Home
last modified time | relevance | path

Searched refs:SSL_accept (Results 1 – 25 of 39) sorted by relevance

12

/third_party/openssl/doc/man3/
DSSL_accept.pod5 SSL_accept - wait for a TLS/SSL client to initiate a TLS/SSL handshake
11 int SSL_accept(SSL *ssl);
15 SSL_accept() waits for a TLS/SSL client to initiate the TLS/SSL handshake.
21 The behaviour of SSL_accept() depends on the underlying BIO.
23 If the underlying BIO is B<blocking>, SSL_accept() will only return once the
26 If the underlying BIO is B<nonblocking>, SSL_accept() will also return
27 when the underlying BIO could not satisfy the needs of SSL_accept()
30 return value of SSL_accept() will yield B<SSL_ERROR_WANT_READ> or
32 taking appropriate action to satisfy the needs of SSL_accept().
DDTLSv1_listen.pod23 enable the handshake to be completed (for example by using SSL_accept()).
54 SSL_accept(). Typically, for DTLS, the read BIO will be in an "unconnected"
59 where the handshake can be continued by a call to (for example) SSL_accept().
118 L<SSL_accept(3)>, L<ssl(7)>, L<bio(7)>
DSSL_set_connect_state.pod41 L<SSL_accept(3)> routines, the correct handshake
63 L<SSL_connect(3)>, L<SSL_accept(3)>,
DSSL_read_early_data.pod132 L<SSL_write_ex(3)>, L<SSL_read_ex(3)>, L<SSL_accept(3)>, L<SSL_do_handshake(3)>,
176 as L<SSL_accept(3)> or L<SSL_do_handshake(3)>. Alternatively you can call a
186 L<SSL_accept(3)>. This can happen if the client is using a protocol version less
189 L<SSL_accept(3)> anyway. Such a call will successfully return immediately with no
357 L<SSL_accept(3)>,
DSSL_set_fd.pod62 L<SSL_connect(3)>, L<SSL_accept(3)>,
DSSL_write.pod35 explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the peer
138 L<SSL_connect(3)>, L<SSL_accept(3)>
DSSL_read.pod35 explicitly performed by L<SSL_connect(3)> or L<SSL_accept(3)>. If the
133 L<SSL_connect(3)>, L<SSL_accept(3)>
DSSL_do_handshake.pod69 L<SSL_accept(3)>, L<ssl(7)>, L<bio(7)>,
DSSL_connect.pod82 L<SSL_get_error(3)>, L<SSL_accept(3)>,
DSSL_set_bio.pod96 L<SSL_connect(3)>, L<SSL_accept(3)>,
DSSL_CTX_set_info_callback.pod130 str = "SSL_accept";
DSSL_shutdown.pod163 L<SSL_accept(3)>, L<SSL_set_shutdown(3)>,
DSSL_get_error.pod16 statement) for a preceding call to SSL_connect(), SSL_accept(), SSL_do_handshake(),
DSSL_CTX_new.pod233 L<SSL_connect(3)>, L<SSL_accept(3)>,
/third_party/openssl/test/
Ddtlstest.c445 if (!TEST_int_le(ret = SSL_accept(serverssl), 0)) in test_just_finished()
504 if (!TEST_int_le(SSL_accept(sssl), 0)) in test_swap_app_data()
512 if (!TEST_int_gt(SSL_accept(sssl), 0)) in test_swap_app_data()
Drecordlentest.c139 if (!TEST_int_le(SSL_accept(serverssl), 0)) in test_record_overflow()
/third_party/skia/third_party/externals/microhttpd/src/microspdy/
Dio_openssl.c153 if(1 != (ret = SSL_accept(session->io_context))) in SPDYF_openssl_new_session()
/third_party/openssl/doc/man7/
Dssl.pod31 L<SSL_accept(3)> or L<SSL_connect(3)>
/third_party/ffmpeg/libavformat/
Dtls_openssl.c302 ret = c->listen ? SSL_accept(p->ssl) : SSL_connect(p->ssl); in tls_open()
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/include/openssl/
Dssl.h112 int SSL_accept(SSL *ssl);
/third_party/libwebsockets/lib/tls/mbedtls/
Dmbedtls-server.c288 n = SSL_accept(wsi->tls.ssl); in lws_tls_server_accept()
/third_party/openssl/apps/
Ds_server.c2879 i = SSL_accept(con); in init_ssl_connection()
2885 i = SSL_accept(con); in init_ssl_connection()
2896 i = SSL_accept(con); in init_ssl_connection()
2911 i = SSL_accept(con); in init_ssl_connection()
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/
Dssl_lib.c414 int SSL_accept(SSL *ssl) in SSL_accept() function
/third_party/libwebsockets/lib/tls/openssl/
Dopenssl-server.c701 n = SSL_accept(wsi->tls.ssl);
/third_party/rust/crates/rust-openssl/openssl/src/ssl/
Dmod.rs2265 #[corresponds(SSL_accept)]
3533 #[corresponds(SSL_accept)]
3535 let ret = unsafe { ffi::SSL_accept(self.ssl.as_ptr()) }; in accept()

12