diff --git a/doc/ssl/DTLSv1_listen.pod b/doc/ssl/DTLSv1_listen.pod index 62913de56dc70d110aab6b407918aa60ff7bd569..741669395dc8d3474a13576dfd0077b2859bb496 100644 --- a/doc/ssl/DTLSv1_listen.pod +++ b/doc/ssl/DTLSv1_listen.pod @@ -44,9 +44,11 @@ When a ClientHello is received that contains a cookie that has been verified, then DTLSv1_listen() will return with the B parameter updated into a state where the handshake can be continued by a call to (for example) SSL_accept(). Additionally the B pointed to by B will be filled in with -details of the peer that sent the ClientHello. Typically user code is expected -to "connect" the underlying socket to the peer and continue the handshake in a -connected state. +details of the peer that sent the ClientHello. If the underlying BIO is unable +to obtain the B of the peer (for example because the BIO does not +support this), then B<*peer> will be cleared and the family set to AF_UNSPEC. +Typically user code is expected to "connect" the underlying socket to the peer +and continue the handshake in a connected state. Prior to calling DTLSv1_listen() user code must ensure that cookie generation and verification callbacks have been set up using