Home
last modified time | relevance | path

Searched refs:connect (Results 1 – 25 of 52) sorted by relevance

123

/openssl/doc/man3/
H A DBIO_s_connect.pod11 BIO_do_connect - connect BIO
40 BIO_s_connect() returns the connect BIO method. This is a wrapper
43 Using connect BIOs, TCP/IP connections can be made and data
47 Read and write operations on a connect BIO will perform I/O
54 If the close flag is set on a connect BIO then any active
58 Calling BIO_reset() on a connect BIO will close any active
59 connection and reset the BIO into a state where it can connect
96 non blocking I/O is set during the connect process.
98 BIO_do_connect() attempts to connect the supplied BIO.
102 after connect() failures.
[all …]
H A DOSSL_HTTP_transfer.pod20 int connect, int detail);
85 The HTTP client functions connect via the given proxy unless the I<server>
99 I<bio_update_fn> is a BIO connect/disconnect callback function with prototype
101 BIO *(*OSSL_HTTP_bio_cb_t)(BIO *bio, void *arg, int connect, int detail)
107 callback function is invoked with the I<connect> argument being 1 and
109 On disconnect I<connect> is 0 and I<detail> is 1 if no error occurred, else 0.
110 For instance, on connect the callback may push an SSL BIO to implement HTTPS;
118 BIO *http_tls_cb(BIO *bio, void *arg, int connect, int detail)
120 if (connect && detail) { /* connecting with TLS */
125 } else if (!connect) { /* disconnecting */
[all …]
H A DBIO_f_ssl.pod52 The SSL BIO is then reset to the initial accept or connect state.
82 SSL BIO (using B<ctx>) followed by a connect BIO.
85 of a buffering BIO, an SSL BIO (using B<ctx>), and a connect BIO.
101 after connect() failures.
104 The call BIO_should_retry() should be used for nonblocking connect BIOs
124 to locate the connect BIO first.
H A DSSL_set_session.pod5 SSL_set_session - set a TLS/SSL session to be used during TLS/SSL connect
H A DSSL_set1_initial_peer_addr.pod19 representing a UDP destination address of the server to connect to.
H A DSSL_set_connect_state.pod36 call the connect (client) or accept (server) routines. Even though it may
H A DSSL_set_fd.pod5 SSL_set_fd, SSL_set_rfd, SSL_set_wfd - connect the SSL object with a file descriptor
H A DDTLSv1_listen.pod43 mechanism. The idea is that when a client attempts to connect to a server it
64 AF_UNSPEC. Typically user code is expected to "connect" the underlying socket to
H A DBIO_s_accept.pod73 connect BIOs, that is it can be a numerical port string or a
78 BIO_set_conn_port() for connect BIOs, that is it can be a numerical
/openssl/test/ssl-tests/
H A D17-renegotiate.cnf11 test-6 = 6-renegotiate-client-legacy-connect
199 [6-renegotiate-client-legacy-connect]
200 ssl_conf = 6-renegotiate-client-legacy-connect-ssl
202 [6-renegotiate-client-legacy-connect-ssl]
203 server = 6-renegotiate-client-legacy-connect-server
204 client = 6-renegotiate-client-legacy-connect-client
206 [6-renegotiate-client-legacy-connect-server]
212 [6-renegotiate-client-legacy-connect-client]
H A D17-renegotiate.cnf.in114 name => "renegotiate-client-legacy-connect",
/openssl/doc/man1/
H A Dopenssl-s_time.pod.in12 [B<-connect> I<host>:I<port>]
50 =item B<-connect> I<host>:I<port>
52 This specifies the host and optional port to connect to.
140 To connect to an SSL HTTP server and get the default page the command
142 …openssl s_time -connect servername:443 -www / -CApath yourdir -CAfile yourfile.pem -cipher commonc…
H A Dopenssl-s_client.pod.in13 [B<-connect> I<host>:I<port>]
165 =item B<-connect> I<host>:I<port>
170 is made to connect to the local host on port 4433.
175 Host to connect to; use B<-connect> instead.
179 Connect to the specified port; use B<-connect> instead.
232 the name given to B<-connect> if it follows a DNS name format. If B<-connect> is
390 -connect smtp.example.com:25 \
875 nor B<-connect> are provided, falls back to attempting to connect to
976 openssl s_client -connect servername:443
1025 openssl s_client -connect <server address>:443 -tls1_3
[all …]
/openssl/demos/sslecho/
H A DREADME.md16 - Connection to the SSL server starts as a standard TCP 'connect'.
H A Dmain.c286 if (connect(client_skt, (struct sockaddr*) &addr, sizeof(addr)) != 0) { in main()
/openssl/util/platform_symbols/
H A Dunix-symbols.txt13 connect
/openssl/crypto/rand/
H A Drand_egd.c137 if (connect(fd, (struct sockaddr *)&addr, i) == 0) in RAND_query_egd_bytes()
/openssl/doc/designs/ddd/
H A Dddd-03-fd-blocking.c181 rc = connect(fd, result->ai_addr, result->ai_addrlen); in main()
H A Dddd-04-fd-nonblocking.c349 rc = connect(fd, result->ai_addr, result->ai_addrlen); in main()
H A Dddd-05-mem-nonblocking.c401 rc = connect(fd, result->ai_addr, result->ai_addrlen);
/openssl/include/openssl/
H A Dhttp.h68 typedef BIO *(*OSSL_HTTP_bio_cb_t)(BIO *bio, void *arg, int connect, int detail);
/openssl/doc/man7/
H A Dossl-guide-tls-client-block.pod145 provide the POSIX compatible I<connect> function. For example:
161 if (connect(sock, (struct sockaddr *)&serveraddr,
183 * we can connect to.
188 * as "socket" here for this and the subsequent connect and close
266 one we want to connect to. Without this information we may get a handshake
275 * to connect to in case the server supports multiple hosts.
314 printf("Failed to connect to the server\n");
328 indicates that we have failed to connect to the server.
505 =head2 Failure to connect the underlying socket
/openssl/test/
H A Dquic_client_test.c195 if (!TEST_int_eq(connect(c_fd, (const struct sockaddr *)&sin, sizeof(sin)), 0)) in test_quic_client_connect_first()
/openssl/crypto/bio/
H A Dbio_sock2.c175 if (connect(sock, BIO_ADDR_sockaddr(addr), in BIO_connect()
/openssl/
H A DREADME-QUIC.md59 $ openssl s_client -quic -alpn myalpn -connect host:port

Completed in 62 milliseconds

123