Home
last modified time | relevance | path

Searched refs:SSL_accept (Results 1 – 25 of 43) sorted by relevance

12

/src/crypto/openssl/doc/man3/
H A DSSL_accept.pod5 SSL_accept - wait for a TLS/SSL client to initiate a TLS/SSL handshake
11 int SSL_accept(SSL *ssl);
15 SSL_accept() waits for a TLS/SSL client to initiate the TLS/SSL handshake.
21 The behaviour of SSL_accept() depends on the underlying BIO.
23 If the underlying BIO is B<blocking>, SSL_accept() will only return once the
26 If the underlying BIO is B<nonblocking>, SSL_accept() will also return
27 when the underlying BIO could not satisfy the needs of SSL_accept()
30 return value of SSL_accept() will yield B<SSL_ERROR_WANT_READ> or
32 taking appropriate action to satisfy the needs of SSL_accept().
H A DSSL_set_connect_state.pod41 L<SSL_accept(3)> routines, the correct handshake
63 L<SSL_connect(3)>, L<SSL_accept(3)>,
H A DDTLSv1_listen.pod23 enable the handshake to be completed (for example by using SSL_accept()).
54 SSL_accept(). Typically, for DTLS, the read BIO will be in an "unconnected"
59 where the handshake can be continued by a call to (for example) SSL_accept().
138 L<SSL_accept(3)>, L<ssl(7)>, L<bio(7)>
H A DSSL_read_early_data.pod132 L<SSL_write_ex(3)>, L<SSL_read_ex(3)>, L<SSL_accept(3)>, L<SSL_do_handshake(3)>,
176 as L<SSL_accept(3)> or L<SSL_do_handshake(3)>. Alternatively you can call a
186 L<SSL_accept(3)>. This can happen if the client is using a protocol version less
189 L<SSL_accept(3)> anyway. Such a call will successfully return immediately with no
362 L<SSL_accept(3)>,
H A DSSL_set_fd.pod66 L<SSL_connect(3)>, L<SSL_accept(3)>,
H A DSSL_do_handshake.pod69 L<SSL_accept(3)>, L<ssl(7)>, L<bio(7)>,
H A DSSL_read.pod35 explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the
141 L<SSL_connect(3)>, L<SSL_accept(3)>
H A DSSL_write.pod78 explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the peer
190 L<SSL_connect(3)>, L<SSL_accept(3)>
H A DSSL_connect.pod82 L<SSL_get_error(3)>, L<SSL_accept(3)>,
H A DSSL_CTX_set_info_callback.pod134 str = "SSL_accept";
H A DSSL_set_bio.pod111 L<SSL_connect(3)>, L<SSL_accept(3)>,
H A DSSL_set1_server_cert_type.pod125 /* Perform SSL_accept() operations */
H A DSSL_CTX_new.pod235 L<SSL_connect(3)>, L<SSL_accept(3)>,
H A DSSL_new_listener.pod136 functions L<SSL_accept(3)>, L<SSL_do_handshake(3)> or L<SSL_handle_events(3)> to
H A DSSL_get_error.pod16 statement) for a preceding call to SSL_connect(), SSL_accept(), SSL_do_handshake(),
/src/crypto/openssl/test/
H A Ddtlstest.c446 if (!TEST_int_le(ret = SSL_accept(serverssl), 0)) in test_just_finished()
508 if (!TEST_int_le(SSL_accept(sssl), 0)) in test_swap_records()
524 if (!TEST_int_gt(SSL_accept(sssl), 0)) in test_swap_records()
621 if (!TEST_int_le(SSL_accept(sssl), 0)) in test_duplicate_app_data()
629 if (!TEST_int_gt(SSL_accept(sssl), 0)) in test_duplicate_app_data()
H A Drecordlentest.c139 if (!TEST_int_le(SSL_accept(serverssl), 0)) in test_record_overflow()
/src/contrib/libpcap/
H A Dsslutils.c144 if (SSL_accept(ssl) <= 0) { in ssl_promotion()
/src/crypto/openssl/demos/guide/
H A Dtls-server-block.c259 if (SSL_accept(ssl) <= 0) { in main()
/src/crypto/openssl/demos/sslecho/
H A Dmain.c226 if (SSL_accept(ssl) <= 0) { in main()
/src/secure/lib/libssl/
H A DVersion.map199 SSL_accept;
/src/tests/sys/kern/
H A Dssl_sendfile.c218 ATF_REQUIRE(SSL_accept(ssl) > 0); in server_thread()
/src/crypto/openssl/apps/
H A Ds_server.c3087 i = SSL_accept(con); in init_ssl_connection()
3093 i = SSL_accept(con); in init_ssl_connection()
3104 i = SSL_accept(con); in init_ssl_connection()
3119 i = SSL_accept(con); in init_ssl_connection()
/src/usr.sbin/rpc.tlsservd/
H A Drpc.tlsservd.c743 ret = SSL_accept(ssl); in rpctls_server()
/src/contrib/openbsm/bin/auditdistd/
H A Dproto_tls.c705 ret = SSL_accept(ssl); in tls_exec_server()

12