/openssl-master/doc/man3/ |
A D | BIO_s_connect.pod | 10 BIO_set_nbio, BIO_do_connect - connect BIO 35 BIO_s_connect() returns the connect BIO method. This is a wrapper 38 Using connect BIOs, TCP/IP connections can be made and data 42 Read and write operations on a connect BIO will perform I/O 49 If the close flag is set on a connect BIO then any active 53 Calling BIO_reset() on a connect BIO will close any active 54 connection and reset the BIO into a state where it can connect 91 non blocking I/O is set during the connect process. 93 BIO_do_connect() attempts to connect the supplied BIO. 97 after connect() failures. [all …]
|
A D | OSSL_HTTP_transfer.pod | 20 int connect, int detail); 81 The HTTP client functions connect via the given proxy unless the I<server> 94 I<bio_update_fn> is a BIO connect/disconnect callback function with prototype 96 BIO *(*OSSL_HTTP_bio_cb_t)(BIO *bio, void *arg, int connect, int detail) 102 the function is invoked with the I<connect> argument being 1 and the I<detail> 104 On disconnect I<connect> is 0 and I<detail> is 1 if no error occurred, else 0. 105 For instance, on connect the function may prepend a TLS BIO to implement HTTPS; 110 BIO *http_tls_cb(BIO *hbio, void *arg, int connect, int detail) 112 if (connect && detail) { /* connecting with TLS */ 117 } else if (!connect && !detail) { /* disconnecting after error */ [all …]
|
A D | BIO_f_ssl.pod | 52 The SSL BIO is then reset to the initial accept or connect state. 82 SSL BIO (using B<ctx>) followed by a connect BIO. 85 of a buffering BIO, an SSL BIO (using B<ctx>), and a connect BIO. 101 after connect() failures. 104 The call BIO_should_retry() should be used for nonblocking connect BIOs 124 to locate the connect BIO first.
|
A D | SSL_set_fd.pod | 5 SSL_set_fd, SSL_set_rfd, SSL_set_wfd - connect the SSL object with a file descriptor
|
A D | SSL_set_session.pod | 5 SSL_set_session - set a TLS/SSL session to be used during TLS/SSL connect
|
A D | SSL_set_connect_state.pod | 36 call the connect (client) or accept (server) routines. Even though it may
|
A D | DTLSv1_listen.pod | 43 mechanism. The idea is that when a client attempts to connect to a server it 64 AF_UNSPEC. Typically user code is expected to "connect" the underlying socket to
|
A D | OSSL_CMP_CTX_new.pod | 336 OSSL_CMP_CTX_set_serverPort() sets the port of the CMP server to connect to. 354 OSSL_CMP_CTX_set_http_cb() sets the optional BIO connect/disconnect callback 357 typedef BIO *(*HTTP_bio_cb_t) (BIO *bio, void *ctx, int connect, int detail); 363 the function is invoked with the I<connect> argument being 1 and the I<detail> 365 disconnect I<connect> is 0 and I<detail> is 1 in case no error occurred, else 0. 366 For instance, on connect the function may prepend a TLS BIO to implement HTTPS; 373 optionally to be used by the http connect/disconnect callback function.
|
A D | BIO_s_accept.pod | 72 connect BIOs, that is it can be a numerical port string or a 77 BIO_set_conn_port() for connect BIOs, that is it can be a numerical
|
A D | SSL_new.pod | 76 =item initial accept (server) or connect (client) state
|
A D | SSL_set_bio.pod | 5 SSL_set_bio, SSL_set0_rbio, SSL_set0_wbio - connect the SSL object with a BIO
|
A D | SSL_CTX_set_options.pod | 397 clients that are willing to connect to servers that do not implement 401 OpenSSL client applications wishing to ensure they can connect to unpatched 404 OpenSSL client applications that want to ensure they can B<not> connect to
|
A D | BIO_meth_new.pod | 74 File descriptor based BIOs (e.g. socket, fd, connect, accept etc) should
|
A D | SSL_get_error.pod | 110 and the call would block in connect()/accept(). The SSL function should be
|
/openssl-master/doc/man1/ |
A D | openssl-s_time.pod.in | 12 [B<-connect> I<host>:I<port>] 50 =item B<-connect> I<host>:I<port> 52 This specifies the host and optional port to connect to. 139 To connect to an SSL HTTP server and get the default page the command 141 …openssl s_time -connect servername:443 -www / -CApath yourdir -CAfile yourfile.pem -cipher commonc…
|
A D | openssl-s_client.pod.in | 13 [B<-connect> I<host:port>] 154 =item B<-connect> I<host>:I<port> 159 is made to connect to the local host on port 4433. 163 Host to connect to; use B<-connect> instead. 167 Connect to the specified port; use B<-connect> instead. 177 When used with the B<-connect> flag, the program uses the host and port 178 specified with this flag and issues an HTTP CONNECT command to connect 213 the name given to B<-connect> if it follows a DNS name format. If B<-connect> is 369 -connect smtp.example.com:25 \ 806 nor B<-connect> are provided, falls back to attempting to connect to [all …]
|
/openssl-master/crypto/rand/ |
A D | rand_egd.c | 139 if (connect(fd, (struct sockaddr *)&addr, i) == 0) in RAND_query_egd_bytes()
|
/openssl-master/include/openssl/ |
A D | http.h | 63 typedef BIO *(*OSSL_HTTP_bio_cb_t)(BIO *bio, void *arg, int connect, int detail);
|
A D | bio.h.in | 40 # define BIO_TYPE_DESCRIPTOR 0x0100 /* socket, fd, connect or accept */ 252 /* Returned from the connect BIO when a connect would have blocked */
|
/openssl-master/crypto/bio/ |
A D | bio_sock2.c | 122 if (connect(sock, BIO_ADDR_sockaddr(addr), in BIO_connect()
|
/openssl-master/apps/lib/ |
A D | vms_term_sock.c | 443 status = connect (SockDesc2, (struct sockaddr *) &sin, sizeof(sin)); in CreateSocketPair()
|
A D | apps.c | 2441 BIO *app_http_tls_cb(BIO *hbio, void *arg, int connect, int detail) in app_http_tls_cb() argument 2443 if (connect && detail) { /* connecting with TLS */ in app_http_tls_cb() 2467 } else if (!connect && !detail) { /* disconnecting after error */ in app_http_tls_cb()
|
/openssl-master/test/ |
A D | README.ssltest.md | 163 * ServerName - the server the client should attempt to connect to. One of 193 connect as; for server, this is a known SRP user.
|
/openssl-master/apps/include/ |
A D | apps.h | 280 int connect, int detail);
|
/openssl-master/crypto/err/ |
A D | openssl.txt | 134 BIO_R_CONNECT_ERROR:103:connect error 135 BIO_R_CONNECT_TIMEOUT:147:connect timeout 147 BIO_R_NBIO_CONNECT_ERROR:110:nbio connect error 759 HTTP_R_CONNECT_FAILURE:100:connect failure
|