Searched refs:DTLSv1_listen (Results 1 – 14 of 14) sorted by relevance
/openssl/doc/man3/ |
H A D | DTLSv1_listen.pod | 6 DTLSv1_listen 14 int DTLSv1_listen(SSL *ssl, BIO_ADDR *peer); 19 DTLSv1_listen() statelessly listens for new incoming DTLS connections. If a 51 OpenSSL implements this capability via the SSL_stateless() and DTLSv1_listen() 68 the peer after making use of DTLSv1_listen(). In the typical case where 84 Prior to calling DTLSv1_listen() user code must ensure that cookie generation 90 Since DTLSv1_listen() operates entirely statelessly whilst processing incoming 103 Both SSL_stateless() and DTLSv1_listen() will clear the error queue when they 124 call to DTLSv1_listen() in the event of a non-fatal error. 129 For DTLSv1_listen(), prior to OpenSSL 1.1.0, fatal and non-fatal errors both [all …]
|
H A D | SSL_CTX_set_stateless_cookie_generate_cb.pod | 57 SSL_CTX_set_cookie_generate_cb() sets the callback used by L<DTLSv1_listen(3)> 65 SSL_CTX_set_cookie_verify_cb() sets the callback used by L<DTLSv1_listen(3)> to 80 L<DTLSv1_listen(3)>
|
H A D | BIO_s_datagram.pod | 78 L<DTLSv1_listen(3)> must be used; see L<DTLSv1_listen(3)> for further 259 L<BIO_sendmmsg(3)>, L<BIO_s_dgram_pair(3)>, L<DTLSv1_listen(3)>, L<bio(7)>
|
/openssl/test/ |
H A D | dtlsv1listentest.c | 320 if (!TEST_int_ge(ret = DTLSv1_listen(ssl, peer), 0)) in dtls_listen_test()
|
/openssl/ssl/ |
H A D | d1_lib.c | 418 int DTLSv1_listen(SSL *ssl, BIO_ADDR *client) in DTLSv1_listen() function
|
/openssl/test/helpers/ |
H A D | ssltestlib.c | 1268 rets = DTLSv1_listen(serverssl, peer); in create_bare_ssl_connection()
|
/openssl/util/ |
H A D | libssl.num | 60 DTLSv1_listen 61 3_0_0 EXIST::FUNCTION:SOCK
|
/openssl/doc/ |
H A D | build.info | 1022 DEPEND[html/man3/DTLSv1_listen.html]=man3/DTLSv1_listen.pod 1023 GENERATE[html/man3/DTLSv1_listen.html]=man3/DTLSv1_listen.pod 1024 DEPEND[man/man3/DTLSv1_listen.3]=man3/DTLSv1_listen.pod 1025 GENERATE[man/man3/DTLSv1_listen.3]=man3/DTLSv1_listen.pod 3265 html/man3/DTLSv1_listen.html \ 3929 man/man3/DTLSv1_listen.3 \
|
/openssl/doc/designs/quic-design/ |
H A D | record-layer.md | 277 counters. However in the DTLSv1_listen() corner case, libssl needs to initialise
|
H A D | quic-api-ssl-funcs.md | 710 | `DTLSv1_listen` | RL | U | U | NC | Done …
|
/openssl/apps/ |
H A D | s_server.c | 2959 i = DTLSv1_listen(con, client); in init_ssl_connection()
|
/openssl/ |
H A D | NEWS.md | 962 * Segmentation fault in DTLSv1_listen fix ([CVE-2015-0207])
|
H A D | CHANGES.md | 5455 * The arguments to the DTLSv1_listen function have changed. Specifically the 7361 * Segmentation fault in DTLSv1_listen fix 7363 The DTLSv1_listen function is intended to be stateless and processes the 7365 over the call to DTLSv1_listen until a valid ClientHello is received with 7366 an associated cookie. A defect in the implementation of DTLSv1_listen means
|
/openssl/include/openssl/ |
H A D | ssl.h.in | 2531 int DTLSv1_listen(SSL *s, BIO_ADDR *client);
|
Completed in 110 milliseconds