Searched refs:accept (Results 1 – 25 of 69) sorted by relevance
123
/openssl/doc/man3/ |
H A D | BIO_s_accept.pod | 42 round the platform's TCP/IP socket accept routines. 55 If the close flag is set on an accept BIO then any active 59 Calling BIO_reset() on an accept BIO will close any active 64 the accept socket. See L<BIO_s_fd(3)> 101 be automatically freed when the accept BIO is freed. 117 the socket will be configured to accept TCP Fast Open 141 that is the chain will be accept->otherbios->socket. 148 connection = BIO_pop(accept); 158 however because the accept BIO will still accept additional incoming 203 fprintf(stderr, "Error setting up accept\n"); [all …]
|
H A D | SSL_accept_stream.pod | 6 accept an incoming QUIC stream from a QUIC peer 41 currently waiting in the accept queue. 59 currently waiting in the accept queue, or 0 if called on an SSL object other than
|
H A D | BIO_f_ssl.pod | 52 The SSL BIO is then reset to the initial accept or connect state. 244 * BIO chain is now 'swallowed' by the accept BIO and 245 * will be freed when the accept BIO is freed. 250 /* First call to BIO_do_accept() sets up accept BIO */ 252 fprintf(stderr, "Error setting up accept BIO\n"); 264 /* We only want one connection so remove and free accept BIO */
|
H A D | SSL_set1_server_cert_type.pod | 43 These extensions let each side know what its peer is able to accept. 49 willing to accept.
|
H A D | SSL_set_connect_state.pod | 36 call the connect (client) or accept (server) routines. Even though it may
|
H A D | SSL_set_incoming_stream_policy.pod | 61 Always accept incoming streams, allowing them to be dequeued using
|
H A D | SSL_get0_peer_rpk.pod | 44 endpoint must be able to accept either one.
|
H A D | SSL_read_early_data.pod | 193 the maximum amount of any early data that it will accept on any future 194 connection attempt. By default the server does not accept early data; a 235 decision is made to accept or reject early data. The callback is provided with a 279 changed to accept a lower max early data value such as by calling
|
H A D | SSL_new_stream.pod | 38 streams. To accept incoming streams initiated by a peer, use
|
H A D | SSL_write.pod | 27 SSL_write_ex2() functions similarly to SSL_write_ex() but can also accept 39 The I<flags> argument to SSL_write_ex2() can accept zero or more of the
|
/openssl/test/ssl-tests/ |
H A D | 03-custom_verify.cnf | 11 test-6 = 6-noverify-accept-custom-allow 168 [6-noverify-accept-custom-allow] 169 ssl_conf = 6-noverify-accept-custom-allow-ssl 171 [6-noverify-accept-custom-allow-ssl] 172 server = 6-noverify-accept-custom-allow-server 173 client = 6-noverify-accept-custom-allow-client 175 [6-noverify-accept-custom-allow-server] 180 [6-noverify-accept-custom-allow-client] 185 client = 6-noverify-accept-custom-allow-client-extra 187 [6-noverify-accept-custom-allow-client-extra]
|
H A D | 03-custom_verify.cnf.in | 100 name => "noverify-accept-custom-allow",
|
/openssl/include/internal/ |
H A D | e_os.h | 324 # define accept(a,b,c) accept(a,(struct sockaddr *)b,c) macro
|
H A D | sockets.h | 61 # define accept(s,f,l) ((int)accept(s,f,l)) macro
|
/openssl/demos/sslecho/ |
H A D | A-SSL-Docs.txt | 17 You can just hit carriage returns to accept the default values, except for "Common Name"; you
|
H A D | main.c | 209 client_skt = accept(server_skt, (struct sockaddr*) &addr, in main()
|
/openssl/engines/ |
H A D | e_afalg.txt | 18 AFALG_R_SOCKET_ACCEPT_FAILED:110:socket accept failed
|
/openssl/util/platform_symbols/ |
H A D | unix-symbols.txt | 2 accept
|
/openssl/doc/man7/ |
H A D | ossl-guide-tls-server-block.pod | 60 We would also like to restrict the TLS versions that we are willing to accept to 201 acceptor BIO on which to accept client connections. This just records the 221 function will accept new connections. 239 At this point the server blocks to accept the next client: 301 The server is now ready to accept the next client connection.
|
/openssl/ |
H A D | CONTRIBUTING.md | 22 To make it easier to review and accept your pull request, please follow these 67 often. We do not accept merge commits, you will have to remove them
|
H A D | NOTES-UNIX.md | 13 configuration scripts MUST be in a form that the compiler can accept. 14 This varies between systems, where some have compilers that accept
|
/openssl/doc/man1/ |
H A D | openssl-passphrase-options.pod | 16 Several OpenSSL commands accept password arguments, typically using B<-passin>
|
H A D | openssl-s_server.pod.in | 13 [B<-accept> I<val>] 179 =item B<-accept> I<val> 185 Unix domain socket to accept on. 926 End the current SSL connection but still accept new connections. 966 This command can be used to debug SSL clients. To accept connections 969 openssl s_server -accept 443 -www
|
/openssl/crypto/bio/ |
H A D | bio_sock2.c | 424 accepted_sock = accept(accept_sock, in BIO_accept_ex()
|
/openssl/doc/designs/quic-design/ |
H A D | quic-connID-retire.md | 52 However, see above. Suggest we accept either.
|
Completed in 34 milliseconds
123