From 5dadf34209c288b8fffba1016e6a3c9446381153 Mon Sep 17 00:00:00 2001 From: Rob Austein Date: Thu, 7 Jun 2007 02:37:32 +0000 Subject: Replace hacked OpenSSL code with OpenSSL 0.9.8e distribution. svn path=/openssl/Makefile; revision=659 --- openssl/vendor/current/doc/ssl/SSL_free.pod | 44 ----------------------------- 1 file changed, 44 deletions(-) delete mode 100644 openssl/vendor/current/doc/ssl/SSL_free.pod (limited to 'openssl/vendor/current/doc/ssl/SSL_free.pod') diff --git a/openssl/vendor/current/doc/ssl/SSL_free.pod b/openssl/vendor/current/doc/ssl/SSL_free.pod deleted file mode 100644 index 2d4f8b61..00000000 --- a/openssl/vendor/current/doc/ssl/SSL_free.pod +++ /dev/null @@ -1,44 +0,0 @@ -=pod - -=head1 NAME - -SSL_free - free an allocated SSL structure - -=head1 SYNOPSIS - - #include - - void SSL_free(SSL *ssl); - -=head1 DESCRIPTION - -SSL_free() decrements the reference count of B, and removes the SSL -structure pointed to by B and frees up the allocated memory if the -the reference count has reached 0. - -=head1 NOTES - -SSL_free() also calls the free()ing procedures for indirectly affected items, if -applicable: the buffering BIO, the read and write BIOs, -cipher lists specially created for this B, the B. -Do not explicitly free these indirectly freed up items before or after -calling SSL_free(), as trying to free things twice may lead to program -failure. - -The ssl session has reference counts from two users: the SSL object, for -which the reference count is removed by SSL_free() and the internal -session cache. If the session is considered bad, because -L was not called for the connection -and L was not used to set the -SSL_SENT_SHUTDOWN state, the session will also be removed -from the session cache as required by RFC2246. - -=head1 RETURN VALUES - -SSL_free() does not provide diagnostic information. - -L, L, -L, L, -L - -=cut -- cgit v1.2.3