Home
last modified time | relevance | path

Searched refs:SSL_connect (Results 1 – 25 of 55) sorted by relevance

123

/openssl/doc/man3/
H A DSSL_connect.pod5 SSL_connect - initiate the TLS/SSL handshake with an TLS/SSL server
11 int SSL_connect(SSL *ssl);
15 SSL_connect() initiates the TLS/SSL handshake with a server. The communication
21 The behaviour of SSL_connect() depends on the underlying BIO.
23 If the underlying BIO is B<blocking>, SSL_connect() will only return once the
26 If the underlying BIO is B<nonblocking>, SSL_connect() will also return
27 when the underlying BIO could not satisfy the needs of SSL_connect()
30 return value of SSL_connect() will yield B<SSL_ERROR_WANT_READ> or
32 taking appropriate action to satisfy the needs of SSL_connect().
H A DSSL_set_connect_state.pod40 When using the L<SSL_connect(3)> or
63 L<SSL_connect(3)>, L<SSL_accept(3)>,
H A DSSL_set_retry_verify.pod52 L<ssl(7)>, L<SSL_connect(3)>, L<SSL_CTX_set_cert_verify_callback(3)>,
H A DSSL_get_verify_result.pod29 from the error stack there, because once L<SSL_connect(3)> returns,
H A DSSL_set_session.pod19 again during SSL_connect(). Whether the session was reused can be queried
H A DSSL_set_fd.pod66 L<SSL_connect(3)>, L<SSL_accept(3)>,
H A DSSL_do_handshake.pod68 L<SSL_get_error(3)>, L<SSL_connect(3)>,
H A DSSL_accept.pod67 L<SSL_get_error(3)>, L<SSL_connect(3)>,
H A DSSL_read.pod35 explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the
141 L<SSL_connect(3)>, L<SSL_accept(3)>
H A DSSL_CTX_set_cert_verify_callback.pod49 the verification. Calling L<SSL_connect(3)> again resumes the connection
/openssl/test/
H A Dservername_test.c132 if (!TEST_int_le(SSL_connect(con), 0)) in client_setup_sni_before_state()
185 if (!TEST_int_le(SSL_connect(con), 0)) in client_setup_sni_after_state()
H A Ddtlstest.c509 if (!TEST_int_le(SSL_connect(cssl), 0)) in test_swap_records()
517 if (!TEST_int_le(SSL_connect(cssl), 0)) in test_swap_records()
558 if (!TEST_int_gt(SSL_connect(cssl), 0)) in test_swap_records()
H A Dtls13ccstest.c354 if (!TEST_int_gt(SSL_connect(cssl), 0)) in test_tls13ccs()
357 if (!TEST_int_le(SSL_connect(cssl), 0)) in test_tls13ccs()
H A Dclienthellotest.c189 if (!TEST_int_le(SSL_connect(con), 0)) { in test_client_hello()
H A Dquic_client_test.c109 ret = SSL_connect(c_ssl); in test_quic_client_ex()
H A Dquic_tserver_test.c210 ret = SSL_connect(c_ssl); in do_test()
/openssl/demos/sslecho/
H A DREADME.md18 SSL_connect().
H A Dmain.c308 if (SSL_connect(ssl) == 1) { in main()
/openssl/demos/guide/
H A Dtls-client-block.c203 if (SSL_connect(ssl) < 1) { in main()
H A Dquic-client-block.c225 if (SSL_connect(ssl) < 1) { in main()
H A Dtls-client-non-block.c282 while ((ret = SSL_connect(ssl)) != 1) { in main()
H A Dquic-client-non-block.c344 while ((ret = SSL_connect(ssl)) != 1) { in main()
H A Dquic-multi-stream.c254 if (SSL_connect(ssl) < 1) { in main()
/openssl/doc/man7/
H A Dossl-guide-tls-client-non-block.pod223 As in the demo for a blocking TLS client we use the L<SSL_connect(3)> function
227 In such a case we must retry the same L<SSL_connect(3)> call at a later time.
231 while ((ret = SSL_connect(ssl)) != 1) {
238 We continually call L<SSL_connect(3)> until it gives us a success response.
246 send data to the server. As with L<SSL_connect(3)> above, because we are using
H A Dossl-guide-quic-client-non-block.pod311 As in the demo for a blocking QUIC client we use the L<SSL_connect(3)> function
315 messages. In such a case we must retry the same L<SSL_connect(3)> call at a
319 while ((ret = SSL_connect(ssl)) != 1) {
326 We continually call L<SSL_connect(3)> until it gives us a success response.
334 send data to the server. As with L<SSL_connect(3)> above, because we are using

Completed in 54 milliseconds

123