Home
last modified time | relevance | path

Searched refs:SSL_accept (Results 1 – 25 of 34) sorted by relevance

12

/freebsd/crypto/openssl/doc/man3/
H A DSSL_accept.pod5 SSL_accept - wait for a TLS/SSL client to initiate a TLS/SSL handshake
11 int SSL_accept(SSL *ssl);
15 SSL_accept() waits for a TLS/SSL client to initiate the TLS/SSL handshake.
21 The behaviour of SSL_accept() depends on the underlying BIO.
23 If the underlying BIO is B<blocking>, SSL_accept() will only return once the
26 If the underlying BIO is B<nonblocking>, SSL_accept() will also return
27 when the underlying BIO could not satisfy the needs of SSL_accept()
30 return value of SSL_accept() will yield B<SSL_ERROR_WANT_READ> or
32 taking appropriate action to satisfy the needs of SSL_accept().
H A DSSL_set_connect_state.pod41 L<SSL_accept(3)> routines, the correct handshake
63 L<SSL_connect(3)>, L<SSL_accept(3)>,
H A DDTLSv1_listen.pod23 enable the handshake to be completed (for example by using SSL_accept()).
54 SSL_accept(). Typically, for DTLS, the read BIO will be in an "unconnected"
59 where the handshake can be continued by a call to (for example) SSL_accept().
135 L<SSL_accept(3)>, L<ssl(7)>, L<bio(7)>
H A DSSL_set_fd.pod62 L<SSL_connect(3)>, L<SSL_accept(3)>,
H A DSSL_read_early_data.pod132 L<SSL_write_ex(3)>, L<SSL_read_ex(3)>, L<SSL_accept(3)>, L<SSL_do_handshake(3)>,
176 as L<SSL_accept(3)> or L<SSL_do_handshake(3)>. Alternatively you can call a
186 L<SSL_accept(3)>. This can happen if the client is using a protocol version less
189 L<SSL_accept(3)> anyway. Such a call will successfully return immediately with no
357 L<SSL_accept(3)>,
H A DSSL_read.pod35 explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the
133 L<SSL_connect(3)>, L<SSL_accept(3)>
H A DSSL_write.pod35 explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the peer
138 L<SSL_connect(3)>, L<SSL_accept(3)>
H A DSSL_do_handshake.pod69 L<SSL_accept(3)>, L<ssl(7)>, L<bio(7)>,
H A DSSL_connect.pod82 L<SSL_get_error(3)>, L<SSL_accept(3)>,
H A DSSL_set_bio.pod96 L<SSL_connect(3)>, L<SSL_accept(3)>,
H A DSSL_CTX_set_info_callback.pod134 str = "SSL_accept";
H A DSSL_shutdown.pod163 L<SSL_accept(3)>, L<SSL_set_shutdown(3)>,
H A DSSL_CTX_new.pod233 L<SSL_connect(3)>, L<SSL_accept(3)>,
H A DSSL_get_error.pod16 statement) for a preceding call to SSL_connect(), SSL_accept(), SSL_do_handshake(),
H A DSSL_CTX_set_verify.pod340 SSL_accept(ssl); /* check of success left out for clarity */
/freebsd/crypto/openssl/test/
H A Ddtlstest.c445 if (!TEST_int_le(ret = SSL_accept(serverssl), 0)) in test_just_finished()
507 if (!TEST_int_le(SSL_accept(sssl), 0)) in test_swap_records()
523 if (!TEST_int_gt(SSL_accept(sssl), 0)) in test_swap_records()
H A Drecordlentest.c139 if (!TEST_int_le(SSL_accept(serverssl), 0)) in test_record_overflow()
/freebsd/contrib/libpcap/
H A Dsslutils.c146 if (SSL_accept(ssl) <= 0) { in ssl_promotion()
/freebsd/secure/lib/libssl/
H A DVersion.map199 SSL_accept;
/freebsd/crypto/openssl/doc/man7/
H A Dssl.pod31 L<SSL_accept(3)> or L<SSL_connect(3)>
/freebsd/crypto/openssl/apps/
H A Ds_server.c2885 i = SSL_accept(con); in init_ssl_connection()
2891 i = SSL_accept(con); in init_ssl_connection()
2902 i = SSL_accept(con); in init_ssl_connection()
2917 i = SSL_accept(con); in init_ssl_connection()
/freebsd/usr.sbin/rpc.tlsservd/
H A Drpc.tlsservd.c788 ret = SSL_accept(ssl); in rpctls_server()
/freebsd/contrib/openbsm/bin/auditdistd/
H A Dproto_tls.c705 ret = SSL_accept(ssl); in tls_exec_server()
/freebsd/crypto/openssl/test/helpers/
H A Dssltestlib.c1094 rets = SSL_accept(serverssl); in create_bare_ssl_connection()
/freebsd/crypto/openssl/util/
H A Dlibssl.num296 SSL_accept 297 3_0_0 EXIST::FUNCTION:

12