From eca4feb580cffd6af474f599efe3fe99505a525c Mon Sep 17 00:00:00 2001 From: Rob Austein Date: Tue, 20 Jun 2006 17:32:05 +0000 Subject: Importing OpenSSL 0.9.8b svn path=/openssl/vendor/current/CHANGES; revision=1 --- openssl/vendor/current/doc/ssl/SSL_free.pod | 44 +++++++++++++++++++++++++++++ 1 file changed, 44 insertions(+) create mode 100644 openssl/vendor/current/doc/ssl/SSL_free.pod (limited to 'openssl/vendor/current/doc/ssl/SSL_free.pod') diff --git a/openssl/vendor/current/doc/ssl/SSL_free.pod b/openssl/vendor/current/doc/ssl/SSL_free.pod new file mode 100644 index 00000000..2d4f8b61 --- /dev/null +++ b/openssl/vendor/current/doc/ssl/SSL_free.pod @@ -0,0 +1,44 @@ +=pod + +=head1 NAME + +SSL_free - free an allocated SSL structure + +=head1 SYNOPSIS + + #include + + void SSL_free(SSL *ssl); + +=head1 DESCRIPTION + +SSL_free() decrements the reference count of B, and removes the SSL +structure pointed to by B and frees up the allocated memory if the +the reference count has reached 0. + +=head1 NOTES + +SSL_free() also calls the free()ing procedures for indirectly affected items, if +applicable: the buffering BIO, the read and write BIOs, +cipher lists specially created for this B, the B. +Do not explicitly free these indirectly freed up items before or after +calling SSL_free(), as trying to free things twice may lead to program +failure. + +The ssl session has reference counts from two users: the SSL object, for +which the reference count is removed by SSL_free() and the internal +session cache. If the session is considered bad, because +L was not called for the connection +and L was not used to set the +SSL_SENT_SHUTDOWN state, the session will also be removed +from the session cache as required by RFC2246. + +=head1 RETURN VALUES + +SSL_free() does not provide diagnostic information. + +L, L, +L, L, +L + +=cut -- cgit v1.2.3