http://git-wip-us.apache.org/repos/asf/qpid-site/blob/de3c3488/content/releases/qpid-proton-0.15.0/proton/c/api/group__ssl.html
----------------------------------------------------------------------
diff --git a/content/releases/qpid-proton-0.15.0/proton/c/api/group__ssl.html 
b/content/releases/qpid-proton-0.15.0/proton/c/api/group__ssl.html
new file mode 100755
index 0000000..a71961c
--- /dev/null
+++ b/content/releases/qpid-proton-0.15.0/proton/c/api/group__ssl.html
@@ -0,0 +1,919 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" 
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd";>
+<html xmlns="http://www.w3.org/1999/xhtml";>
+<head>
+<meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/>
+<meta http-equiv="X-UA-Compatible" content="IE=9"/>
+<meta name="generator" content="Doxygen 1.8.3.1"/>
+<title>Qpid Proton C API: SSL</title>
+<link href="tabs.css" rel="stylesheet" type="text/css"/>
+<script type="text/javascript" src="jquery.js"></script>
+<script type="text/javascript" src="dynsections.js"></script>
+<link href="navtree.css" rel="stylesheet" type="text/css"/>
+<script type="text/javascript" src="resize.js"></script>
+<script type="text/javascript" src="navtree.js"></script>
+<script type="text/javascript">
+  $(document).ready(initResizable);
+  $(window).load(resizeHeight);
+</script>
+<link href="search/search.css" rel="stylesheet" type="text/css"/>
+<script type="text/javascript" src="search/search.js"></script>
+<script type="text/javascript">
+  $(document).ready(function() { searchBox.OnSelectItem(0); });
+</script>
+<link href="doxygen.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+<div id="top"><!-- do not remove this div, it is closed by doxygen! -->
+<div id="titlearea">
+<table cellspacing="0" cellpadding="0">
+ <tbody>
+ <tr style="height: 56px;">
+  <td style="padding-left: 0.5em;">
+   <div id="projectname">Qpid Proton C API
+   &#160;<span id="projectnumber">0.15.0</span>
+   </div>
+  </td>
+   <td>        <div id="MSearchBox" class="MSearchBoxInactive">
+        <span class="left">
+          <img id="MSearchSelect" src="search/mag_sel.png"
+               onmouseover="return searchBox.OnSearchSelectShow()"
+               onmouseout="return searchBox.OnSearchSelectHide()"
+               alt=""/>
+          <input type="text" id="MSearchField" value="Search" accesskey="S"
+               onfocus="searchBox.OnSearchFieldFocus(true)" 
+               onblur="searchBox.OnSearchFieldFocus(false)" 
+               onkeyup="searchBox.OnSearchFieldChange(event)"/>
+          </span><span class="right">
+            <a id="MSearchClose" 
href="javascript:searchBox.CloseResultsWindow()"><img id="MSearchCloseImg" 
border="0" src="search/close.png" alt=""/></a>
+          </span>
+        </div>
+</td>
+ </tr>
+ </tbody>
+</table>
+</div>
+<!-- end header part -->
+<!-- Generated by Doxygen 1.8.3.1 -->
+<script type="text/javascript">
+var searchBox = new SearchBox("searchBox", "search",false,'Search');
+</script>
+</div><!-- top -->
+<div id="side-nav" class="ui-resizable side-nav-resizable">
+  <div id="nav-tree">
+    <div id="nav-tree-contents">
+      <div id="nav-sync" class="sync"></div>
+    </div>
+  </div>
+  <div id="splitbar" style="-moz-user-select:none;" 
+       class="ui-resizable-handle">
+  </div>
+</div>
+<script type="text/javascript">
+$(document).ready(function(){initNavTree('group__ssl.html','');});
+</script>
+<div id="doc-content">
+<!-- window showing the filter options -->
+<div id="MSearchSelectWindow"
+     onmouseover="return searchBox.OnSearchSelectShow()"
+     onmouseout="return searchBox.OnSearchSelectHide()"
+     onkeydown="return searchBox.OnSearchSelectKey(event)">
+<a class="SelectItem" href="javascript:void(0)" 
onclick="searchBox.OnSelectItem(0)"><span 
class="SelectionMark">&#160;</span>All</a><a class="SelectItem" 
href="javascript:void(0)" onclick="searchBox.OnSelectItem(1)"><span 
class="SelectionMark">&#160;</span>Classes</a><a class="SelectItem" 
href="javascript:void(0)" onclick="searchBox.OnSelectItem(2)"><span 
class="SelectionMark">&#160;</span>Files</a><a class="SelectItem" 
href="javascript:void(0)" onclick="searchBox.OnSelectItem(3)"><span 
class="SelectionMark">&#160;</span>Functions</a><a class="SelectItem" 
href="javascript:void(0)" onclick="searchBox.OnSelectItem(4)"><span 
class="SelectionMark">&#160;</span>Variables</a><a class="SelectItem" 
href="javascript:void(0)" onclick="searchBox.OnSelectItem(5)"><span 
class="SelectionMark">&#160;</span>Typedefs</a><a class="SelectItem" 
href="javascript:void(0)" onclick="searchBox.OnSelectItem(6)"><span 
class="SelectionMark">&#160;</span>Enumerations</a><a class="SelectItem" 
href="javascript:vo
 id(0)" onclick="searchBox.OnSelectItem(7)"><span 
class="SelectionMark">&#160;</span>Enumerator</a><a class="SelectItem" 
href="javascript:void(0)" onclick="searchBox.OnSelectItem(8)"><span 
class="SelectionMark">&#160;</span>Groups</a><a class="SelectItem" 
href="javascript:void(0)" onclick="searchBox.OnSelectItem(9)"><span 
class="SelectionMark">&#160;</span>Pages</a></div>
+
+<!-- iframe showing the search results (closed by default) -->
+<div id="MSearchResultsWindow">
+<iframe src="javascript:void(0)" frameborder="0" 
+        name="MSearchResults" id="MSearchResults">
+</iframe>
+</div>
+
+<div class="header">
+  <div class="summary">
+<a href="#typedef-members">Typedefs</a> &#124;
+<a href="#enum-members">Enumerations</a> &#124;
+<a href="#func-members">Functions</a>  </div>
+  <div class="headertitle">
+<div class="title">SSL<div class="ingroups"><a class="el" 
href="group__transport.html">Transport</a></div></div>  </div>
+</div><!--header-->
+<div class="contents">
+<table class="memberdecls">
+<tr class="heading"><td colspan="2"><h2 class="groupheader"><a 
name="typedef-members"></a>
+Typedefs</h2></td></tr>
+<tr class="memitem:gaba83c3a1779c8b35a479bf3a7bb5b175"><td class="memItemLeft" 
align="right" valign="top"><a class="anchor" 
id="gaba83c3a1779c8b35a479bf3a7bb5b175"></a>
+typedef struct pn_ssl_domain_t&#160;</td><td class="memItemRight" 
valign="bottom"><b>pn_ssl_domain_t</b></td></tr>
+<tr class="separator:gaba83c3a1779c8b35a479bf3a7bb5b175"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:ga215da63662423b00d34605ba4f9761f5"><td class="memItemLeft" 
align="right" valign="top"><a class="anchor" 
id="ga215da63662423b00d34605ba4f9761f5"></a>
+typedef struct pn_ssl_t&#160;</td><td class="memItemRight" 
valign="bottom"><b>pn_ssl_t</b></td></tr>
+<tr class="separator:ga215da63662423b00d34605ba4f9761f5"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+</table><table class="memberdecls">
+<tr class="heading"><td colspan="2"><h2 class="groupheader"><a 
name="enum-members"></a>
+Enumerations</h2></td></tr>
+<tr class="memitem:ga0f1d40875c45b14a31a77f27430bc225"><td class="memItemLeft" 
align="right" valign="top">enum &#160;</td><td class="memItemRight" 
valign="bottom"><a class="el" 
href="group__ssl.html#ga0f1d40875c45b14a31a77f27430bc225">pn_ssl_mode_t</a> { 
<a class="el" 
href="group__ssl.html#gga0f1d40875c45b14a31a77f27430bc225a4e2fe24fcd2692e4c20c27668091a49c">PN_SSL_MODE_CLIENT</a>
 =1, 
+<a class="el" 
href="group__ssl.html#gga0f1d40875c45b14a31a77f27430bc225a0c4550c70a6bc74cb906a74c5f1e5078">PN_SSL_MODE_SERVER</a>
+ }</td></tr>
+<tr class="separator:ga0f1d40875c45b14a31a77f27430bc225"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:gaf175c116d52a91001f9a3559b580f56d"><td class="memItemLeft" 
align="right" valign="top">enum &#160;</td><td class="memItemRight" 
valign="bottom"><a class="el" 
href="group__ssl.html#gaf175c116d52a91001f9a3559b580f56d">pn_ssl_resume_status_t</a>
 { <a class="el" 
href="group__ssl.html#ggaf175c116d52a91001f9a3559b580f56dad1385651f6078177d6652c385453280d">PN_SSL_RESUME_UNKNOWN</a>,
 
+<a class="el" 
href="group__ssl.html#ggaf175c116d52a91001f9a3559b580f56dac8a5515a69c89007f681b3c555328e8f">PN_SSL_RESUME_NEW</a>,
 
+<a class="el" 
href="group__ssl.html#ggaf175c116d52a91001f9a3559b580f56dabb1b88b78dcb91ee80cd6f0eb5873d6d">PN_SSL_RESUME_REUSED</a>
+ }</td></tr>
+<tr class="separator:gaf175c116d52a91001f9a3559b580f56d"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:gae5e33024ed6af3432d4c76d1484d7ecb"><td class="memItemLeft" 
align="right" valign="top">enum &#160;</td><td class="memItemRight" 
valign="bottom"><a class="el" 
href="group__ssl.html#gae5e33024ed6af3432d4c76d1484d7ecb">pn_ssl_verify_mode_t</a>
 { <a class="el" 
href="group__ssl.html#ggae5e33024ed6af3432d4c76d1484d7ecbada1e3837cc900bd6419de72c25b253cc">PN_SSL_VERIFY_NULL</a>
 =0, 
+<a class="el" 
href="group__ssl.html#ggae5e33024ed6af3432d4c76d1484d7ecbad80276abde5d95760c63d0b9685d4d44">PN_SSL_VERIFY_PEER</a>,
 
+<a class="el" 
href="group__ssl.html#ggae5e33024ed6af3432d4c76d1484d7ecbafa6dbe705dd0366ff4799616f788a9f5">PN_SSL_ANONYMOUS_PEER</a>,
 
+<a class="el" 
href="group__ssl.html#ggae5e33024ed6af3432d4c76d1484d7ecbaac956f0febf05ab579de839700895e36">PN_SSL_VERIFY_PEER_NAME</a>
+ }</td></tr>
+<tr class="separator:gae5e33024ed6af3432d4c76d1484d7ecb"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:ga68d52866e8172acc7ecc7b4fe5b38a40"><td class="memItemLeft" 
align="right" valign="top">enum &#160;</td><td class="memItemRight" 
valign="bottom"><a class="el" 
href="group__ssl.html#ga68d52866e8172acc7ecc7b4fe5b38a40">pn_ssl_cert_subject_subfield</a>
 { <br/>
+&#160;&#160;<b>PN_SSL_CERT_SUBJECT_COUNTRY_NAME</b>, 
+<b>PN_SSL_CERT_SUBJECT_STATE_OR_PROVINCE</b>, 
+<b>PN_SSL_CERT_SUBJECT_CITY_OR_LOCALITY</b>, 
+<b>PN_SSL_CERT_SUBJECT_ORGANIZATION_NAME</b>, 
+<br/>
+&#160;&#160;<b>PN_SSL_CERT_SUBJECT_ORGANIZATION_UNIT</b>, 
+<b>PN_SSL_CERT_SUBJECT_COMMON_NAME</b>
+<br/>
+ }</td></tr>
+<tr class="separator:ga68d52866e8172acc7ecc7b4fe5b38a40"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:gaf0b0cd3271ad4a0e33e2a61a8cea7892"><td class="memItemLeft" 
align="right" valign="top">enum &#160;</td><td class="memItemRight" 
valign="bottom"><a class="el" 
href="group__ssl.html#gaf0b0cd3271ad4a0e33e2a61a8cea7892">pn_ssl_hash_alg</a> { 
<b>PN_SSL_SHA1</b>, 
+<b>PN_SSL_SHA256</b>, 
+<b>PN_SSL_SHA512</b>, 
+<b>PN_SSL_MD5</b>
+ }</td></tr>
+<tr class="separator:gaf0b0cd3271ad4a0e33e2a61a8cea7892"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+</table><table class="memberdecls">
+<tr class="heading"><td colspan="2"><h2 class="groupheader"><a 
name="func-members"></a>
+Functions</h2></td></tr>
+<tr class="memitem:ga94467860b566683a4c646487dc537b34"><td class="memItemLeft" 
align="right" valign="top">PN_EXTERN bool&#160;</td><td class="memItemRight" 
valign="bottom"><a class="el" 
href="group__ssl.html#ga94467860b566683a4c646487dc537b34">pn_ssl_present</a> 
(void)</td></tr>
+<tr class="separator:ga94467860b566683a4c646487dc537b34"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:gabc9e5e64b23bf03316aa825ba036fb4f"><td class="memItemLeft" 
align="right" valign="top">PN_EXTERN pn_ssl_domain_t *&#160;</td><td 
class="memItemRight" valign="bottom"><a class="el" 
href="group__ssl.html#gabc9e5e64b23bf03316aa825ba036fb4f">pn_ssl_domain</a> (<a 
class="el" 
href="group__ssl.html#ga0f1d40875c45b14a31a77f27430bc225">pn_ssl_mode_t</a> 
mode)</td></tr>
+<tr class="separator:gabc9e5e64b23bf03316aa825ba036fb4f"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:ga2f0254dda9b35b5af99e744be243daaf"><td class="memItemLeft" 
align="right" valign="top">PN_EXTERN void&#160;</td><td class="memItemRight" 
valign="bottom"><a class="el" 
href="group__ssl.html#ga2f0254dda9b35b5af99e744be243daaf">pn_ssl_domain_free</a>
 (pn_ssl_domain_t *domain)</td></tr>
+<tr class="separator:ga2f0254dda9b35b5af99e744be243daaf"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:ga13bc3cf2d0d2f3f612a513752e929251"><td class="memItemLeft" 
align="right" valign="top">PN_EXTERN int&#160;</td><td class="memItemRight" 
valign="bottom"><a class="el" 
href="group__ssl.html#ga13bc3cf2d0d2f3f612a513752e929251">pn_ssl_domain_set_credentials</a>
 (pn_ssl_domain_t *domain, const char *credential_1, const char *credential_2, 
const char *password)</td></tr>
+<tr class="separator:ga13bc3cf2d0d2f3f612a513752e929251"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:ga20761fc3f72ab4d947a7c468a43758c9"><td class="memItemLeft" 
align="right" valign="top">PN_EXTERN int&#160;</td><td class="memItemRight" 
valign="bottom"><a class="el" 
href="group__ssl.html#ga20761fc3f72ab4d947a7c468a43758c9">pn_ssl_domain_set_trusted_ca_db</a>
 (pn_ssl_domain_t *domain, const char *certificate_db)</td></tr>
+<tr class="separator:ga20761fc3f72ab4d947a7c468a43758c9"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:gacba0321d3d8cd67c601b604a5b42a190"><td class="memItemLeft" 
align="right" valign="top">PN_EXTERN int&#160;</td><td class="memItemRight" 
valign="bottom"><a class="el" 
href="group__ssl.html#gacba0321d3d8cd67c601b604a5b42a190">pn_ssl_domain_set_peer_authentication</a>
 (pn_ssl_domain_t *domain, const <a class="el" 
href="group__ssl.html#gae5e33024ed6af3432d4c76d1484d7ecb">pn_ssl_verify_mode_t</a>
 mode, const char *trusted_CAs)</td></tr>
+<tr class="separator:gacba0321d3d8cd67c601b604a5b42a190"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:ga7bf33cfae6dcd6513da926eff993896d"><td class="memItemLeft" 
align="right" valign="top">PN_EXTERN int&#160;</td><td class="memItemRight" 
valign="bottom"><a class="el" 
href="group__ssl.html#ga7bf33cfae6dcd6513da926eff993896d">pn_ssl_domain_allow_unsecured_client</a>
 (pn_ssl_domain_t *domain)</td></tr>
+<tr class="separator:ga7bf33cfae6dcd6513da926eff993896d"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:gace9c2c01043714e64fe97a390ffeac87"><td class="memItemLeft" 
align="right" valign="top">PN_EXTERN pn_ssl_t *&#160;</td><td 
class="memItemRight" valign="bottom"><a class="el" 
href="group__ssl.html#gace9c2c01043714e64fe97a390ffeac87">pn_ssl</a> (<a 
class="el" 
href="group__transport.html#gac26eda05f649bbf0399f3d8d78d12fa8">pn_transport_t</a>
 *transport)</td></tr>
+<tr class="separator:gace9c2c01043714e64fe97a390ffeac87"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:gac5f8d77f86808ae8401691bcd17daa77"><td class="memItemLeft" 
align="right" valign="top">PN_EXTERN int&#160;</td><td class="memItemRight" 
valign="bottom"><a class="el" 
href="group__ssl.html#gac5f8d77f86808ae8401691bcd17daa77">pn_ssl_init</a> 
(pn_ssl_t *ssl, pn_ssl_domain_t *domain, const char *session_id)</td></tr>
+<tr class="separator:gac5f8d77f86808ae8401691bcd17daa77"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:ga7ea4334e4925b50cb6c6daa4795cdfa0"><td class="memItemLeft" 
align="right" valign="top">PN_EXTERN bool&#160;</td><td class="memItemRight" 
valign="bottom"><a class="el" 
href="group__ssl.html#ga7ea4334e4925b50cb6c6daa4795cdfa0">pn_ssl_get_cipher_name</a>
 (pn_ssl_t *ssl, char *buffer, size_t size)</td></tr>
+<tr class="separator:ga7ea4334e4925b50cb6c6daa4795cdfa0"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:ga4a1837eb135461f71da666f3438c7602"><td class="memItemLeft" 
align="right" valign="top">PN_EXTERN int&#160;</td><td class="memItemRight" 
valign="bottom"><a class="el" 
href="group__ssl.html#ga4a1837eb135461f71da666f3438c7602">pn_ssl_get_ssf</a> 
(pn_ssl_t *ssl)</td></tr>
+<tr class="separator:ga4a1837eb135461f71da666f3438c7602"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:ga1636bdfcc884dbae248f0316ae2a076f"><td class="memItemLeft" 
align="right" valign="top">PN_EXTERN bool&#160;</td><td class="memItemRight" 
valign="bottom"><a class="el" 
href="group__ssl.html#ga1636bdfcc884dbae248f0316ae2a076f">pn_ssl_get_protocol_name</a>
 (pn_ssl_t *ssl, char *buffer, size_t size)</td></tr>
+<tr class="separator:ga1636bdfcc884dbae248f0316ae2a076f"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:ga543c4d6b34f107f41a2812b15e370523"><td class="memItemLeft" 
align="right" valign="top">PN_EXTERN <a class="el" 
href="group__ssl.html#gaf175c116d52a91001f9a3559b580f56d">pn_ssl_resume_status_t</a>&#160;</td><td
 class="memItemRight" valign="bottom"><a class="el" 
href="group__ssl.html#ga543c4d6b34f107f41a2812b15e370523">pn_ssl_resume_status</a>
 (pn_ssl_t *ssl)</td></tr>
+<tr class="separator:ga543c4d6b34f107f41a2812b15e370523"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:ga733943a1e722653b5c1f36b7de670ee5"><td class="memItemLeft" 
align="right" valign="top">PN_EXTERN int&#160;</td><td class="memItemRight" 
valign="bottom"><a class="el" 
href="group__ssl.html#ga733943a1e722653b5c1f36b7de670ee5">pn_ssl_set_peer_hostname</a>
 (pn_ssl_t *ssl, const char *hostname)</td></tr>
+<tr class="separator:ga733943a1e722653b5c1f36b7de670ee5"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:gabc678b1162484ec8eeddba8b594b1f74"><td class="memItemLeft" 
align="right" valign="top">PN_EXTERN int&#160;</td><td class="memItemRight" 
valign="bottom"><a class="el" 
href="group__ssl.html#gabc678b1162484ec8eeddba8b594b1f74">pn_ssl_get_peer_hostname</a>
 (pn_ssl_t *ssl, char *hostname, size_t *bufsize)</td></tr>
+<tr class="separator:gabc678b1162484ec8eeddba8b594b1f74"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:ga41e9ea2af96fcbc34fda2e72cff40f2c"><td class="memItemLeft" 
align="right" valign="top">PN_EXTERN const char *&#160;</td><td 
class="memItemRight" valign="bottom"><a class="el" 
href="group__ssl.html#ga41e9ea2af96fcbc34fda2e72cff40f2c">pn_ssl_get_remote_subject</a>
 (pn_ssl_t *ssl)</td></tr>
+<tr class="separator:ga41e9ea2af96fcbc34fda2e72cff40f2c"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:ga31d1dde4b0fbb1cbc349863013309ba5"><td class="memItemLeft" 
align="right" valign="top">PN_EXTERN int&#160;</td><td class="memItemRight" 
valign="bottom"><a class="el" 
href="group__ssl.html#ga31d1dde4b0fbb1cbc349863013309ba5">pn_ssl_get_cert_fingerprint</a>
 (pn_ssl_t *ssl0, char *fingerprint, size_t fingerprint_length, <a class="el" 
href="group__ssl.html#gaf0b0cd3271ad4a0e33e2a61a8cea7892">pn_ssl_hash_alg</a> 
hash_alg)</td></tr>
+<tr class="separator:ga31d1dde4b0fbb1cbc349863013309ba5"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+<tr class="memitem:gae6cd9e970301292a1b502a6a1d8bc2ab"><td class="memItemLeft" 
align="right" valign="top">PN_EXTERN const char *&#160;</td><td 
class="memItemRight" valign="bottom"><a class="el" 
href="group__ssl.html#gae6cd9e970301292a1b502a6a1d8bc2ab">pn_ssl_get_remote_subject_subfield</a>
 (pn_ssl_t *ssl0, <a class="el" 
href="group__ssl.html#ga68d52866e8172acc7ecc7b4fe5b38a40">pn_ssl_cert_subject_subfield</a>
 field)</td></tr>
+<tr class="separator:gae6cd9e970301292a1b502a6a1d8bc2ab"><td 
class="memSeparator" colspan="2">&#160;</td></tr>
+</table>
+<a name="details" id="details"></a><h2 class="groupheader">Detailed 
Description</h2>
+<h2 class="groupheader">Enumeration Type Documentation</h2>
+<a class="anchor" id="ga68d52866e8172acc7ecc7b4fe5b38a40"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">enum <a class="el" 
href="group__ssl.html#ga68d52866e8172acc7ecc7b4fe5b38a40">pn_ssl_cert_subject_subfield</a></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Enumeration identifying the sub fields of the subject field in the ssl 
certificate. </p>
+
+</div>
+</div>
+<a class="anchor" id="gaf0b0cd3271ad4a0e33e2a61a8cea7892"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">enum <a class="el" 
href="group__ssl.html#gaf0b0cd3271ad4a0e33e2a61a8cea7892">pn_ssl_hash_alg</a></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Enumeration identifying hashing algorithm. </p>
+
+</div>
+</div>
+<a class="anchor" id="ga0f1d40875c45b14a31a77f27430bc225"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">enum <a class="el" 
href="group__ssl.html#ga0f1d40875c45b14a31a77f27430bc225">pn_ssl_mode_t</a></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Determines the type of SSL endpoint. </p>
+<table class="fieldtable">
+<tr><th colspan="2">Enumerator</th></tr><tr><td class="fieldname"><em><a 
class="anchor" 
id="gga0f1d40875c45b14a31a77f27430bc225a4e2fe24fcd2692e4c20c27668091a49c"></a>PN_SSL_MODE_CLIENT</em>&nbsp;</td><td
 class="fielddoc">
+<p>Local connection endpoint is an SSL client </p>
+</td></tr>
+<tr><td class="fieldname"><em><a class="anchor" 
id="gga0f1d40875c45b14a31a77f27430bc225a0c4550c70a6bc74cb906a74c5f1e5078"></a>PN_SSL_MODE_SERVER</em>&nbsp;</td><td
 class="fielddoc">
+<p>Local connection endpoint is an SSL server </p>
+</td></tr>
+</table>
+
+</div>
+</div>
+<a class="anchor" id="gaf175c116d52a91001f9a3559b580f56d"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">enum <a class="el" 
href="group__ssl.html#gaf175c116d52a91001f9a3559b580f56d">pn_ssl_resume_status_t</a></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Indicates whether an SSL session has been resumed. </p>
+<table class="fieldtable">
+<tr><th colspan="2">Enumerator</th></tr><tr><td class="fieldname"><em><a 
class="anchor" 
id="ggaf175c116d52a91001f9a3559b580f56dad1385651f6078177d6652c385453280d"></a>PN_SSL_RESUME_UNKNOWN</em>&nbsp;</td><td
 class="fielddoc">
+<p>Session resume state unknown/not supported </p>
+</td></tr>
+<tr><td class="fieldname"><em><a class="anchor" 
id="ggaf175c116d52a91001f9a3559b580f56dac8a5515a69c89007f681b3c555328e8f"></a>PN_SSL_RESUME_NEW</em>&nbsp;</td><td
 class="fielddoc">
+<p>Session renegotiated - not resumed </p>
+</td></tr>
+<tr><td class="fieldname"><em><a class="anchor" 
id="ggaf175c116d52a91001f9a3559b580f56dabb1b88b78dcb91ee80cd6f0eb5873d6d"></a>PN_SSL_RESUME_REUSED</em>&nbsp;</td><td
 class="fielddoc">
+<p>Session resumed from previous session. </p>
+</td></tr>
+</table>
+
+</div>
+</div>
+<a class="anchor" id="gae5e33024ed6af3432d4c76d1484d7ecb"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">enum <a class="el" 
href="group__ssl.html#gae5e33024ed6af3432d4c76d1484d7ecb">pn_ssl_verify_mode_t</a></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Determines the level of peer validation.</p>
+<p>ANONYMOUS_PEER does not require a valid certificate, and permits use of 
ciphers that do not provide authentication.</p>
+<p>VERIFY_PEER will only connect to those peers that provide a valid 
identifying certificate signed by a trusted CA and are using an authenticated 
cipher.</p>
+<p>VERIFY_PEER_NAME is like VERIFY_PEER, but also requires the peer's identity 
as contained in the certificate to be valid (see <a class="el" 
href="group__ssl.html#ga733943a1e722653b5c1f36b7de670ee5">pn_ssl_set_peer_hostname</a>).</p>
+<p>ANONYMOUS_PEER is configured by default. </p>
+<table class="fieldtable">
+<tr><th colspan="2">Enumerator</th></tr><tr><td class="fieldname"><em><a 
class="anchor" 
id="ggae5e33024ed6af3432d4c76d1484d7ecbada1e3837cc900bd6419de72c25b253cc"></a>PN_SSL_VERIFY_NULL</em>&nbsp;</td><td
 class="fielddoc">
+<p>internal use only </p>
+</td></tr>
+<tr><td class="fieldname"><em><a class="anchor" 
id="ggae5e33024ed6af3432d4c76d1484d7ecbad80276abde5d95760c63d0b9685d4d44"></a>PN_SSL_VERIFY_PEER</em>&nbsp;</td><td
 class="fielddoc">
+<p>require peer to provide a valid identifying certificate </p>
+</td></tr>
+<tr><td class="fieldname"><em><a class="anchor" 
id="ggae5e33024ed6af3432d4c76d1484d7ecbafa6dbe705dd0366ff4799616f788a9f5"></a>PN_SSL_ANONYMOUS_PEER</em>&nbsp;</td><td
 class="fielddoc">
+<p>do not require a certificate nor cipher authorization </p>
+</td></tr>
+<tr><td class="fieldname"><em><a class="anchor" 
id="ggae5e33024ed6af3432d4c76d1484d7ecbaac956f0febf05ab579de839700895e36"></a>PN_SSL_VERIFY_PEER_NAME</em>&nbsp;</td><td
 class="fielddoc">
+<p>require valid certificate and matching name </p>
+</td></tr>
+</table>
+
+</div>
+</div>
+<h2 class="groupheader">Function Documentation</h2>
+<a class="anchor" id="gace9c2c01043714e64fe97a390ffeac87"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">PN_EXTERN pn_ssl_t* pn_ssl </td>
+          <td>(</td>
+          <td class="paramtype"><a class="el" 
href="group__transport.html#gac26eda05f649bbf0399f3d8d78d12fa8">pn_transport_t</a>
 *&#160;</td>
+          <td class="paramname"><em>transport</em></td><td>)</td>
+          <td></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Create a new SSL session object associated with a transport.</p>
+<p>A transport must have an SSL object in order to "speak" SSL over its 
connection. This method allocates an SSL object associates it with the 
transport.</p>
+<dl class="params"><dt>Parameters</dt><dd>
+  <table class="params">
+    <tr><td class="paramdir">[in]</td><td 
class="paramname">transport</td><td>the transport that will own the new SSL 
session. </td></tr>
+  </table>
+  </dd>
+</dl>
+<dl class="section return"><dt>Returns</dt><dd>a pointer to the SSL object 
configured for this transport. Returns NULL if no SSL session is associated 
with the transport. </dd></dl>
+
+</div>
+</div>
+<a class="anchor" id="gabc9e5e64b23bf03316aa825ba036fb4f"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">PN_EXTERN pn_ssl_domain_t* pn_ssl_domain </td>
+          <td>(</td>
+          <td class="paramtype"><a class="el" 
href="group__ssl.html#ga0f1d40875c45b14a31a77f27430bc225">pn_ssl_mode_t</a>&#160;</td>
+          <td class="paramname"><em>mode</em></td><td>)</td>
+          <td></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Create an SSL configuration domain</p>
+<p>This method allocates an SSL domain object. This object is used to hold the 
SSL configuration for one or more SSL sessions. The SSL session object 
(pn_ssl_t) is allocated from this object.</p>
+<dl class="params"><dt>Parameters</dt><dd>
+  <table class="params">
+    <tr><td class="paramdir">[in]</td><td class="paramname">mode</td><td>the 
role, client or server, assumed by all SSL sessions created with this domain. 
</td></tr>
+  </table>
+  </dd>
+</dl>
+<dl class="section return"><dt>Returns</dt><dd>a pointer to the SSL domain, if 
SSL support is present. </dd></dl>
+
+</div>
+</div>
+<a class="anchor" id="ga7bf33cfae6dcd6513da926eff993896d"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">PN_EXTERN int 
pn_ssl_domain_allow_unsecured_client </td>
+          <td>(</td>
+          <td class="paramtype">pn_ssl_domain_t *&#160;</td>
+          <td class="paramname"><em>domain</em></td><td>)</td>
+          <td></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Permit a server to accept connection requests from non-SSL clients.</p>
+<p>This configures the server to "sniff" the incoming client data stream, and 
dynamically determine whether SSL/TLS is being used. This option is disabled by 
default: only clients using SSL/TLS are accepted.</p>
+<dl class="params"><dt>Parameters</dt><dd>
+  <table class="params">
+    <tr><td class="paramdir">[in]</td><td class="paramname">domain</td><td>the 
domain (server) that will accept the client connections. </td></tr>
+  </table>
+  </dd>
+</dl>
+<dl class="section return"><dt>Returns</dt><dd>0 on success </dd></dl>
+
+</div>
+</div>
+<a class="anchor" id="ga2f0254dda9b35b5af99e744be243daaf"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">PN_EXTERN void pn_ssl_domain_free </td>
+          <td>(</td>
+          <td class="paramtype">pn_ssl_domain_t *&#160;</td>
+          <td class="paramname"><em>domain</em></td><td>)</td>
+          <td></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Release an SSL configuration domain</p>
+<p>This method frees an SSL domain object allocated by <a class="el" 
href="group__ssl.html#gabc9e5e64b23bf03316aa825ba036fb4f">pn_ssl_domain</a>. 
</p>
+<dl class="params"><dt>Parameters</dt><dd>
+  <table class="params">
+    <tr><td class="paramdir">[in]</td><td class="paramname">domain</td><td>the 
domain to destroy. </td></tr>
+  </table>
+  </dd>
+</dl>
+
+</div>
+</div>
+<a class="anchor" id="ga13bc3cf2d0d2f3f612a513752e929251"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">PN_EXTERN int pn_ssl_domain_set_credentials </td>
+          <td>(</td>
+          <td class="paramtype">pn_ssl_domain_t *&#160;</td>
+          <td class="paramname"><em>domain</em>, </td>
+        </tr>
+        <tr>
+          <td class="paramkey"></td>
+          <td></td>
+          <td class="paramtype">const char *&#160;</td>
+          <td class="paramname"><em>credential_1</em>, </td>
+        </tr>
+        <tr>
+          <td class="paramkey"></td>
+          <td></td>
+          <td class="paramtype">const char *&#160;</td>
+          <td class="paramname"><em>credential_2</em>, </td>
+        </tr>
+        <tr>
+          <td class="paramkey"></td>
+          <td></td>
+          <td class="paramtype">const char *&#160;</td>
+          <td class="paramname"><em>password</em>&#160;</td>
+        </tr>
+        <tr>
+          <td></td>
+          <td>)</td>
+          <td></td><td></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Set the certificate that identifies the local node to the remote.</p>
+<p>This certificate establishes the identity for the local node for all SSL 
sessions created from this domain. It will be sent to the remote if the remote 
needs to verify the identity of this node. This may be used for both SSL 
servers and SSL clients (if client authentication is required by the 
server).</p>
+<dl class="section note"><dt>Note</dt><dd>This setting effects only those 
pn_ssl_t objects created after this call returns. pn_ssl_t objects created 
before invoking this method will use the domain's previous setting.</dd></dl>
+<dl class="params"><dt>Parameters</dt><dd>
+  <table class="params">
+    <tr><td class="paramdir">[in]</td><td class="paramname">domain</td><td>the 
ssl domain that will use this certificate. </td></tr>
+    <tr><td class="paramdir">[in]</td><td 
class="paramname">credential_1</td><td>specifier for the file/database 
containing the identifying certificate. For Openssl users, this is a PEM file. 
For Windows SChannel users, this is the PKCS#12 file or system store. </td></tr>
+    <tr><td class="paramdir">[in]</td><td 
class="paramname">credential_2</td><td>an optional key to access the 
identifying certificate. For Openssl users, this is an optional PEM file 
containing the private key used to sign the certificate. For Windows SChannel 
users, this is the friendly name of the self-identifying certificate if there 
are multiple certificates in the store. </td></tr>
+    <tr><td class="paramdir">[in]</td><td 
class="paramname">password</td><td>the password used to sign the key, else NULL 
if key is not protected. </td></tr>
+  </table>
+  </dd>
+</dl>
+<dl class="section return"><dt>Returns</dt><dd>0 on success </dd></dl>
+
+</div>
+</div>
+<a class="anchor" id="gacba0321d3d8cd67c601b604a5b42a190"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">PN_EXTERN int 
pn_ssl_domain_set_peer_authentication </td>
+          <td>(</td>
+          <td class="paramtype">pn_ssl_domain_t *&#160;</td>
+          <td class="paramname"><em>domain</em>, </td>
+        </tr>
+        <tr>
+          <td class="paramkey"></td>
+          <td></td>
+          <td class="paramtype">const <a class="el" 
href="group__ssl.html#gae5e33024ed6af3432d4c76d1484d7ecb">pn_ssl_verify_mode_t</a>&#160;</td>
+          <td class="paramname"><em>mode</em>, </td>
+        </tr>
+        <tr>
+          <td class="paramkey"></td>
+          <td></td>
+          <td class="paramtype">const char *&#160;</td>
+          <td class="paramname"><em>trusted_CAs</em>&#160;</td>
+        </tr>
+        <tr>
+          <td></td>
+          <td>)</td>
+          <td></td><td></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Configure the level of verification used on the peer certificate.</p>
+<p>This method controls how the peer's certificate is validated, if at all. By 
default, neither servers nor clients attempt to verify their peers 
(PN_SSL_ANONYMOUS_PEER). Once certificates and trusted CAs are configured, peer 
verification can be enabled.</p>
+<dl class="section note"><dt>Note</dt><dd>In order to verify a peer, a trusted 
CA must be configured. See <a class="el" 
href="group__ssl.html#ga20761fc3f72ab4d947a7c468a43758c9">pn_ssl_domain_set_trusted_ca_db()</a>.</dd>
+<dd>
+Servers must provide their own certificate when verifying a peer. See <a 
class="el" 
href="group__ssl.html#ga13bc3cf2d0d2f3f612a513752e929251">pn_ssl_domain_set_credentials()</a>.</dd>
+<dd>
+This setting effects only those pn_ssl_t objects created after this call 
returns. pn_ssl_t objects created before invoking this method will use the 
domain's previous setting.</dd></dl>
+<dl class="params"><dt>Parameters</dt><dd>
+  <table class="params">
+    <tr><td class="paramdir">[in]</td><td class="paramname">domain</td><td>the 
ssl domain to configure. </td></tr>
+    <tr><td class="paramdir">[in]</td><td class="paramname">mode</td><td>the 
level of validation to apply to the peer </td></tr>
+    <tr><td class="paramdir">[in]</td><td 
class="paramname">trusted_CAs</td><td>path to a database of trusted CAs that 
the server will advertise to the peer client if the server has been configured 
to verify its peer. </td></tr>
+  </table>
+  </dd>
+</dl>
+<dl class="section return"><dt>Returns</dt><dd>0 on success </dd></dl>
+
+</div>
+</div>
+<a class="anchor" id="ga20761fc3f72ab4d947a7c468a43758c9"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">PN_EXTERN int pn_ssl_domain_set_trusted_ca_db 
</td>
+          <td>(</td>
+          <td class="paramtype">pn_ssl_domain_t *&#160;</td>
+          <td class="paramname"><em>domain</em>, </td>
+        </tr>
+        <tr>
+          <td class="paramkey"></td>
+          <td></td>
+          <td class="paramtype">const char *&#160;</td>
+          <td class="paramname"><em>certificate_db</em>&#160;</td>
+        </tr>
+        <tr>
+          <td></td>
+          <td>)</td>
+          <td></td><td></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Configure the set of trusted CA certificates used by this domain to verify 
peers.</p>
+<p>If the local SSL client/server needs to verify the identity of the remote, 
it must validate the signature of the remote's certificate. This function sets 
the database of trusted CAs that will be used to verify the signature of the 
remote's certificate.</p>
+<dl class="section note"><dt>Note</dt><dd>This setting effects only those 
pn_ssl_t objects created after this call returns. pn_ssl_t objects created 
before invoking this method will use the domain's previous setting.</dd></dl>
+<dl class="params"><dt>Parameters</dt><dd>
+  <table class="params">
+    <tr><td class="paramdir">[in]</td><td class="paramname">domain</td><td>the 
ssl domain that will use the database. </td></tr>
+    <tr><td class="paramdir">[in]</td><td 
class="paramname">certificate_db</td><td>database of trusted CAs, used to 
authenticate the peer. </td></tr>
+  </table>
+  </dd>
+</dl>
+<dl class="section return"><dt>Returns</dt><dd>0 on success </dd></dl>
+
+</div>
+</div>
+<a class="anchor" id="ga31d1dde4b0fbb1cbc349863013309ba5"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">PN_EXTERN int pn_ssl_get_cert_fingerprint </td>
+          <td>(</td>
+          <td class="paramtype">pn_ssl_t *&#160;</td>
+          <td class="paramname"><em>ssl0</em>, </td>
+        </tr>
+        <tr>
+          <td class="paramkey"></td>
+          <td></td>
+          <td class="paramtype">char *&#160;</td>
+          <td class="paramname"><em>fingerprint</em>, </td>
+        </tr>
+        <tr>
+          <td class="paramkey"></td>
+          <td></td>
+          <td class="paramtype">size_t&#160;</td>
+          <td class="paramname"><em>fingerprint_length</em>, </td>
+        </tr>
+        <tr>
+          <td class="paramkey"></td>
+          <td></td>
+          <td class="paramtype"><a class="el" 
href="group__ssl.html#gaf0b0cd3271ad4a0e33e2a61a8cea7892">pn_ssl_hash_alg</a>&#160;</td>
+          <td class="paramname"><em>hash_alg</em>&#160;</td>
+        </tr>
+        <tr>
+          <td></td>
+          <td>)</td>
+          <td></td><td></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Get the fingerprint of the certificate. The certificate fingerprint (as 
displayed in the Fingerprints section when looking at a certificate with say 
the Firefox browser) is the hexadecimal hash of the entire certificate. The 
fingerprint is not part of the certificate, rather it is computed from the 
certificate and can be used to uniquely identify a certificate. </p>
+<dl class="params"><dt>Parameters</dt><dd>
+  <table class="params">
+    <tr><td class="paramdir">[in]</td><td class="paramname">ssl0</td><td>the 
ssl client/server to query </td></tr>
+    <tr><td class="paramdir">[in]</td><td 
class="paramname">fingerprint</td><td>char pointer. The certificate fingerprint 
(in hex format) will be populated in this array. If sha1 is the digest name, 
the fingerprint is 41 characters long (40 + 1 '\0' character), 65 characters 
long for sha256 and 129 characters long for sha512 and 33 characters for md5. 
</td></tr>
+    <tr><td class="paramdir">[in]</td><td 
class="paramname">fingerprint_length</td><td>- Must be at &gt;= 33 for md5, 
&gt;= 41 for sha1, &gt;= 65 for sha256 and &gt;=129 for sha512. </td></tr>
+    <tr><td class="paramdir">[in]</td><td 
class="paramname">hash_alg</td><td>the hash algorithm to use. Must be of type 
pn_ssl_hash_alg (currently supports sha1, sha256, sha512 and md5) </td></tr>
+  </table>
+  </dd>
+</dl>
+<dl class="section return"><dt>Returns</dt><dd>error code - Returns 0 on 
success. Return a value less than zero if there were any errors. Upon execution 
of this function, char *fingerprint will contain the appropriate null 
terminated hex fingerprint </dd></dl>
+
+</div>
+</div>
+<a class="anchor" id="ga7ea4334e4925b50cb6c6daa4795cdfa0"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">PN_EXTERN bool pn_ssl_get_cipher_name </td>
+          <td>(</td>
+          <td class="paramtype">pn_ssl_t *&#160;</td>
+          <td class="paramname"><em>ssl</em>, </td>
+        </tr>
+        <tr>
+          <td class="paramkey"></td>
+          <td></td>
+          <td class="paramtype">char *&#160;</td>
+          <td class="paramname"><em>buffer</em>, </td>
+        </tr>
+        <tr>
+          <td class="paramkey"></td>
+          <td></td>
+          <td class="paramtype">size_t&#160;</td>
+          <td class="paramname"><em>size</em>&#160;</td>
+        </tr>
+        <tr>
+          <td></td>
+          <td>)</td>
+          <td></td><td></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Get the name of the Cipher that is currently in use.</p>
+<p>Gets a text description of the cipher that is currently active, or returns 
FALSE if SSL is not active (no cipher). Note that the cipher in use may change 
over time due to renegotiation or other changes to the SSL state.</p>
+<dl class="params"><dt>Parameters</dt><dd>
+  <table class="params">
+    <tr><td class="paramdir">[in]</td><td class="paramname">ssl</td><td>the 
ssl client/server to query. </td></tr>
+    <tr><td class="paramdir">[in,out]</td><td 
class="paramname">buffer</td><td>buffer of size bytes to hold cipher name 
</td></tr>
+    <tr><td class="paramdir">[in]</td><td 
class="paramname">size</td><td>maximum number of bytes in buffer. </td></tr>
+  </table>
+  </dd>
+</dl>
+<dl class="section return"><dt>Returns</dt><dd>True if cipher name written to 
buffer, False if no cipher in use. </dd></dl>
+
+</div>
+</div>
+<a class="anchor" id="gabc678b1162484ec8eeddba8b594b1f74"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">PN_EXTERN int pn_ssl_get_peer_hostname </td>
+          <td>(</td>
+          <td class="paramtype">pn_ssl_t *&#160;</td>
+          <td class="paramname"><em>ssl</em>, </td>
+        </tr>
+        <tr>
+          <td class="paramkey"></td>
+          <td></td>
+          <td class="paramtype">char *&#160;</td>
+          <td class="paramname"><em>hostname</em>, </td>
+        </tr>
+        <tr>
+          <td class="paramkey"></td>
+          <td></td>
+          <td class="paramtype">size_t *&#160;</td>
+          <td class="paramname"><em>bufsize</em>&#160;</td>
+        </tr>
+        <tr>
+          <td></td>
+          <td>)</td>
+          <td></td><td></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Access the configured peer identity.</p>
+<p>Return the expected identity of the remote peer, as set by <a class="el" 
href="group__ssl.html#ga733943a1e722653b5c1f36b7de670ee5">pn_ssl_set_peer_hostname</a>.</p>
+<dl class="params"><dt>Parameters</dt><dd>
+  <table class="params">
+    <tr><td class="paramdir">[in]</td><td class="paramname">ssl</td><td>the 
ssl session. </td></tr>
+    <tr><td class="paramdir">[out]</td><td 
class="paramname">hostname</td><td>buffer to hold the null-terminated name 
string. If null, no string is written. </td></tr>
+    <tr><td class="paramdir">[in,out]</td><td 
class="paramname">bufsize</td><td>on input set to the number of octets in 
hostname. On output, set to the number of octets needed to hold the value of 
hostname plus a null byte. Zero if no hostname set. </td></tr>
+  </table>
+  </dd>
+</dl>
+<dl class="section return"><dt>Returns</dt><dd>0 on success. </dd></dl>
+
+</div>
+</div>
+<a class="anchor" id="ga1636bdfcc884dbae248f0316ae2a076f"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">PN_EXTERN bool pn_ssl_get_protocol_name </td>
+          <td>(</td>
+          <td class="paramtype">pn_ssl_t *&#160;</td>
+          <td class="paramname"><em>ssl</em>, </td>
+        </tr>
+        <tr>
+          <td class="paramkey"></td>
+          <td></td>
+          <td class="paramtype">char *&#160;</td>
+          <td class="paramname"><em>buffer</em>, </td>
+        </tr>
+        <tr>
+          <td class="paramkey"></td>
+          <td></td>
+          <td class="paramtype">size_t&#160;</td>
+          <td class="paramname"><em>size</em>&#160;</td>
+        </tr>
+        <tr>
+          <td></td>
+          <td>)</td>
+          <td></td><td></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Get the name of the SSL protocol that is currently in use.</p>
+<p>Gets a text description of the SSL protocol that is currently active, or 
returns FALSE if SSL is not active. Note that the protocol may change over time 
due to renegotiation.</p>
+<dl class="params"><dt>Parameters</dt><dd>
+  <table class="params">
+    <tr><td class="paramdir">[in]</td><td class="paramname">ssl</td><td>the 
ssl client/server to query. </td></tr>
+    <tr><td class="paramdir">[in,out]</td><td 
class="paramname">buffer</td><td>buffer of size bytes to hold the version 
identifier </td></tr>
+    <tr><td class="paramdir">[in]</td><td 
class="paramname">size</td><td>maximum number of bytes in buffer. </td></tr>
+  </table>
+  </dd>
+</dl>
+<dl class="section return"><dt>Returns</dt><dd>True if the version information 
was written to buffer, False if SSL connection not ready. </dd></dl>
+
+</div>
+</div>
+<a class="anchor" id="ga41e9ea2af96fcbc34fda2e72cff40f2c"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">PN_EXTERN const char* pn_ssl_get_remote_subject 
</td>
+          <td>(</td>
+          <td class="paramtype">pn_ssl_t *&#160;</td>
+          <td class="paramname"><em>ssl</em></td><td>)</td>
+          <td></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Get the subject from the peers certificate.</p>
+<dl class="params"><dt>Parameters</dt><dd>
+  <table class="params">
+    <tr><td class="paramdir">[in]</td><td class="paramname">ssl</td><td>the 
ssl client/server to query. </td></tr>
+  </table>
+  </dd>
+</dl>
+<dl class="section return"><dt>Returns</dt><dd>A null terminated string 
representing the full subject, which is valid until the ssl object is 
destroyed. </dd></dl>
+
+</div>
+</div>
+<a class="anchor" id="gae6cd9e970301292a1b502a6a1d8bc2ab"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">PN_EXTERN const char* 
pn_ssl_get_remote_subject_subfield </td>
+          <td>(</td>
+          <td class="paramtype">pn_ssl_t *&#160;</td>
+          <td class="paramname"><em>ssl0</em>, </td>
+        </tr>
+        <tr>
+          <td class="paramkey"></td>
+          <td></td>
+          <td class="paramtype"><a class="el" 
href="group__ssl.html#ga68d52866e8172acc7ecc7b4fe5b38a40">pn_ssl_cert_subject_subfield</a>&#160;</td>
+          <td class="paramname"><em>field</em>&#160;</td>
+        </tr>
+        <tr>
+          <td></td>
+          <td>)</td>
+          <td></td><td></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Returns a char pointer that contains the value of the sub field of the 
subject field in the ssl certificate. The subject field usually contains the 
following sub fields - C = ISO3166 two character country code ST = state or 
province L = Locality; generally means city O = Organization - Company Name OU 
= Organization Unit - division or unit CN = CommonName </p>
+<dl class="params"><dt>Parameters</dt><dd>
+  <table class="params">
+    <tr><td class="paramdir">[in]</td><td class="paramname">ssl0</td><td>the 
ssl client/server to query </td></tr>
+    <tr><td class="paramdir">[in]</td><td class="paramname">field</td><td>The 
enumeration pn_ssl_cert_subject_subfield representing the required sub field. 
</td></tr>
+  </table>
+  </dd>
+</dl>
+<dl class="section return"><dt>Returns</dt><dd>A null terminated string which 
contains the requested sub field value which is valid until the ssl object is 
destroyed. </dd></dl>
+
+</div>
+</div>
+<a class="anchor" id="ga4a1837eb135461f71da666f3438c7602"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">PN_EXTERN int pn_ssl_get_ssf </td>
+          <td>(</td>
+          <td class="paramtype">pn_ssl_t *&#160;</td>
+          <td class="paramname"><em>ssl</em></td><td>)</td>
+          <td></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Get the SSF (security strength factor) of the Cipher that is currently in 
use.</p>
+<dl class="params"><dt>Parameters</dt><dd>
+  <table class="params">
+    <tr><td class="paramdir">[in]</td><td class="paramname">ssl</td><td>the 
ssl client/server to query. </td></tr>
+  </table>
+  </dd>
+</dl>
+<dl class="section return"><dt>Returns</dt><dd>the ssf, note that 0 means no 
security. </dd></dl>
+
+</div>
+</div>
+<a class="anchor" id="gac5f8d77f86808ae8401691bcd17daa77"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">PN_EXTERN int pn_ssl_init </td>
+          <td>(</td>
+          <td class="paramtype">pn_ssl_t *&#160;</td>
+          <td class="paramname"><em>ssl</em>, </td>
+        </tr>
+        <tr>
+          <td class="paramkey"></td>
+          <td></td>
+          <td class="paramtype">pn_ssl_domain_t *&#160;</td>
+          <td class="paramname"><em>domain</em>, </td>
+        </tr>
+        <tr>
+          <td class="paramkey"></td>
+          <td></td>
+          <td class="paramtype">const char *&#160;</td>
+          <td class="paramname"><em>session_id</em>&#160;</td>
+        </tr>
+        <tr>
+          <td></td>
+          <td>)</td>
+          <td></td><td></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Initialize an SSL session.</p>
+<p>This method configures an SSL object using the configuration provided by 
the given domain.</p>
+<dl class="params"><dt>Parameters</dt><dd>
+  <table class="params">
+    <tr><td class="paramdir">[in]</td><td class="paramname">ssl</td><td>the 
ssl session to configured. </td></tr>
+    <tr><td class="paramdir">[in]</td><td class="paramname">domain</td><td>the 
ssl domain used to configure the SSL session. </td></tr>
+    <tr><td class="paramdir">[in]</td><td 
class="paramname">session_id</td><td>if supplied, attempt to resume a previous 
SSL session that used the same session_id. If no previous SSL session is 
available, a new session will be created using the session_id and stored for 
future session restore (see ::<a class="el" 
href="group__ssl.html#ga543c4d6b34f107f41a2812b15e370523">pn_ssl_resume_status</a>).
 </td></tr>
+  </table>
+  </dd>
+</dl>
+<dl class="section return"><dt>Returns</dt><dd>0 on success, else an error 
code. </dd></dl>
+
+</div>
+</div>
+<a class="anchor" id="ga94467860b566683a4c646487dc537b34"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">PN_EXTERN bool pn_ssl_present </td>
+          <td>(</td>
+          <td class="paramtype">void&#160;</td>
+          <td class="paramname"></td><td>)</td>
+          <td></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Tests for SSL implementation present</p>
+<dl class="section return"><dt>Returns</dt><dd>true if we support SSL, false 
if not </dd></dl>
+
+</div>
+</div>
+<a class="anchor" id="ga543c4d6b34f107f41a2812b15e370523"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">PN_EXTERN <a class="el" 
href="group__ssl.html#gaf175c116d52a91001f9a3559b580f56d">pn_ssl_resume_status_t</a>
 pn_ssl_resume_status </td>
+          <td>(</td>
+          <td class="paramtype">pn_ssl_t *&#160;</td>
+          <td class="paramname"><em>ssl</em></td><td>)</td>
+          <td></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Check whether the state has been resumed.</p>
+<p>Used for client session resume. When called on an active session, indicates 
whether the state has been resumed from a previous session.</p>
+<dl class="section note"><dt>Note</dt><dd>This is a best-effort service - 
there is no guarantee that the remote server will accept the resumed 
parameters. The remote server may choose to ignore these parameters, and 
request a re-negotiation instead.</dd></dl>
+<dl class="params"><dt>Parameters</dt><dd>
+  <table class="params">
+    <tr><td class="paramdir">[in]</td><td class="paramname">ssl</td><td>the 
ssl session to check </td></tr>
+  </table>
+  </dd>
+</dl>
+<dl class="section return"><dt>Returns</dt><dd>status code indicating whether 
or not the session has been resumed. </dd></dl>
+
+</div>
+</div>
+<a class="anchor" id="ga733943a1e722653b5c1f36b7de670ee5"></a>
+<div class="memitem">
+<div class="memproto">
+      <table class="memname">
+        <tr>
+          <td class="memname">PN_EXTERN int pn_ssl_set_peer_hostname </td>
+          <td>(</td>
+          <td class="paramtype">pn_ssl_t *&#160;</td>
+          <td class="paramname"><em>ssl</em>, </td>
+        </tr>
+        <tr>
+          <td class="paramkey"></td>
+          <td></td>
+          <td class="paramtype">const char *&#160;</td>
+          <td class="paramname"><em>hostname</em>&#160;</td>
+        </tr>
+        <tr>
+          <td></td>
+          <td>)</td>
+          <td></td><td></td>
+        </tr>
+      </table>
+</div><div class="memdoc">
+<p>Set the expected identity of the remote peer.</p>
+<p>By default, SSL will use the hostname associated with the connection that 
the transport is bound to (see <a class="el" 
href="group__connection.html#ga204a7c356658d414f5d08da4f25f5d9e">pn_connection_set_hostname</a>).
 This method allows the caller to override that default.</p>
+<p>The hostname is used for two purposes: 1) when set on an SSL client, it is 
sent to the server during the handshake (if Server Name Indication is 
supported), and 2) it is used to check against the identifying name provided in 
the peer's certificate. If the supplied name does not exactly match a 
SubjectAltName (type DNS name), or the CommonName entry in the peer's 
certificate, the peer is considered unauthenticated (potential imposter), and 
the SSL connection is aborted.</p>
+<dl class="section note"><dt>Note</dt><dd>Verification of the hostname is only 
done if PN_SSL_VERIFY_PEER_NAME is enabled. See <a class="el" 
href="group__ssl.html#gacba0321d3d8cd67c601b604a5b42a190">pn_ssl_domain_set_peer_authentication</a>.</dd></dl>
+<dl class="params"><dt>Parameters</dt><dd>
+  <table class="params">
+    <tr><td class="paramdir">[in]</td><td class="paramname">ssl</td><td>the 
ssl session. </td></tr>
+    <tr><td class="paramdir">[in]</td><td 
class="paramname">hostname</td><td>the expected identity of the remote. Must 
conform to the syntax as given in RFC1034, Section 3.5. </td></tr>
+  </table>
+  </dd>
+</dl>
+<dl class="section return"><dt>Returns</dt><dd>0 on success. </dd></dl>
+
+</div>
+</div>
+</div><!-- contents -->
+</div><!-- doc-content -->
+<!-- start footer part -->
+<div id="nav-path" class="navpath"><!-- id is needed for treeview function! -->
+  <ul>
+    <li class="footer">Generated by
+    <a href="http://www.doxygen.org/index.html";>
+    <img class="footer" src="doxygen.png" alt="doxygen"/></a> 1.8.3.1 </li>
+  </ul>
+</div>
+</body>
+</html>

http://git-wip-us.apache.org/repos/asf/qpid-site/blob/de3c3488/content/releases/qpid-proton-0.15.0/proton/c/api/group__ssl.js
----------------------------------------------------------------------
diff --git a/content/releases/qpid-proton-0.15.0/proton/c/api/group__ssl.js 
b/content/releases/qpid-proton-0.15.0/proton/c/api/group__ssl.js
new file mode 100755
index 0000000..62d6147
--- /dev/null
+++ b/content/releases/qpid-proton-0.15.0/proton/c/api/group__ssl.js
@@ -0,0 +1,38 @@
+var group__ssl =
+[
+    [ "pn_ssl_cert_subject_subfield", 
"group__ssl.html#ga68d52866e8172acc7ecc7b4fe5b38a40", null ],
+    [ "pn_ssl_hash_alg", "group__ssl.html#gaf0b0cd3271ad4a0e33e2a61a8cea7892", 
null ],
+    [ "pn_ssl_mode_t", "group__ssl.html#ga0f1d40875c45b14a31a77f27430bc225", [
+      [ "PN_SSL_MODE_CLIENT", 
"group__ssl.html#gga0f1d40875c45b14a31a77f27430bc225a4e2fe24fcd2692e4c20c27668091a49c",
 null ],
+      [ "PN_SSL_MODE_SERVER", 
"group__ssl.html#gga0f1d40875c45b14a31a77f27430bc225a0c4550c70a6bc74cb906a74c5f1e5078",
 null ]
+    ] ],
+    [ "pn_ssl_resume_status_t", 
"group__ssl.html#gaf175c116d52a91001f9a3559b580f56d", [
+      [ "PN_SSL_RESUME_UNKNOWN", 
"group__ssl.html#ggaf175c116d52a91001f9a3559b580f56dad1385651f6078177d6652c385453280d",
 null ],
+      [ "PN_SSL_RESUME_NEW", 
"group__ssl.html#ggaf175c116d52a91001f9a3559b580f56dac8a5515a69c89007f681b3c555328e8f",
 null ],
+      [ "PN_SSL_RESUME_REUSED", 
"group__ssl.html#ggaf175c116d52a91001f9a3559b580f56dabb1b88b78dcb91ee80cd6f0eb5873d6d",
 null ]
+    ] ],
+    [ "pn_ssl_verify_mode_t", 
"group__ssl.html#gae5e33024ed6af3432d4c76d1484d7ecb", [
+      [ "PN_SSL_VERIFY_NULL", 
"group__ssl.html#ggae5e33024ed6af3432d4c76d1484d7ecbada1e3837cc900bd6419de72c25b253cc",
 null ],
+      [ "PN_SSL_VERIFY_PEER", 
"group__ssl.html#ggae5e33024ed6af3432d4c76d1484d7ecbad80276abde5d95760c63d0b9685d4d44",
 null ],
+      [ "PN_SSL_ANONYMOUS_PEER", 
"group__ssl.html#ggae5e33024ed6af3432d4c76d1484d7ecbafa6dbe705dd0366ff4799616f788a9f5",
 null ],
+      [ "PN_SSL_VERIFY_PEER_NAME", 
"group__ssl.html#ggae5e33024ed6af3432d4c76d1484d7ecbaac956f0febf05ab579de839700895e36",
 null ]
+    ] ],
+    [ "pn_ssl", "group__ssl.html#gace9c2c01043714e64fe97a390ffeac87", null ],
+    [ "pn_ssl_domain", "group__ssl.html#gabc9e5e64b23bf03316aa825ba036fb4f", 
null ],
+    [ "pn_ssl_domain_allow_unsecured_client", 
"group__ssl.html#ga7bf33cfae6dcd6513da926eff993896d", null ],
+    [ "pn_ssl_domain_free", 
"group__ssl.html#ga2f0254dda9b35b5af99e744be243daaf", null ],
+    [ "pn_ssl_domain_set_credentials", 
"group__ssl.html#ga13bc3cf2d0d2f3f612a513752e929251", null ],
+    [ "pn_ssl_domain_set_peer_authentication", 
"group__ssl.html#gacba0321d3d8cd67c601b604a5b42a190", null ],
+    [ "pn_ssl_domain_set_trusted_ca_db", 
"group__ssl.html#ga20761fc3f72ab4d947a7c468a43758c9", null ],
+    [ "pn_ssl_get_cert_fingerprint", 
"group__ssl.html#ga31d1dde4b0fbb1cbc349863013309ba5", null ],
+    [ "pn_ssl_get_cipher_name", 
"group__ssl.html#ga7ea4334e4925b50cb6c6daa4795cdfa0", null ],
+    [ "pn_ssl_get_peer_hostname", 
"group__ssl.html#gabc678b1162484ec8eeddba8b594b1f74", null ],
+    [ "pn_ssl_get_protocol_name", 
"group__ssl.html#ga1636bdfcc884dbae248f0316ae2a076f", null ],
+    [ "pn_ssl_get_remote_subject", 
"group__ssl.html#ga41e9ea2af96fcbc34fda2e72cff40f2c", null ],
+    [ "pn_ssl_get_remote_subject_subfield", 
"group__ssl.html#gae6cd9e970301292a1b502a6a1d8bc2ab", null ],
+    [ "pn_ssl_get_ssf", "group__ssl.html#ga4a1837eb135461f71da666f3438c7602", 
null ],
+    [ "pn_ssl_init", "group__ssl.html#gac5f8d77f86808ae8401691bcd17daa77", 
null ],
+    [ "pn_ssl_present", "group__ssl.html#ga94467860b566683a4c646487dc537b34", 
null ],
+    [ "pn_ssl_resume_status", 
"group__ssl.html#ga543c4d6b34f107f41a2812b15e370523", null ],
+    [ "pn_ssl_set_peer_hostname", 
"group__ssl.html#ga733943a1e722653b5c1f36b7de670ee5", null ]
+];
\ No newline at end of file


---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscr...@qpid.apache.org
For additional commands, e-mail: commits-h...@qpid.apache.org

Reply via email to