Searched refs:DTLSv1_listen (Results 1 – 10 of 10) sorted by relevance
/openssl-master/doc/man3/ |
A D | DTLSv1_listen.pod | 6 DTLSv1_listen 14 int DTLSv1_listen(SSL *ssl, BIO_ADDR *peer); 19 DTLSv1_listen() statelessly listens for new incoming DTLS connections. If a 51 OpenSSL implements this capability via the SSL_stateless() and DTLSv1_listen() 60 Additionally, for DTLSv1_listen(), the B<BIO_ADDR> pointed to by B<peer> will be 67 Prior to calling DTLSv1_listen() user code must ensure that cookie generation 73 Since DTLSv1_listen() operates entirely statelessly whilst processing incoming 86 Both SSL_stateless() and DTLSv1_listen() will clear the error queue when they 104 call to DTLSv1_listen() in the event of a non-fatal error. 109 For DTLSv1_listen(), prior to OpenSSL 1.1.0, fatal and non-fatal errors both [all …]
|
A D | SSL_CTX_set_stateless_cookie_generate_cb.pod | 57 SSL_CTX_set_cookie_generate_cb() sets the callback used by L<DTLSv1_listen(3)> 65 SSL_CTX_set_cookie_verify_cb() sets the callback used by L<DTLSv1_listen(3)> to 80 L<DTLSv1_listen(3)>
|
/openssl-master/test/ |
A D | dtlsv1listentest.c | 320 if (!TEST_int_ge(ret = DTLSv1_listen(ssl, peer), 0)) in dtls_listen_test()
|
/openssl-master/ssl/ |
A D | d1_lib.c | 440 int DTLSv1_listen(SSL *s, BIO_ADDR *client) in DTLSv1_listen() function
|
/openssl-master/util/ |
A D | libssl.num | 60 DTLSv1_listen 61 3_0_0 EXIST::FUNCTION:SOCK
|
/openssl-master/doc/ |
A D | build.info | 986 DEPEND[html/man3/DTLSv1_listen.html]=man3/DTLSv1_listen.pod 987 GENERATE[html/man3/DTLSv1_listen.html]=man3/DTLSv1_listen.pod 988 DEPEND[man/man3/DTLSv1_listen.3]=man3/DTLSv1_listen.pod 989 GENERATE[man/man3/DTLSv1_listen.3]=man3/DTLSv1_listen.pod 2968 html/man3/DTLSv1_listen.html \ 3560 man/man3/DTLSv1_listen.3 \
|
/openssl-master/apps/ |
A D | s_server.c | 2806 i = DTLSv1_listen(con, client); in init_ssl_connection()
|
/openssl-master/ |
A D | NEWS.md | 493 * Segmentation fault in DTLSv1_listen fix ([CVE-2015-0207])
|
A D | CHANGES.md | 3510 * The arguments to the DTLSv1_listen function have changed. Specifically the 5416 * Segmentation fault in DTLSv1_listen fix 5418 The DTLSv1_listen function is intended to be stateless and processes the 5420 over the call to DTLSv1_listen until a valid ClientHello is received with 5421 an associated cookie. A defect in the implementation of DTLSv1_listen means
|
/openssl-master/include/openssl/ |
A D | ssl.h.in | 2243 int DTLSv1_listen(SSL *s, BIO_ADDR *client);
|
Completed in 52 milliseconds