keywordtype">int</span> EVP_PKEY_assign(EVP_PKEY *pkey, <span class="keywordtype">int</span> type, <span class="keywordtype">char</span> *key);
<a name="l00820"></a>00820 
<a name="l00821"></a>00821 
<a name="l00822"></a>00822    <span class="comment">/*</span>
<a name="l00823"></a>00823 <span class="comment">    * Generate a RSA key</span>
<a name="l00824"></a>00824 <span class="comment">    */</span>
<a name="l00825"></a>00825    RSA *RSA_generate_key(<span class="keywordtype">int</span> bits, <span class="keywordtype">unsigned</span> <span class="keywordtype">long</span> e, <span class="keywordtype">void</span>
<a name="l00826"></a>00826                         (*callback)(<span class="keywordtype">int</span>,<span class="keywordtype">int</span>,<span class="keywordtype">void</span> *), <span class="keywordtype">void</span> *cb_arg);
<a name="l00827"></a>00827 
<a name="l00828"></a>00828 
<a name="l00829"></a>00829    <span class="comment">/*</span>
<a name="l00830"></a>00830 <span class="comment">    * Create/destroy a certificate request</span>
<a name="l00831"></a>00831 <span class="comment">    */</span>
<a name="l00832"></a>00832    X509_REQ *X509_REQ_new();
<a name="l00833"></a>00833    <span class="keywordtype">void</span> X509_REQ_free(X509_REQ *a);
<a name="l00834"></a>00834 
<a name="l00835"></a>00835 
<a name="l00836"></a>00836    <span class="comment">/*</span>
<a name="l00837"></a>00837 <span class="comment">    * Set the public key in the REQ object</span>
<a name="l00838"></a>00838 <span class="comment">    */</span>
<a name="l00839"></a>00839    <span class="keywordtype">int</span> X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey);
<a name="l00840"></a>00840 
<a name="l00841"></a>00841    <span class="comment">/* for testing */</span>
<a name="l00842"></a>00842    <span class="keywordtype">int</span> i2d_X509_REQ_fp(FILE *fp, X509_REQ *x);
<a name="l00843"></a>00843 
<a name="l00844"></a>00844    <span class="comment">/* SMime support */</span>
<a name="l00845"></a>00845    STACK *X509_get1_email(X509 *x);
<a name="l00846"></a>00846    <span class="keywordtype">void</span> X509_email_free(STACK *sk);
<a name="l00847"></a>00847 
<a name="l00848"></a>00848    <span class="comment">/* Ciphers needed for SMime */</span>
<a name="l00849"></a>00849    EVP_CIPHER *EVP_des_ede3_cbc();
<a name="l00850"></a>00850    EVP_CIPHER *EVP_des_cbc();
<a name="l00851"></a>00851    EVP_CIPHER *EVP_rc2_cbc();
<a name="l00852"></a>00852    EVP_CIPHER *EVP_rc2_64_cbc();
<a name="l00853"></a>00853    EVP_CIPHER *EVP_rc2_40_cbc();
<a name="l00854"></a>00854 
<a name="l00855"></a>00855    <span class="comment">/* clear the current error  - use this often*/</span>
<a name="l00856"></a>00856    <span class="keywordtype">void</span> ERR_clear_error();
<a name="l00857"></a>00857 
<a name="l00858"></a>00858    <span class="comment">/* retrieve the latest error */</span>
<a name="l00859"></a>00859    <span class="keywordtype">unsigned</span> <span class="keywordtype">long</span> ERR_get_error();
<a name="l00860"></a>00860 
<a name="l00861"></a>00861    <span class="comment">/* Print the errors to this stream */</span>
<a name="l00862"></a>00862    <span class="keywordtype">void</span> ERR_print_errors_fp(FILE *fp);
<a name="l00863"></a>00863 
<a name="l00864"></a>00864    <span class="comment">/* Get a pointer to the SSL session id (reference counted) */</span>
<a name="l00865"></a>00865    SSL_SESSION *SSL_get1_session(SSL *ssl);
<a name="l00866"></a>00866 
<a name="l00867"></a>00867    <span class="comment">/* Frees a pointer to the SSL session id (reference decremented if needed) */</span>
<a name="l00868"></a>00868    <span class="keywordtype">void</span> SSL_SESSION_free(SSL_SESSION *session);
<a name="l00869"></a>00869 
<a name="l00870"></a>00870    <span class="comment">/* Set the SSL session to reuse. */</span>
<a name="l00871"></a>00871    <span class="keywordtype">int</span> SSL_set_session(SSL *ssl, SSL_SESSION *session);
<a name="l00872"></a>00872 
<a name="l00873"></a>00873    <span class="comment">/* Decode ASN.1 to SSL_SESSION */</span>
<a name="l00874"></a>00874    SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a, <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> **pp, <span class="keywordtype">long</span> length);
<a name="l00875"></a>00875    <span class="comment">/* Encode SSL_SESSION to ASN.1 */</span>
<a name="l00876"></a>00876    <span class="keywordtype">int</span> i2d_SSL_SESSION(SSL_SESSION *in, <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> **pp);
<a name="l00877"></a>00877 
<a name="l00878"></a>00878    <span class="comment">/* Write privatekey to FILE stream */</span>
<a name="l00879"></a>00879    <span class="keywordtype">int</span> i2d_PrivateKey_fp(FILE*, EVP_PKEY*);
<a name="l00880"></a>00880 
<a name="l00881"></a>00881    <span class="comment">/* Write PKCS#8privatekey to FILE stream */</span>
<a name="l00882"></a>00882    <span class="keywordtype">int</span> i2d_PKCS8PrivateKey_fp(FILE*, EVP_PKEY*, <span class="keyword">const</span> EVP_CIPHER*, <span class="keywordtype">char</span>*, <span class="keywordtype">int</span>, pem_password_cb*, <span class="keywordtype">void</span>*);
<a name="l00883"></a>00883 
<a name="l00884"></a>00884    <span class="comment">/* Free RSA structure */</span>
<a name="l00885"></a>00885    <span class="keywordtype">void</span> RSA_free(RSA*);
<a name="l00886"></a>00886 
<a name="l00887"></a>00887    <span class="comment">/* Get a blowfish CBC pointer */</span>
<a name="l00888"></a>00888    EVP_CIPHER *EVP_bf_cbc();
<a name="l00889"></a>00889 
<a name="l00890"></a>00890    <span class="comment">/* Sign a CSR */</span>
<a name="l00891"></a>00891    <span class="keywordtype">int</span> X509_REQ_sign(X509_REQ*, EVP_PKEY*, <span class="keyword">const</span> EVP_MD*);
<a name="l00892"></a>00892 
<a name="l00893"></a>00893    <span class="comment">/* add a name entry */</span>
<a name="l00894"></a>00894    <span class="keywordtype">int</span> X509_NAME_add_entry_by_txt(X509_NAME*, <span class="keywordtype">char</span>*, <span class="keywordtype">int</span>, <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span>*, <span class="keywordtype">int</span>, <span class="keywordtype">int</span>, <span class="keywordtype">int</span>);
<a name="l00895"></a>00895 
<a name="l00896"></a>00896    <span class="comment">/* Create a name */</span>
<a name="l00897"></a>00897    X509_NAME *X509_NAME_new();
<a name="l00898"></a>00898 
<a name="l00899"></a>00899    <span class="comment">/* Set the subject */</span>
<a name="l00900"></a>00900    <span class="keywordtype">int</span> X509_REQ_set_subject_name(X509_REQ*,X509_NAME*);
<a name="l00901"></a>00901 
<a name="l00902"></a>00902    <span class="comment">/* get list of available SSL_CIPHER&#39;s sorted by preference */</span>
<a name="l00903"></a>00903    STACK_OF(SSL_CIPHER) *SSL_get_ciphers(<span class="keyword">const</span> SSL* ssl);
<a name="l00904"></a>00904 
<a name="l00905"></a>00905 <span class="preprocessor">#endif</span>
<a name="l00906"></a>00906 <span class="preprocessor"></span>
<a name="l00907"></a>00907 <span class="keyword">private</span>:
<a name="l00908"></a>00908    KOpenSSLProxy();
<a name="l00909"></a>00909    ~KOpenSSLProxy();
<a name="l00910"></a>00910    KOpenSSLProxyPrivate *d;
<a name="l00911"></a>00911 
<a name="l00912"></a>00912    KLibrary *_sslLib;
<a name="l00913"></a>00913    KLibrary *_cryptoLib;
<a name="l00914"></a>00914    <span class="keyword">static</span> KOpenSSLProxy *_me;
<a name="l00915"></a>00915 
<a name="l00916"></a>00916    <span class="keywordtype">bool</span> _ok;
<a name="l00917"></a>00917 };
<a name="l00918"></a>00918 
<a name="l00919"></a>00919 <span class="preprocessor">#endif</span>
<a name="l00920"></a>00920 <span class="preprocessor"></span>
</pre></div></div>
</div>
    </div></div>


      </td>
  </tr>
  <tr>
    <td valign="top" id="leftmenu" width="25%">
      <a name="navigation"></a>
      <div class="menu_box"><h2>kio/kssl</h2>
<div class="nav_list">
<ul><li><a href="index.html">Main Page</a></li><li><a href="hierarchy.html">Class Hierarchy</a></li><li><a href="classes.html">Alphabetical List</a></li><li><a href="annotated.html">Class List</a></li><li><a href="files.html">File List</a></li><li><a href="functions.html">Class Members</a></li><li><a href="pages.html">Related Pages</a></li></ul>
<!--
<h2>Class Picker</h2>
<div style="text-align: center;">
<form name="guideform">
<select name="guidelinks" style="width:100%;" onChange="window.location=document.guideform.guidelinks.options[document.guideform.guidelinks.selectedIndex].value">
<option value="annotated.html">-- Choose --</option>
  <option value="classKOpenSSLProxy.html">kopensslproxy</option>,  <option value="classKSSL.html">kssl</option>,  <option value="classKSSLCertBox.html">ksslcertbox</option>,  <option value="classKSSLCertChain.html">ksslcertchain</option>,  <option value="classKSSLCertDlg.html">ksslcertdlg</option>,  <option value="classKSSLCertificate.html">ksslcertificate</option>,  <option value="classKSSLConnectionInfo.html">ksslconnectioninfo</option>,  <option value="classKSSLInfoDlg.html">ksslinfodlg</option>,  <option value="classKSSLKeyGen.html">ksslkeygen</option>,  <option value="classKSSLPeerInfo.html">ksslpeerinfo</option>,  <option value="classKSSLPKCS12.html">ksslpkcs12</option>,  <option value="classKSSLPKCS7.html">ksslpkcs7</option>,  <option value="classKSSLSession.html">ksslsession</option>,  <option value="classKSSLSettings.html">ksslsettings</option>,  <option value="classKSSLSigners.html">ksslsigners</option>,  <option value="classKSSLX509Map.html">ksslx509map</option>,  <option value="classKSSLX509V3.html">ksslx509v3</option>,
</select>
</form>
</div>
-->
</div></div>
<div class="menu_box"><h2>API Dox</h2>
<div class="nav_list">
<ul>
<li><a href="../../../arts/html/index.html">arts</a></li><li><a href="../../../dcop/html/index.html">dcop</a></li><li><a href="../../../dnssd/html/index.html">dnssd</a></li><li><a href="../../../interfaces/html/index.html">interfaces</a></li><li>&nbsp;&nbsp;&nbsp;&nbsp;<a href="../../../interfaces/kimproxy/interface/html/index.html">interface</a></li><li>&nbsp;&nbsp;&nbsp;&nbsp;<a href="../../../interfaces/kimproxy/library/html/index.html">library</a></li><li>&nbsp;&nbsp;<a href="../../../interfaces/kspeech/html/index.html">kspeech</a></li><li>&nbsp;&nbsp;<a href="../../../interfaces/ktexteditor/html/index.html">ktexteditor</a></li><li><a href="../../../kabc/html/index.html">kabc</a></li><li><a href="../../../kate/html/index.html">kate</a></li><li><a href="../../../kcmshell/html/index.html">kcmshell</a></li><li><a href="../../../kdecore/html/index.html">kdecore</a></li><li><a href="../../../kded/html/index.html">kded</a></li><li><a href="../../../kdefx/html/index.html">kdefx</a></li><li><a href="../../../kdeprint/html/index.html">kdeprint</a></li><li><a href="../../../kdesu/html/index.html">kdesu</a></li><li><a href="../../../kdeui/html/index.html">kdeui</a></li><li><a href="../../../kdoctools/html/index.html">kdoctools</a></li><li><a href="../../../khtml/html/index.html">khtml</a></li><li><a href="../../../kimgio/html/index.html">kimgio</a></li><li><a href="../../../kinit/html/index.html">kinit</a></li><li><a href="../../../kio/html/index.html">kio</a></li><li>&nbsp;&nbsp;<a href="../../../kio/bookmarks/html/index.html">bookmarks</a></li><li>&nbsp;&nbsp;<a href="../../../kio/httpfilter/html/index.html">httpfilter</a></li><li>&nbsp;&nbsp;<a href="../../../kio/kfile/html/index.html">kfile</a></li><li>&nbsp;&nbsp;<a href="../../../kio/kio/html/index.html">kio</a></li><li>&nbsp;&nbsp;<a href="../../../kio/kioexec/html/index.html">kioexec</a></li><li>&nbsp;&nbsp;<a href="../../../kio/kpasswdserver/html/index.html">kpasswdserver</a></li><li>&nbsp;&nbsp;<a href="../../../kio/kssl/html/index.html">kssl</a></li><li><a href="../../../kioslave/html/index.html">kioslave</a></li><li>&nbsp;&nbsp;<a href="../../../kioslave/http/html/index.html">http</a></li><li><a href="../../../kjs/html/index.html">kjs</a></li><li><a href="../../../kmdi/html/index.html">kmdi</a></li><li>&nbsp;&nbsp;<a href="../../../kmdi/kmdi/html/index.html">kmdi</a></li><li><a href="../../../knewstuff/html/index.html">knewstuff</a></li><li><a href="../../../kparts/html/index.html">kparts</a></li><li><a href="../../../kresources/html/index.html">kresources</a></li><li><a href="../../../kspell2/html/index.html">kspell2</a></li><li><a href="../../../kunittest/html/index.html">kunittest</a></li><li><a href="../../../kutils/html/index.html">kutils</a></li><li><a href="../../../kwallet/html/index.html">kwallet</a></li><li><a href="../../../libkmid/html/index.html">libkmid</a></li><li><a href="../../../libkscreensaver/html/index.html">libkscreensaver</a></li>
</ul></div></div>


        </td>
</tr>
</table>

<span class="doNotDisplay">
  <a href="http://www.kde.org/" accesskey="8">KDE Home</a> |
  <a href="http://accessibility.kde.org/" accesskey="9">KDE Accessibility Home</a> |
  <a href="http://www.kde.org/media/accesskeys.php" accesskey="0">Description of Access Keys</a>
</span>


<div style="height: 8px"></div>

<div id="footer">
  <div id="footer_left">
    Maintained by <a href="&#109;&#97;&#105;&#108;&#116;&#111;&#58;groo&#116;&#64;kde&#46;or&#x67;">Adriaan de Groot</a>
and
<a href="&#109;a&#105;&#108;&#116;&#111;&#58;w&#105;nter&#64;kde&#46;or&#x67">Allen Winter</a>.
<br/>
    KDE and K Desktop Environment are trademarks of <a href="http://www.kde.org/areas/kde-ev/" title="Homepage of the KDE non-profit Organization">KDE e.V.</a> |
    <a href="http://www.kde.org/contact/impressum.php">Legal</a>
  </div>
  <div id="footer_right"><img src="/media/images/footer_right.png" style="margin: 0px" alt="" /></div>
</div>

<!--
WARNING: DO NOT SEND MAIL TO THE FOLLOWING EMAIL ADDRESS! YOU WILL
BE BLOCKED INSTANTLY AND PERMANENTLY!
<a href="mailto:aaaatrap-425acc3b5374943f@kde.org">Block me</a>
WARNING END
-->

</body>
</html>