| /src/crypto/openssl/doc/man3/ |
| H A D | SSL_accept.pod | 5 SSL_accept - wait for a TLS/SSL client to initiate a TLS/SSL handshake 11 int SSL_accept(SSL *ssl); 15 SSL_accept() waits for a TLS/SSL client to initiate the TLS/SSL handshake. 21 The behaviour of SSL_accept() depends on the underlying BIO. 23 If the underlying BIO is B<blocking>, SSL_accept() will only return once the 26 If the underlying BIO is B<nonblocking>, SSL_accept() will also return 27 when the underlying BIO could not satisfy the needs of SSL_accept() 30 return value of SSL_accept() will yield B<SSL_ERROR_WANT_READ> or 32 taking appropriate action to satisfy the needs of SSL_accept().
|
| H A D | SSL_set_connect_state.pod | 41 L<SSL_accept(3)> routines, the correct handshake 63 L<SSL_connect(3)>, L<SSL_accept(3)>,
|
| H A D | DTLSv1_listen.pod | 23 enable the handshake to be completed (for example by using SSL_accept()). 54 SSL_accept(). Typically, for DTLS, the read BIO will be in an "unconnected" 59 where the handshake can be continued by a call to (for example) SSL_accept(). 138 L<SSL_accept(3)>, L<ssl(7)>, L<bio(7)>
|
| H A D | SSL_read_early_data.pod | 132 L<SSL_write_ex(3)>, L<SSL_read_ex(3)>, L<SSL_accept(3)>, L<SSL_do_handshake(3)>, 176 as L<SSL_accept(3)> or L<SSL_do_handshake(3)>. Alternatively you can call a 186 L<SSL_accept(3)>. This can happen if the client is using a protocol version less 189 L<SSL_accept(3)> anyway. Such a call will successfully return immediately with no 362 L<SSL_accept(3)>,
|
| H A D | SSL_set_fd.pod | 66 L<SSL_connect(3)>, L<SSL_accept(3)>,
|
| H A D | SSL_do_handshake.pod | 69 L<SSL_accept(3)>, L<ssl(7)>, L<bio(7)>,
|
| H A D | SSL_read.pod | 35 explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the 141 L<SSL_connect(3)>, L<SSL_accept(3)>
|
| H A D | SSL_write.pod | 78 explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the peer 190 L<SSL_connect(3)>, L<SSL_accept(3)>
|
| H A D | SSL_connect.pod | 82 L<SSL_get_error(3)>, L<SSL_accept(3)>,
|
| H A D | SSL_CTX_set_info_callback.pod | 134 str = "SSL_accept";
|
| H A D | SSL_set_bio.pod | 111 L<SSL_connect(3)>, L<SSL_accept(3)>,
|
| H A D | SSL_set1_server_cert_type.pod | 125 /* Perform SSL_accept() operations */
|
| H A D | SSL_CTX_new.pod | 235 L<SSL_connect(3)>, L<SSL_accept(3)>,
|
| H A D | SSL_new_listener.pod | 136 functions L<SSL_accept(3)>, L<SSL_do_handshake(3)> or L<SSL_handle_events(3)> to
|
| H A D | SSL_get_error.pod | 16 statement) for a preceding call to SSL_connect(), SSL_accept(), SSL_do_handshake(),
|
| /src/crypto/openssl/test/ |
| H A D | dtlstest.c | 446 if (!TEST_int_le(ret = SSL_accept(serverssl), 0)) in test_just_finished() 508 if (!TEST_int_le(SSL_accept(sssl), 0)) in test_swap_records() 524 if (!TEST_int_gt(SSL_accept(sssl), 0)) in test_swap_records() 621 if (!TEST_int_le(SSL_accept(sssl), 0)) in test_duplicate_app_data() 629 if (!TEST_int_gt(SSL_accept(sssl), 0)) in test_duplicate_app_data()
|
| H A D | recordlentest.c | 139 if (!TEST_int_le(SSL_accept(serverssl), 0)) in test_record_overflow()
|
| /src/contrib/libpcap/ |
| H A D | sslutils.c | 144 if (SSL_accept(ssl) <= 0) { in ssl_promotion()
|
| /src/crypto/openssl/demos/guide/ |
| H A D | tls-server-block.c | 259 if (SSL_accept(ssl) <= 0) { in main()
|
| /src/crypto/openssl/demos/sslecho/ |
| H A D | main.c | 226 if (SSL_accept(ssl) <= 0) { in main()
|
| /src/secure/lib/libssl/ |
| H A D | Version.map | 199 SSL_accept;
|
| /src/tests/sys/kern/ |
| H A D | ssl_sendfile.c | 218 ATF_REQUIRE(SSL_accept(ssl) > 0); in server_thread()
|
| /src/crypto/openssl/apps/ |
| H A D | s_server.c | 3087 i = SSL_accept(con); in init_ssl_connection() 3093 i = SSL_accept(con); in init_ssl_connection() 3104 i = SSL_accept(con); in init_ssl_connection() 3119 i = SSL_accept(con); in init_ssl_connection()
|
| /src/usr.sbin/rpc.tlsservd/ |
| H A D | rpc.tlsservd.c | 743 ret = SSL_accept(ssl); in rpctls_server()
|
| /src/contrib/openbsm/bin/auditdistd/ |
| H A D | proto_tls.c | 705 ret = SSL_accept(ssl); in tls_exec_server()
|