Home
last modified time | relevance | path

Searched refs:SSL_get_error (Results 1 – 25 of 62) sorted by relevance

123

/third_party/openssl/doc/man3/
DSSL_want.pod32 return values are similar to that of L<SSL_get_error(3)>.
33 Unlike L<SSL_get_error(3)>, which also evaluates the
37 using L<SSL_get_error(3)>.
40 the result of L<SSL_get_error(3)>.
56 A call to L<SSL_get_error(3)> should return
63 A call to L<SSL_get_error(3)> should return
70 A call to L<SSL_get_error(3)> should return
76 L<SSL_get_all_async_fds(3)>. A call to L<SSL_get_error(3)> should return
82 available in the pool (see ASYNC_init_thread(3)). A call to L<SSL_get_error(3)>
89 A call to L<SSL_get_error(3)> should return
[all …]
DSSL_do_handshake.pod30 to continue the handshake. In this case a call to SSL_get_error() with the
48 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
61 for nonblocking BIOs. Call SSL_get_error() with the return value B<ret>
68 L<SSL_get_error(3)>, L<SSL_connect(3)>,
DSSL_accept.pod29 In this case a call to SSL_get_error() with the
47 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
60 for nonblocking BIOs. Call SSL_get_error() with the return value B<ret>
67 L<SSL_get_error(3)>, L<SSL_connect(3)>,
DSSL_write.pod41 the operation. In this case a call to L<SSL_get_error(3)> with the
62 When a write function call has to be repeated because L<SSL_get_error(3)>
83 network error). In the event of a failure call L<SSL_get_error(3)> to find out
99 Call SSL_get_error() with the return value B<ret> to find out the reason.
103 You should instead call SSL_get_error() to find out if it's retryable.
109 L<SSL_get_error(3)>, L<SSL_read_ex(3)>, L<SSL_read(3)>
DSSL_get_error.pod5 SSL_get_error - obtain result code for TLS/SSL I/O operation
11 int SSL_get_error(const SSL *ssl, int ret);
15 SSL_get_error() returns a result code (suitable for the C "switch"
19 function must be passed to SSL_get_error() in parameter B<ret>.
21 In addition to B<ssl> and B<ret>, SSL_get_error() inspects the
22 current thread's OpenSSL error queue. Thus, SSL_get_error() must be
26 attempted, or SSL_get_error() will not work reliably.
DSSL_shutdown.pod26 occurred on a connection i.e. if SSL_get_error() has returned SSL_ERROR_SYSCALL
76 and SSL_get_error() returning SSL_ERROR_ZERO_RETURN.
83 SSL_read() will return <= 0 in that case, and SSL_get_error() will return
100 to continue the handshake. In this case a call to SSL_get_error() with the
143 L<SSL_get_error(3)> should not get called, it may misleadingly
154 Call L<SSL_get_error(3)> with the return value B<ret> to find out the reason.
164 L<SSL_get_error(3)>, L<SSL_connect(3)>,
DSSL_connect.pod29 In this case a call to SSL_get_error() with the
62 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
75 for nonblocking BIOs. Call SSL_get_error() with the return value B<ret>
82 L<SSL_get_error(3)>, L<SSL_accept(3)>,
DSSL_read.pod78 In this case a call to L<SSL_get_error(3)> with the
104 In the event of a failure call L<SSL_get_error(3)> to find out the reason which
121 Call L<SSL_get_error(3)> with the return value B<ret> to find out the reason.
125 You should instead call SSL_get_error() to find out if it's retryable.
131 L<SSL_get_error(3)>, L<SSL_write_ex(3)>,
DSSL_get_all_async_fds.pod34 SSL_ERROR_WANT_ASYNC has been received - see L<SSL_get_error(3)>). Typically the
72 L<SSL_get_error(3)>, L<SSL_CTX_set_mode(3)>
DSSL_CTX_set_mode.pod106 used to perform cryptographic operations. See L<SSL_get_error(3)>.
132 L<SSL_write(3)>, L<SSL_get_error(3)>
/third_party/openssl/test/
Dsslbuffertest.c96 int ssl_error = SSL_get_error(clientssl, ret); in test_func()
129 int ssl_error = SSL_get_error(serverssl, ret); in test_func()
Dbad_dtls_test.c515 || !TEST_int_eq(SSL_get_error(con, ret), SSL_ERROR_WANT_READ) in test_bad_dtls()
522 || !TEST_int_eq(SSL_get_error(con, ret), SSL_ERROR_WANT_READ) in test_bad_dtls()
529 || !TEST_int_eq(SSL_get_error(con, ret), SSL_ERROR_WANT_READ) in test_bad_dtls()
Dasynciotest.c348 int ssl_error = SSL_get_error(clientssl, ret); in test_asyncio()
369 int ssl_error = SSL_get_error(serverssl, ret); in test_asyncio()
Dssltestlib.c844 err = SSL_get_error(clientssl, retc); in create_bare_ssl_connection()
858 err = SSL_get_error(serverssl, rets); in create_bare_ssl_connection()
929 } else if (!TEST_int_eq(SSL_get_error(clientssl, 0), in create_ssl_connection()
Dhandshake_helper.c806 int error = SSL_get_error(peer->ssl, ret); in do_handshake_step()
845 int error = SSL_get_error(peer->ssl, ret); in do_app_data_step()
1028 int error = SSL_get_error(peer->ssl, ret); in do_reneg_setup_step()
1070 int error = SSL_get_error(peer->ssl, ret); in do_shutdown_step()
/third_party/skia/third_party/externals/microhttpd/src/microspdy/
Dio_openssl.c195 ret = SSL_get_error(session->io_context, n); in SPDYF_openssl_recv()
231 ret = SSL_get_error(session->io_context, n); in SPDYF_openssl_send()
/third_party/libwebsockets/lib/tls/mbedtls/
Dmbedtls-ssl.c72 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_capable_read()
190 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_capable_write()
330 n = SSL_get_error(wsi->tls.ssl, n); in __lws_tls_shutdown()
/third_party/curl/lib/vtls/
Dmesalink.c272 ERR_error_string(SSL_get_error(BACKEND->handle, 0), error_buffer)); in mesalink_connect_step1()
303 int detail = SSL_get_error(BACKEND->handle, ret); in mesalink_connect_step2()
395 int err = SSL_get_error(BACKEND->handle, rc); in mesalink_send()
443 int err = SSL_get_error(BACKEND->handle, nread); in mesalink_recv()
Dwolfssl.c566 int detail = SSL_get_error(backend->handle, ret); in wolfssl_connect_step2()
781 int err = SSL_get_error(backend->handle, rc); in wolfssl_send()
837 int err = SSL_get_error(backend->handle, nread); in wolfssl_recv()
/third_party/openssl/ssl/
Dbio_ssl.c108 switch (SSL_get_error(ssl, ret)) { in ssl_read()
177 switch (SSL_get_error(ssl, ret)) { in ssl_write()
349 switch (SSL_get_error(ssl, (int)ret)) { in ssl_ctrl()
/third_party/nghttp2/src/
Dshrpx_connection.cc454 auto err = SSL_get_error(tls.ssl, rv); in tls_handshake()
715 auto err = SSL_get_error(tls.ssl, rv); in write_tls()
778 auto err = SSL_get_error(tls.ssl, rv); in read_tls()
816 auto err = SSL_get_error(tls.ssl, rv); in read_tls()
/third_party/libwebsockets/lib/tls/openssl/
Dopenssl-ssl.c58 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_get_error()
555 n = SSL_get_error(wsi->tls.ssl, n); in __lws_tls_shutdown()
/third_party/openssl/apps/
Ds_server.c2385 switch (SSL_get_error(con, 0)) { in sv_body()
2589 while (SSL_get_error(con, k) == SSL_ERROR_WANT_X509_LOOKUP) { in sv_body()
2603 switch (SSL_get_error(con, k)) { in sv_body()
2664 while (SSL_get_error(con, i) == SSL_ERROR_WANT_X509_LOOKUP) { in sv_body()
2678 switch (SSL_get_error(con, i)) { in sv_body()
2739 int err = SSL_get_error(con, i); in is_retryable()
2800 && SSL_get_error(con, i) == SSL_ERROR_WANT_X509_LOOKUP in init_ssl_connection()
2813 && SSL_get_error(con, i) == SSL_ERROR_WANT_X509_LOOKUP) { in init_ssl_connection()
3090 SSL_get_error(con, i)); in www_body()
/third_party/libcoap/src/
Dcoap_openssl.c594 int err = SSL_get_error(ssl, ret); in coap_dtls_info_callback()
2786 int err = SSL_get_error(ssl, r); in coap_dtls_new_server_session()
2907 int ret = SSL_get_error(ssl, r); in coap_dtls_new_client_session()
2954 int err = SSL_get_error(ssl, r); in coap_dtls_send()
3028 int err = SSL_get_error(dtls->ssl, r); in coap_dtls_hello()
3072 int err = SSL_get_error(ssl, r); in coap_dtls_receive()
3191 int ret = SSL_get_error(ssl, r); in coap_tls_new_client_session()
3249 int err = SSL_get_error(ssl, r); in coap_tls_new_server_session()
3308 int err = SSL_get_error(ssl, r); in coap_tls_write()
3373 int err = SSL_get_error(ssl, r); in coap_tls_read()
/third_party/nghttp2/examples/
Dclient.c174 int err = SSL_get_error(connection->ssl, rv); in send_callback()
204 int err = SSL_get_error(connection->ssl, rv); in recv_callback()

123