Home
last modified time | relevance | path

Searched refs:SSL_connect (Results 1 – 25 of 34) sorted by relevance

12

/openssl/doc/man3/
H A DSSL_connect.pod5 SSL_connect - initiate the TLS/SSL handshake with an TLS/SSL server
11 int SSL_connect(SSL *ssl);
15 SSL_connect() initiates the TLS/SSL handshake with a server. The communication
21 The behaviour of SSL_connect() depends on the underlying BIO.
23 If the underlying BIO is B<blocking>, SSL_connect() will only return once the
26 If the underlying BIO is B<nonblocking>, SSL_connect() will also return
27 when the underlying BIO could not satisfy the needs of SSL_connect()
30 return value of SSL_connect() will yield B<SSL_ERROR_WANT_READ> or
32 taking appropriate action to satisfy the needs of SSL_connect().
H A DSSL_set_connect_state.pod40 When using the L<SSL_connect(3)> or
63 L<SSL_connect(3)>, L<SSL_accept(3)>,
H A DSSL_set_retry_verify.pod52 L<ssl(7)>, L<SSL_connect(3)>, L<SSL_CTX_set_cert_verify_callback(3)>,
H A DSSL_set_fd.pod62 L<SSL_connect(3)>, L<SSL_accept(3)>,
H A DSSL_set_session.pod19 again during SSL_connect(). Whether the session was reused can be queried
H A DSSL_do_handshake.pod68 L<SSL_get_error(3)>, L<SSL_connect(3)>,
H A DSSL_read.pod35 explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the
133 L<SSL_connect(3)>, L<SSL_accept(3)>
H A DSSL_write.pod35 explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the peer
138 L<SSL_connect(3)>, L<SSL_accept(3)>
H A DSSL_accept.pod67 L<SSL_get_error(3)>, L<SSL_connect(3)>,
H A DSSL_CTX_set_cert_verify_callback.pod49 the verification. Calling L<SSL_connect(3)> again resumes the connection
H A DSSL_CTX_dane_enable.pod64 L<SSL_connect(3)> if (and only if) you want to enable DANE for that connection.
288 /* Perform SSL_connect() handshake and handle errors here */
361 L<SSL_connect(3)>,
H A DSSL_set1_host.pod90 /* XXX: Perform SSL_connect() handshake and handle errors here */
H A DSSL_set_bio.pod96 L<SSL_connect(3)>, L<SSL_accept(3)>,
H A DSSL_CTX_set_info_callback.pod128 str = "SSL_connect";
H A DSSL_read_early_data.pod103 L<SSL_write_ex(3)>, L<SSL_read_ex(3)>, L<SSL_connect(3)>, L<SSL_do_handshake(3)>
115 complete the handshake by calling a function such as L<SSL_connect(3)> or
356 L<SSL_connect(3)>,
H A DSSL_CTX_set_verify.pod56 Calling L<SSL_connect(3)> again resumes the connection attempt by retrying the
206 successfully authenticate. This must be called before SSL_connect().
H A DSSL_shutdown.pod162 L<SSL_get_error(3)>, L<SSL_connect(3)>,
/openssl/test/
H A Ddtlstest.c486 if (!TEST_int_le(SSL_connect(cssl), 0)) in test_swap_epoch()
494 if (!TEST_int_le(SSL_connect(cssl), 0)) in test_swap_epoch()
513 if (!TEST_int_gt(SSL_connect(cssl), 0)) in test_swap_epoch()
560 if (!TEST_int_le(SSL_connect(cssl), 0)) in test_swap_app_data()
568 if (!TEST_int_le(SSL_connect(cssl), 0)) in test_swap_app_data()
588 if (!TEST_int_gt(SSL_connect(cssl), 0)) in test_swap_app_data()
H A Dservername_test.c132 if (!TEST_int_le(SSL_connect(con), 0)) in client_setup_sni_before_state()
185 if (!TEST_int_le(SSL_connect(con), 0)) in client_setup_sni_after_state()
H A Dtls13ccstest.c354 if (!TEST_int_gt(SSL_connect(cssl), 0)) in test_tls13ccs()
357 if (!TEST_int_le(SSL_connect(cssl), 0)) in test_tls13ccs()
H A Dclienthellotest.c189 if (!TEST_int_le(SSL_connect(con), 0)) { in test_client_hello()
/openssl/demos/sslecho/
H A DREADME.md18 SSL_connect().
H A Dmain.c282 if (SSL_connect(ssl) == 1) { in main()
/openssl/doc/man7/
H A Dssl.pod31 L<SSL_accept(3)> or L<SSL_connect(3)>
/openssl/apps/
H A Ds_time.c443 i = SSL_connect(serverCon); in doConnection()

Completed in 61 milliseconds

12