/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_connect.pod | 5 SSL_connect - initiate the TLS/SSL handshake with an TLS/SSL server 11 int SSL_connect(SSL *ssl); 15 SSL_connect() initiates the TLS/SSL handshake with a server. The communication 21 The behaviour of SSL_connect() depends on the underlying BIO. 23 If the underlying BIO is B<blocking>, SSL_connect() will only return once the 26 If the underlying BIO is B<nonblocking>, SSL_connect() will also return 27 when the underlying BIO could not satisfy the needs of SSL_connect() 30 return value of SSL_connect() will yield B<SSL_ERROR_WANT_READ> or 32 taking appropriate action to satisfy the needs of SSL_connect().
|
H A D | SSL_set_connect_state.pod | 40 When using the L<SSL_connect(3)> or 63 L<SSL_connect(3)>, L<SSL_accept(3)>,
|
H A D | SSL_set_retry_verify.pod | 52 L<ssl(7)>, L<SSL_connect(3)>, L<SSL_CTX_set_cert_verify_callback(3)>,
|
H A D | SSL_get_verify_result.pod | 29 from the error stack there, because once L<SSL_connect(3)> returns,
|
H A D | SSL_set_session.pod | 19 again during SSL_connect(). Whether the session was reused can be queried
|
H A D | SSL_set_fd.pod | 62 L<SSL_connect(3)>, L<SSL_accept(3)>,
|
H A D | SSL_read.pod | 35 explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the 133 L<SSL_connect(3)>, L<SSL_accept(3)>
|
H A D | SSL_write.pod | 35 explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the peer 138 L<SSL_connect(3)>, L<SSL_accept(3)>
|
H A D | SSL_do_handshake.pod | 68 L<SSL_get_error(3)>, L<SSL_connect(3)>,
|
H A D | SSL_accept.pod | 67 L<SSL_get_error(3)>, L<SSL_connect(3)>,
|
H A D | SSL_CTX_dane_enable.pod | 64 L<SSL_connect(3)> if (and only if) you want to enable DANE for that connection. 288 /* Perform SSL_connect() handshake and handle errors here */ 361 L<SSL_connect(3)>,
|
H A D | SSL_CTX_set_cert_verify_callback.pod | 49 the verification. Calling L<SSL_connect(3)> again resumes the connection
|
H A D | SSL_set1_host.pod | 90 /* XXX: Perform SSL_connect() handshake and handle errors here */
|
H A D | SSL_CTX_set_info_callback.pod | 132 str = "SSL_connect";
|
H A D | SSL_set_bio.pod | 105 L<SSL_connect(3)>, L<SSL_accept(3)>,
|
H A D | SSL_read_early_data.pod | 103 L<SSL_write_ex(3)>, L<SSL_read_ex(3)>, L<SSL_connect(3)>, L<SSL_do_handshake(3)> 115 complete the handshake by calling a function such as L<SSL_connect(3)> or 356 L<SSL_connect(3)>,
|
/freebsd/crypto/openssl/test/ |
H A D | servername_test.c | 132 if (!TEST_int_le(SSL_connect(con), 0)) in client_setup_sni_before_state() 185 if (!TEST_int_le(SSL_connect(con), 0)) in client_setup_sni_after_state()
|
H A D | dtlstest.c | 503 if (!TEST_int_le(SSL_connect(cssl), 0)) in test_swap_records() 511 if (!TEST_int_le(SSL_connect(cssl), 0)) in test_swap_records() 552 if (!TEST_int_gt(SSL_connect(cssl), 0)) in test_swap_records()
|
H A D | tls13ccstest.c | 354 if (!TEST_int_gt(SSL_connect(cssl), 0)) in test_tls13ccs() 357 if (!TEST_int_le(SSL_connect(cssl), 0)) in test_tls13ccs()
|
H A D | clienthellotest.c | 189 if (!TEST_int_le(SSL_connect(con), 0)) { in test_client_hello()
|
/freebsd/contrib/libpcap/ |
H A D | sslutils.c | 150 if (SSL_connect(ssl) <= 0) { in ssl_promotion()
|
/freebsd/contrib/dma/ |
H A D | crypto.c | 190 error = SSL_connect(config.ssl); in smtp_init_crypto()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | ssl.pod | 31 L<SSL_accept(3)> or L<SSL_connect(3)>
|
/freebsd/secure/lib/libssl/ |
H A D | Version.map | 217 SSL_connect;
|
/freebsd/crypto/openssl/apps/ |
H A D | s_time.c | 444 i = SSL_connect(serverCon); in doConnection()
|