Searched refs:SSL_accept (Results 1 – 25 of 31) sorted by relevance
12
/openssl/doc/man3/ |
H A D | SSL_accept.pod | 5 SSL_accept - wait for a TLS/SSL client to initiate a TLS/SSL handshake 11 int SSL_accept(SSL *ssl); 15 SSL_accept() waits for a TLS/SSL client to initiate the TLS/SSL handshake. 21 The behaviour of SSL_accept() depends on the underlying BIO. 23 If the underlying BIO is B<blocking>, SSL_accept() will only return once the 26 If the underlying BIO is B<nonblocking>, SSL_accept() will also return 27 when the underlying BIO could not satisfy the needs of SSL_accept() 30 return value of SSL_accept() will yield B<SSL_ERROR_WANT_READ> or 32 taking appropriate action to satisfy the needs of SSL_accept().
|
H A D | SSL_set_connect_state.pod | 41 L<SSL_accept(3)> routines, the correct handshake 63 L<SSL_connect(3)>, L<SSL_accept(3)>,
|
H A D | DTLSv1_listen.pod | 23 enable the handshake to be completed (for example by using SSL_accept()). 54 SSL_accept(). Typically, for DTLS, the read BIO will be in an "unconnected" 59 where the handshake can be continued by a call to (for example) SSL_accept(). 138 L<SSL_accept(3)>, L<ssl(7)>, L<bio(7)>
|
H A D | SSL_set_fd.pod | 66 L<SSL_connect(3)>, L<SSL_accept(3)>,
|
H A D | SSL_read_early_data.pod | 132 L<SSL_write_ex(3)>, L<SSL_read_ex(3)>, L<SSL_accept(3)>, L<SSL_do_handshake(3)>, 176 as L<SSL_accept(3)> or L<SSL_do_handshake(3)>. Alternatively you can call a 186 L<SSL_accept(3)>. This can happen if the client is using a protocol version less 189 L<SSL_accept(3)> anyway. Such a call will successfully return immediately with no 362 L<SSL_accept(3)>,
|
H A D | SSL_do_handshake.pod | 69 L<SSL_accept(3)>, L<ssl(7)>, L<bio(7)>,
|
H A D | SSL_read.pod | 35 explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the 141 L<SSL_connect(3)>, L<SSL_accept(3)>
|
H A D | SSL_connect.pod | 82 L<SSL_get_error(3)>, L<SSL_accept(3)>,
|
H A D | SSL_write.pod | 78 explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the peer 190 L<SSL_connect(3)>, L<SSL_accept(3)>
|
H A D | SSL_CTX_set_info_callback.pod | 134 str = "SSL_accept";
|
H A D | SSL_set_bio.pod | 111 L<SSL_connect(3)>, L<SSL_accept(3)>,
|
H A D | SSL_set1_server_cert_type.pod | 125 /* Perform SSL_accept() operations */
|
H A D | SSL_CTX_new.pod | 233 L<SSL_connect(3)>, L<SSL_accept(3)>,
|
H A D | SSL_get_error.pod | 16 statement) for a preceding call to SSL_connect(), SSL_accept(), SSL_do_handshake(),
|
H A D | SSL_CTX_set_verify.pod | 346 SSL_accept(ssl); /* check of success left out for clarity */
|
H A D | SSL_shutdown.pod | 421 L<SSL_accept(3)>, L<SSL_set_shutdown(3)>,
|
/openssl/test/ |
H A D | dtlstest.c | 451 if (!TEST_int_le(ret = SSL_accept(serverssl), 0)) in test_just_finished() 513 if (!TEST_int_le(SSL_accept(sssl), 0)) in test_swap_records() 529 if (!TEST_int_gt(SSL_accept(sssl), 0)) in test_swap_records()
|
H A D | recordlentest.c | 139 if (!TEST_int_le(SSL_accept(serverssl), 0)) in test_record_overflow()
|
H A D | sslapitest.c | 3725 || !TEST_int_gt(SSL_accept(serverssl), 0)) in test_early_data_read_write() 4544 || !TEST_int_eq(SSL_accept(serverssl), 1)) in test_early_data_psk_with_all_ciphers() 4600 if (!TEST_int_le(SSL_accept(serverssl), 0) in test_early_data_not_expected() 4604 || !TEST_int_gt(SSL_accept(serverssl), 0) in test_early_data_not_expected() 10602 || !TEST_int_le(SSL_accept(serverssl), 0)) in test_dh_auto() 11753 if (!TEST_int_eq(SSL_accept(serverssl), -1) in test_handshake_retry()
|
/openssl/demos/guide/ |
H A D | tls-server-block.c | 259 if (SSL_accept(ssl) <= 0) { in main()
|
/openssl/demos/sslecho/ |
H A D | main.c | 226 if (SSL_accept(ssl) <= 0) { in main()
|
/openssl/apps/ |
H A D | s_server.c | 2985 i = SSL_accept(con); in init_ssl_connection() 2991 i = SSL_accept(con); in init_ssl_connection() 3002 i = SSL_accept(con); in init_ssl_connection() 3017 i = SSL_accept(con); in init_ssl_connection()
|
/openssl/doc/man7/ |
H A D | ossl-guide-tls-server-block.pod | 274 if (SSL_accept(ssl) <= 0) {
|
/openssl/test/helpers/ |
H A D | ssltestlib.c | 1281 rets = SSL_accept(serverssl); in create_bare_ssl_connection()
|
/openssl/util/ |
H A D | libssl.num | 296 SSL_accept 297 3_0_0 EXIST::FUNCTION:
|
Completed in 70 milliseconds
12