Home
last modified time | relevance | path

Searched refs:SSL_accept (Results 1 – 25 of 31) sorted by relevance

12

/openssl/doc/man3/
H A DSSL_accept.pod5 SSL_accept - wait for a TLS/SSL client to initiate a TLS/SSL handshake
11 int SSL_accept(SSL *ssl);
15 SSL_accept() waits for a TLS/SSL client to initiate the TLS/SSL handshake.
21 The behaviour of SSL_accept() depends on the underlying BIO.
23 If the underlying BIO is B<blocking>, SSL_accept() will only return once the
26 If the underlying BIO is B<nonblocking>, SSL_accept() will also return
27 when the underlying BIO could not satisfy the needs of SSL_accept()
30 return value of SSL_accept() will yield B<SSL_ERROR_WANT_READ> or
32 taking appropriate action to satisfy the needs of SSL_accept().
H A DSSL_set_connect_state.pod41 L<SSL_accept(3)> routines, the correct handshake
63 L<SSL_connect(3)>, L<SSL_accept(3)>,
H A DDTLSv1_listen.pod23 enable the handshake to be completed (for example by using SSL_accept()).
54 SSL_accept(). Typically, for DTLS, the read BIO will be in an "unconnected"
59 where the handshake can be continued by a call to (for example) SSL_accept().
138 L<SSL_accept(3)>, L<ssl(7)>, L<bio(7)>
H A DSSL_set_fd.pod66 L<SSL_connect(3)>, L<SSL_accept(3)>,
H A DSSL_read_early_data.pod132 L<SSL_write_ex(3)>, L<SSL_read_ex(3)>, L<SSL_accept(3)>, L<SSL_do_handshake(3)>,
176 as L<SSL_accept(3)> or L<SSL_do_handshake(3)>. Alternatively you can call a
186 L<SSL_accept(3)>. This can happen if the client is using a protocol version less
189 L<SSL_accept(3)> anyway. Such a call will successfully return immediately with no
362 L<SSL_accept(3)>,
H A DSSL_do_handshake.pod69 L<SSL_accept(3)>, L<ssl(7)>, L<bio(7)>,
H A DSSL_read.pod35 explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the
141 L<SSL_connect(3)>, L<SSL_accept(3)>
H A DSSL_connect.pod82 L<SSL_get_error(3)>, L<SSL_accept(3)>,
H A DSSL_write.pod78 explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the peer
190 L<SSL_connect(3)>, L<SSL_accept(3)>
H A DSSL_CTX_set_info_callback.pod134 str = "SSL_accept";
H A DSSL_set_bio.pod111 L<SSL_connect(3)>, L<SSL_accept(3)>,
H A DSSL_set1_server_cert_type.pod125 /* Perform SSL_accept() operations */
H A DSSL_CTX_new.pod233 L<SSL_connect(3)>, L<SSL_accept(3)>,
H A DSSL_get_error.pod16 statement) for a preceding call to SSL_connect(), SSL_accept(), SSL_do_handshake(),
H A DSSL_CTX_set_verify.pod346 SSL_accept(ssl); /* check of success left out for clarity */
H A DSSL_shutdown.pod421 L<SSL_accept(3)>, L<SSL_set_shutdown(3)>,
/openssl/test/
H A Ddtlstest.c451 if (!TEST_int_le(ret = SSL_accept(serverssl), 0)) in test_just_finished()
513 if (!TEST_int_le(SSL_accept(sssl), 0)) in test_swap_records()
529 if (!TEST_int_gt(SSL_accept(sssl), 0)) in test_swap_records()
H A Drecordlentest.c139 if (!TEST_int_le(SSL_accept(serverssl), 0)) in test_record_overflow()
H A Dsslapitest.c3725 || !TEST_int_gt(SSL_accept(serverssl), 0)) in test_early_data_read_write()
4544 || !TEST_int_eq(SSL_accept(serverssl), 1)) in test_early_data_psk_with_all_ciphers()
4600 if (!TEST_int_le(SSL_accept(serverssl), 0) in test_early_data_not_expected()
4604 || !TEST_int_gt(SSL_accept(serverssl), 0) in test_early_data_not_expected()
10602 || !TEST_int_le(SSL_accept(serverssl), 0)) in test_dh_auto()
11753 if (!TEST_int_eq(SSL_accept(serverssl), -1) in test_handshake_retry()
/openssl/demos/guide/
H A Dtls-server-block.c259 if (SSL_accept(ssl) <= 0) { in main()
/openssl/demos/sslecho/
H A Dmain.c226 if (SSL_accept(ssl) <= 0) { in main()
/openssl/apps/
H A Ds_server.c2985 i = SSL_accept(con); in init_ssl_connection()
2991 i = SSL_accept(con); in init_ssl_connection()
3002 i = SSL_accept(con); in init_ssl_connection()
3017 i = SSL_accept(con); in init_ssl_connection()
/openssl/doc/man7/
H A Dossl-guide-tls-server-block.pod274 if (SSL_accept(ssl) <= 0) {
/openssl/test/helpers/
H A Dssltestlib.c1281 rets = SSL_accept(serverssl); in create_bare_ssl_connection()
/openssl/util/
H A Dlibssl.num296 SSL_accept 297 3_0_0 EXIST::FUNCTION:

Completed in 110 milliseconds

12