Searched refs:SSL_stateless (Results 1 – 10 of 10) sorted by relevance
5 SSL_stateless,13 int SSL_stateless(SSL *s);18 SSL_stateless() statelessly listens for new incoming TLSv1.3 connections.38 If TCP is being used then there is no need to use SSL_stateless(). However, some51 OpenSSL implements this capability via the SSL_stateless() and DTLSv1_listen()70 respectively. For SSL_stateless(), L<SSL_CTX_set_stateless_cookie_generate_cb(3)>78 For SSL_stateless() if an entire ClientHello message cannot be read without the79 "read" BIO becoming empty then the SSL_stateless() call will fail. It is the81 a single SSL_stateless() call is all from the same peer.83 SSL_stateless() will fail (with a 0 return value) if some TLS version less than[all …]
42 L<SSL_stateless(3)> to generate the application-controlled portion of the cookie50 L<SSL_stateless(3)> to determine whether the application-controlled portion of a79 L<SSL_stateless(3)>,
3566 #[corresponds(SSL_stateless)]3569 match unsafe { ffi::SSL_stateless(self.ssl.as_ptr()) } { in stateless()3812 match unsafe { ffi::SSL_stateless(self.inner.ssl.as_ptr()) } { in stateless()
640 pub fn SSL_stateless(s: *mut SSL) -> c_int; in SSL_stateless() function
476 SSL_stateless 477 3_0_0 EXIST::FUNCTION:
5403 || !TEST_int_eq(SSL_stateless(serverssl), -1)) in test_stateless()5424 || !TEST_int_eq(SSL_stateless(serverssl), 0)) in test_stateless()5441 || !TEST_int_eq(SSL_stateless(serverssl), 0) in test_stateless()5446 || !TEST_int_eq(SSL_stateless(serverssl), 1) in test_stateless()
1827 __owur int SSL_stateless(SSL *s);
2855 i = SSL_stateless(con); in init_ssl_connection()
5816 int SSL_stateless(SSL *s) in SSL_stateless() function
1885 __owur int SSL_stateless(SSL *s);