Searched refs:transport (Results 1 – 21 of 21) sorted by relevance
/openssl/crypto/rand/ |
H A D | rand_egd.c | 73 char* transport) in hpns_socket() argument 81 if (!_arg_present(transport) || transport == NULL || transport[0] == '\0') in hpns_socket() 86 if (strcmp(current_transport, transport) == 0) in hpns_socket() 90 if (socket_transport_name_set(AF_UNIX, transport)) in hpns_socket()
|
/openssl/ssl/record/ |
H A D | recordmethod.h | 141 BIO *transport,
|
/openssl/doc/man3/ |
H A D | DTLSv1_listen.pod | 27 Some transport protocols (such as UDP) can be susceptible to amplification 37 designed to operate over a stream-based transport protocol (such as TCP). 39 stream-based transport protocols (e.g. QUIC) may not validate the source
|
H A D | BIO_s_bio.pod | 43 can be used when the application wishes to use a non standard transport for 109 it to the underlying transport. This must be done before any normal processing 117 transport before flushing the write buffer it will never succeed because the
|
H A D | BIO_f_ssl.pod | 51 the chain: this will typically disconnect the underlying transport. 110 SSL BIOs are exceptional in that if the underlying transport 118 an SSL BIO using a blocking transport will never request a
|
H A D | SSL_CTX_set_read_ahead.pod | 51 If the application wants to continue to use the underlying transport (e.g. TCP
|
H A D | SSL_read.pod | 56 of the underlying transport (e.g. TCP), it may be necessary to read several 57 packets from the transport layer before the record is complete and the read call
|
H A D | EVP_SealInit.pod | 63 algorithm that supports key transport.
|
H A D | SSL_get_error.pod | 54 indicate that the underlying transport has been closed.
|
H A D | SSL_read_early_data.pod | 280 establish a new transport layer connection to the server and attempt the SSL/TLS
|
/openssl/ssl/record/methods/ |
H A D | ktls_meth.c | 502 BIO *transport, BIO *next, BIO_ADDR *local, BIO_ADDR *peer, 512 transport, next, local, peer, settings,
|
H A D | tls_common.c | 1050 BIO *transport, BIO *next, BIO_ADDR *local, in tls_int_new_record_layer() argument 1118 if (!tls_set1_bio(rl, transport)) in tls_int_new_record_layer() 1169 BIO *transport, BIO *next, BIO_ADDR *local, BIO_ADDR *peer, in tls_new_record_layer() argument 1179 transport, next, local, peer, settings, in tls_new_record_layer()
|
H A D | dtls_meth.c | 632 BIO *transport, BIO *next, BIO_ADDR *local, BIO_ADDR *peer, in dtls_new_record_layer() argument 642 transport, next, local, peer, settings, in dtls_new_record_layer()
|
H A D | recmethod_local.h | 265 BIO *transport, BIO *next,
|
/openssl/include/openssl/ |
H A D | cmp.h.in | 188 * -- transport layer MAY have some utility in this regard)
|
H A D | ssl.h.in | 463 * Never bother the application with retries if the transport is blocking:
|
/openssl/doc/man1/ |
H A D | openssl-cms.pod.in | 424 Agreement for key transport. The algorithm specified should be suitable for key
|
H A D | openssl-s_server.pod.in | 739 Use SCTP for the transport protocol instead of UDP in DTLS. Must be used in
|
H A D | openssl-s_client.pod.in | 534 Use SCTP for the transport protocol instead of UDP in DTLS. Must be used in
|
/openssl/crypto/err/ |
H A D | openssl.txt | 328 CMS_R_NOT_KEY_TRANSPORT:124:not key transport
|
/openssl/ |
H A D | CHANGES.md | 15386 the underlying transport is blocking) if a handshake took place.
|
Completed in 106 milliseconds