/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_accept.pod | 5 SSL_accept - wait for a TLS/SSL client to initiate a TLS/SSL handshake 11 int SSL_accept(SSL *ssl); 15 SSL_accept() waits for a TLS/SSL client to initiate the TLS/SSL handshake. 21 The behaviour of SSL_accept() depends on the underlying BIO. 23 If the underlying BIO is B<blocking>, SSL_accept() will only return once the 26 If the underlying BIO is B<nonblocking>, SSL_accept() will also return 27 when the underlying BIO could not satisfy the needs of SSL_accept() 30 return value of SSL_accept() will yield B<SSL_ERROR_WANT_READ> or 32 taking appropriate action to satisfy the needs of SSL_accept().
|
H A D | SSL_set_connect_state.pod | 41 L<SSL_accept(3)> routines, the correct handshake 63 L<SSL_connect(3)>, L<SSL_accept(3)>,
|
H A D | DTLSv1_listen.pod | 23 enable the handshake to be completed (for example by using SSL_accept()). 54 SSL_accept(). Typically, for DTLS, the read BIO will be in an "unconnected" 59 where the handshake can be continued by a call to (for example) SSL_accept(). 135 L<SSL_accept(3)>, L<ssl(7)>, L<bio(7)>
|
H A D | SSL_read_early_data.pod | 132 L<SSL_write_ex(3)>, L<SSL_read_ex(3)>, L<SSL_accept(3)>, L<SSL_do_handshake(3)>, 176 as L<SSL_accept(3)> or L<SSL_do_handshake(3)>. Alternatively you can call a 186 L<SSL_accept(3)>. This can happen if the client is using a protocol version less 189 L<SSL_accept(3)> anyway. Such a call will successfully return immediately with no 357 L<SSL_accept(3)>,
|
H A D | SSL_set_fd.pod | 62 L<SSL_connect(3)>, L<SSL_accept(3)>,
|
H A D | SSL_read.pod | 35 explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the 133 L<SSL_connect(3)>, L<SSL_accept(3)>
|
H A D | SSL_write.pod | 35 explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the peer 138 L<SSL_connect(3)>, L<SSL_accept(3)>
|
H A D | SSL_do_handshake.pod | 69 L<SSL_accept(3)>, L<ssl(7)>, L<bio(7)>,
|
H A D | SSL_connect.pod | 82 L<SSL_get_error(3)>, L<SSL_accept(3)>,
|
H A D | SSL_CTX_set_info_callback.pod | 134 str = "SSL_accept";
|
H A D | SSL_set_bio.pod | 105 L<SSL_connect(3)>, L<SSL_accept(3)>,
|
H A D | SSL_shutdown.pod | 163 L<SSL_accept(3)>, L<SSL_set_shutdown(3)>,
|
H A D | SSL_get_error.pod | 16 statement) for a preceding call to SSL_connect(), SSL_accept(), SSL_do_handshake(),
|
H A D | SSL_CTX_new.pod | 235 L<SSL_connect(3)>, L<SSL_accept(3)>,
|
H A D | SSL_CTX_set_verify.pod | 343 SSL_accept(ssl); /* check of success left out for clarity */
|
/freebsd/crypto/openssl/test/ |
H A D | dtlstest.c | 445 if (!TEST_int_le(ret = SSL_accept(serverssl), 0)) in test_just_finished() 507 if (!TEST_int_le(SSL_accept(sssl), 0)) in test_swap_records() 523 if (!TEST_int_gt(SSL_accept(sssl), 0)) in test_swap_records()
|
H A D | recordlentest.c | 139 if (!TEST_int_le(SSL_accept(serverssl), 0)) in test_record_overflow()
|
/freebsd/contrib/libpcap/ |
H A D | sslutils.c | 144 if (SSL_accept(ssl) <= 0) { in ssl_promotion()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | ssl.pod | 31 L<SSL_accept(3)> or L<SSL_connect(3)>
|
/freebsd/secure/lib/libssl/ |
H A D | Version.map | 199 SSL_accept;
|
/freebsd/crypto/openssl/apps/ |
H A D | s_server.c | 2885 i = SSL_accept(con); in init_ssl_connection() 2891 i = SSL_accept(con); in init_ssl_connection() 2902 i = SSL_accept(con); in init_ssl_connection() 2917 i = SSL_accept(con); in init_ssl_connection()
|
/freebsd/usr.sbin/rpc.tlsservd/ |
H A D | rpc.tlsservd.c | 735 ret = SSL_accept(ssl); in rpctls_server()
|
/freebsd/contrib/openbsm/bin/auditdistd/ |
H A D | proto_tls.c | 705 ret = SSL_accept(ssl); in tls_exec_server()
|
/freebsd/crypto/openssl/test/helpers/ |
H A D | ssltestlib.c | 1103 rets = SSL_accept(serverssl); in create_bare_ssl_connection() 1111 TEST_info("SSL_accept() failed %d, %d", rets, err); in create_bare_ssl_connection()
|
/freebsd/crypto/openssl/util/ |
H A D | libssl.num | 296 SSL_accept 297 3_0_0 EXIST::FUNCTION:
|