Lines Matching +full:double +full:- +full:buffering
18 .\" Set up some character translations and predefined strings. \*(-- will
20 .\" double quote, and \*(R" will give a right double quote. \*(C+ will
24 .tr \(*W-
27 . ds -- \(*W-
29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
37 . ds -- \|\(em\|
71 .\" Fear. Run. Save yourself. No user-serviceable parts.
81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
99 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
100 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
101 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
102 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
104 . \" troff and (daisy-wheel) nroff accents
123 . ds d- d\h'-1'\(ga
124 . ds D- D\h'-1'\(hy
134 .TH SSL_CONNECT 3ossl "2023-09-19" "3.0.11" "OpenSSL"
140 SSL_connect \- initiate the TLS/SSL handshake with an TLS/SSL server
150 \&\fBSSL_connect()\fR initiates the \s-1TLS/SSL\s0 handshake with a server. The communication
152 underlying \fB\s-1BIO\s0\fR.
155 The behaviour of \fBSSL_connect()\fR depends on the underlying \s-1BIO.\s0
157 If the underlying \s-1BIO\s0 is \fBblocking\fR, \fBSSL_connect()\fR will only return once the
160 If the underlying \s-1BIO\s0 is \fBnonblocking\fR, \fBSSL_connect()\fR will also return
161 when the underlying \s-1BIO\s0 could not satisfy the needs of \fBSSL_connect()\fR
162 to continue the handshake, indicating the problem by the return value \-1.
164 return value of \fBSSL_connect()\fR will yield \fB\s-1SSL_ERROR_WANT_READ\s0\fR or
165 \&\fB\s-1SSL_ERROR_WANT_WRITE\s0\fR. The calling process then must repeat the call after
167 The action depends on the underlying \s-1BIO.\s0 When using a nonblocking socket,
169 condition. When using a buffering \s-1BIO,\s0 like a \s-1BIO\s0 pair, data must be written
170 into or retrieved out of the \s-1BIO\s0 before being able to continue.
173 buffer outgoing \s-1TCP\s0 data if a \s-1TCP\s0 packet has already been sent for which no
174 corresponding \s-1ACK\s0 has been received yet from the peer. This can have performance
178 typical for many protocols) then this data could be buffered until an \s-1ACK\s0 has
181 The \fB\s-1TCP_NODELAY\s0\fR socket option is often available to disable Nagle's
184 function \fBBIO_set_tcp_ndelay()\fR can be used to turn on or off the \fB\s-1TCP_NODELAY\s0\fR
190 The \s-1TLS/SSL\s0 handshake was not successful but was shut down controlled and
191 by the specifications of the \s-1TLS/SSL\s0 protocol. Call \fBSSL_get_error()\fR with the
195 The \s-1TLS/SSL\s0 handshake was successfully completed, a \s-1TLS/SSL\s0 connection has been
199 The \s-1TLS/SSL\s0 handshake was not successful, because a fatal error occurred either
213 Copyright 2000\-2020 The OpenSSL Project Authors. All Rights Reserved.
217 in the file \s-1LICENSE\s0 in the source distribution or at