/third_party/openssl/doc/man3/ |
D | SSL_want.pod | 32 return values are similar to that of L<SSL_get_error(3)>. 33 Unlike L<SSL_get_error(3)>, which also evaluates the 37 using L<SSL_get_error(3)>. 40 the result of L<SSL_get_error(3)>. 56 A call to L<SSL_get_error(3)> should return 63 A call to L<SSL_get_error(3)> should return 70 A call to L<SSL_get_error(3)> should return 76 L<SSL_get_all_async_fds(3)>. A call to L<SSL_get_error(3)> should return 82 available in the pool (see ASYNC_init_thread(3)). A call to L<SSL_get_error(3)> 89 A call to L<SSL_get_error(3)> should return [all …]
|
D | SSL_do_handshake.pod | 30 to continue the handshake. In this case a call to SSL_get_error() with the 48 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the 61 for nonblocking BIOs. Call SSL_get_error() with the return value B<ret> 68 L<SSL_get_error(3)>, L<SSL_connect(3)>,
|
D | SSL_accept.pod | 29 In this case a call to SSL_get_error() with the 47 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the 60 for nonblocking BIOs. Call SSL_get_error() with the return value B<ret> 67 L<SSL_get_error(3)>, L<SSL_connect(3)>,
|
D | SSL_write.pod | 41 the operation. In this case a call to L<SSL_get_error(3)> with the 62 When a write function call has to be repeated because L<SSL_get_error(3)> 83 network error). In the event of a failure call L<SSL_get_error(3)> to find out 99 Call SSL_get_error() with the return value B<ret> to find out the reason. 103 You should instead call SSL_get_error() to find out if it's retryable. 109 L<SSL_get_error(3)>, L<SSL_read_ex(3)>, L<SSL_read(3)>
|
D | SSL_get_error.pod | 5 SSL_get_error - obtain result code for TLS/SSL I/O operation 11 int SSL_get_error(const SSL *ssl, int ret); 15 SSL_get_error() returns a result code (suitable for the C "switch" 19 function must be passed to SSL_get_error() in parameter B<ret>. 21 In addition to B<ssl> and B<ret>, SSL_get_error() inspects the 22 current thread's OpenSSL error queue. Thus, SSL_get_error() must be 26 attempted, or SSL_get_error() will not work reliably.
|
D | SSL_shutdown.pod | 26 occurred on a connection i.e. if SSL_get_error() has returned SSL_ERROR_SYSCALL 76 and SSL_get_error() returning SSL_ERROR_ZERO_RETURN. 83 SSL_read() will return <= 0 in that case, and SSL_get_error() will return 100 to continue the handshake. In this case a call to SSL_get_error() with the 143 L<SSL_get_error(3)> should not get called, it may misleadingly 154 Call L<SSL_get_error(3)> with the return value B<ret> to find out the reason. 164 L<SSL_get_error(3)>, L<SSL_connect(3)>,
|
D | SSL_connect.pod | 29 In this case a call to SSL_get_error() with the 62 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the 75 for nonblocking BIOs. Call SSL_get_error() with the return value B<ret> 82 L<SSL_get_error(3)>, L<SSL_accept(3)>,
|
D | SSL_read.pod | 78 In this case a call to L<SSL_get_error(3)> with the 104 In the event of a failure call L<SSL_get_error(3)> to find out the reason which 121 Call L<SSL_get_error(3)> with the return value B<ret> to find out the reason. 125 You should instead call SSL_get_error() to find out if it's retryable. 131 L<SSL_get_error(3)>, L<SSL_write_ex(3)>,
|
D | SSL_get_all_async_fds.pod | 34 SSL_ERROR_WANT_ASYNC has been received - see L<SSL_get_error(3)>). Typically the 72 L<SSL_get_error(3)>, L<SSL_CTX_set_mode(3)>
|
D | SSL_CTX_set_mode.pod | 106 used to perform cryptographic operations. See L<SSL_get_error(3)>. 132 L<SSL_write(3)>, L<SSL_get_error(3)>
|
/third_party/openssl/test/ |
D | sslbuffertest.c | 96 int ssl_error = SSL_get_error(clientssl, ret); in test_func() 129 int ssl_error = SSL_get_error(serverssl, ret); in test_func()
|
D | bad_dtls_test.c | 515 || !TEST_int_eq(SSL_get_error(con, ret), SSL_ERROR_WANT_READ) in test_bad_dtls() 522 || !TEST_int_eq(SSL_get_error(con, ret), SSL_ERROR_WANT_READ) in test_bad_dtls() 529 || !TEST_int_eq(SSL_get_error(con, ret), SSL_ERROR_WANT_READ) in test_bad_dtls()
|
D | asynciotest.c | 348 int ssl_error = SSL_get_error(clientssl, ret); in test_asyncio() 369 int ssl_error = SSL_get_error(serverssl, ret); in test_asyncio()
|
D | ssltestlib.c | 844 err = SSL_get_error(clientssl, retc); in create_bare_ssl_connection() 858 err = SSL_get_error(serverssl, rets); in create_bare_ssl_connection() 929 } else if (!TEST_int_eq(SSL_get_error(clientssl, 0), in create_ssl_connection()
|
D | handshake_helper.c | 806 int error = SSL_get_error(peer->ssl, ret); in do_handshake_step() 845 int error = SSL_get_error(peer->ssl, ret); in do_app_data_step() 1028 int error = SSL_get_error(peer->ssl, ret); in do_reneg_setup_step() 1070 int error = SSL_get_error(peer->ssl, ret); in do_shutdown_step()
|
/third_party/skia/third_party/externals/microhttpd/src/microspdy/ |
D | io_openssl.c | 195 ret = SSL_get_error(session->io_context, n); in SPDYF_openssl_recv() 231 ret = SSL_get_error(session->io_context, n); in SPDYF_openssl_send()
|
/third_party/libwebsockets/lib/tls/mbedtls/ |
D | mbedtls-ssl.c | 72 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_capable_read() 190 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_capable_write() 330 n = SSL_get_error(wsi->tls.ssl, n); in __lws_tls_shutdown()
|
/third_party/curl/lib/vtls/ |
D | mesalink.c | 272 ERR_error_string(SSL_get_error(BACKEND->handle, 0), error_buffer)); in mesalink_connect_step1() 303 int detail = SSL_get_error(BACKEND->handle, ret); in mesalink_connect_step2() 395 int err = SSL_get_error(BACKEND->handle, rc); in mesalink_send() 443 int err = SSL_get_error(BACKEND->handle, nread); in mesalink_recv()
|
D | wolfssl.c | 566 int detail = SSL_get_error(backend->handle, ret); in wolfssl_connect_step2() 781 int err = SSL_get_error(backend->handle, rc); in wolfssl_send() 837 int err = SSL_get_error(backend->handle, nread); in wolfssl_recv()
|
/third_party/openssl/ssl/ |
D | bio_ssl.c | 108 switch (SSL_get_error(ssl, ret)) { in ssl_read() 177 switch (SSL_get_error(ssl, ret)) { in ssl_write() 349 switch (SSL_get_error(ssl, (int)ret)) { in ssl_ctrl()
|
/third_party/nghttp2/src/ |
D | shrpx_connection.cc | 454 auto err = SSL_get_error(tls.ssl, rv); in tls_handshake() 715 auto err = SSL_get_error(tls.ssl, rv); in write_tls() 778 auto err = SSL_get_error(tls.ssl, rv); in read_tls() 816 auto err = SSL_get_error(tls.ssl, rv); in read_tls()
|
/third_party/libwebsockets/lib/tls/openssl/ |
D | openssl-ssl.c | 58 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_get_error() 555 n = SSL_get_error(wsi->tls.ssl, n); in __lws_tls_shutdown()
|
/third_party/openssl/apps/ |
D | s_server.c | 2385 switch (SSL_get_error(con, 0)) { in sv_body() 2589 while (SSL_get_error(con, k) == SSL_ERROR_WANT_X509_LOOKUP) { in sv_body() 2603 switch (SSL_get_error(con, k)) { in sv_body() 2664 while (SSL_get_error(con, i) == SSL_ERROR_WANT_X509_LOOKUP) { in sv_body() 2678 switch (SSL_get_error(con, i)) { in sv_body() 2739 int err = SSL_get_error(con, i); in is_retryable() 2800 && SSL_get_error(con, i) == SSL_ERROR_WANT_X509_LOOKUP in init_ssl_connection() 2813 && SSL_get_error(con, i) == SSL_ERROR_WANT_X509_LOOKUP) { in init_ssl_connection() 3090 SSL_get_error(con, i)); in www_body()
|
/third_party/libcoap/src/ |
D | coap_openssl.c | 594 int err = SSL_get_error(ssl, ret); in coap_dtls_info_callback() 2786 int err = SSL_get_error(ssl, r); in coap_dtls_new_server_session() 2907 int ret = SSL_get_error(ssl, r); in coap_dtls_new_client_session() 2954 int err = SSL_get_error(ssl, r); in coap_dtls_send() 3028 int err = SSL_get_error(dtls->ssl, r); in coap_dtls_hello() 3072 int err = SSL_get_error(ssl, r); in coap_dtls_receive() 3191 int ret = SSL_get_error(ssl, r); in coap_tls_new_client_session() 3249 int err = SSL_get_error(ssl, r); in coap_tls_new_server_session() 3308 int err = SSL_get_error(ssl, r); in coap_tls_write() 3373 int err = SSL_get_error(ssl, r); in coap_tls_read()
|
/third_party/nghttp2/examples/ |
D | client.c | 174 int err = SSL_get_error(connection->ssl, rv); in send_callback() 204 int err = SSL_get_error(connection->ssl, rv); in recv_callback()
|