| /freebsd-13.1/crypto/openssl/doc/man3/ |
| H A D | SSL_want.pod | 32 return values are similar to that of L<SSL_get_error(3)>. 33 Unlike L<SSL_get_error(3)>, which also evaluates the 37 using L<SSL_get_error(3)>. 40 the result of L<SSL_get_error(3)>. 56 A call to L<SSL_get_error(3)> should return 63 A call to L<SSL_get_error(3)> should return 70 A call to L<SSL_get_error(3)> should return 76 L<SSL_get_all_async_fds(3)>. A call to L<SSL_get_error(3)> should return 82 available in the pool (see ASYNC_init_thread(3)). A call to L<SSL_get_error(3)> 89 A call to L<SSL_get_error(3)> should return [all …]
|
| H A D | SSL_do_handshake.pod | 30 to continue the handshake. In this case a call to SSL_get_error() with the 48 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the 61 for nonblocking BIOs. Call SSL_get_error() with the return value B<ret> 68 L<SSL_get_error(3)>, L<SSL_connect(3)>,
|
| H A D | SSL_accept.pod | 29 In this case a call to SSL_get_error() with the 47 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the 60 for nonblocking BIOs. Call SSL_get_error() with the return value B<ret> 67 L<SSL_get_error(3)>, L<SSL_connect(3)>,
|
| H A D | SSL_write.pod | 50 the operation. In this case a call to L<SSL_get_error(3)> with the 71 When a write function call has to be repeated because L<SSL_get_error(3)> 92 network error). In the event of a failure call L<SSL_get_error(3)> to find out 108 Call SSL_get_error() with the return value B<ret> to find out the reason. 112 You should instead call SSL_get_error() to find out if it's retryable. 130 Call SSL_get_error() with the return value to find out the reason. 136 L<SSL_get_error(3)>, L<SSL_read_ex(3)>, L<SSL_read(3)>
|
| H A D | SSL_get_error.pod | 5 SSL_get_error - obtain result code for TLS/SSL I/O operation 11 int SSL_get_error(const SSL *ssl, int ret); 15 SSL_get_error() returns a result code (suitable for the C "switch" 19 function must be passed to SSL_get_error() in parameter B<ret>. 21 In addition to B<ssl> and B<ret>, SSL_get_error() inspects the 22 current thread's OpenSSL error queue. Thus, SSL_get_error() must be 26 attempted, or SSL_get_error() will not work reliably.
|
| H A D | SSL_shutdown.pod | 26 occurred on a connection i.e. if SSL_get_error() has returned SSL_ERROR_SYSCALL 76 and SSL_get_error() returning SSL_ERROR_ZERO_RETURN. 83 SSL_read() will return <= 0 in that case, and SSL_get_error() will return 100 to continue the handshake. In this case a call to SSL_get_error() with the 143 L<SSL_get_error(3)> should not get called, it may misleadingly 154 Call L<SSL_get_error(3)> with the return value B<ret> to find out the reason. 164 L<SSL_get_error(3)>, L<SSL_connect(3)>,
|
| H A D | SSL_connect.pod | 29 In this case a call to SSL_get_error() with the 62 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the 75 for nonblocking BIOs. Call SSL_get_error() with the return value B<ret> 82 L<SSL_get_error(3)>, L<SSL_accept(3)>,
|
| H A D | SSL_read.pod | 78 In this case a call to L<SSL_get_error(3)> with the 104 In the event of a failure call L<SSL_get_error(3)> to find out the reason which 121 Call L<SSL_get_error(3)> with the return value B<ret> to find out the reason. 125 You should instead call SSL_get_error() to find out if it's retryable. 131 L<SSL_get_error(3)>, L<SSL_write_ex(3)>,
|
| H A D | SSL_get_all_async_fds.pod | 34 SSL_ERROR_WANT_ASYNC has been received - see L<SSL_get_error(3)>). Typically the 72 L<SSL_get_error(3)>, L<SSL_CTX_set_mode(3)>
|
| H A D | SSL_CTX_set_mode.pod | 106 used to perform cryptographic operations. See L<SSL_get_error(3)>. 132 L<SSL_write(3)>, L<SSL_get_error(3)>
|
| H A D | SSL_CTX_set_cert_cb.pod | 31 L<SSL_get_error(3)> will return SSL_ERROR_WANT_X509_LOOKUP to
|
| H A D | SSL_read_early_data.pod | 111 If SSL_write_early_data() fails you should call L<SSL_get_error(3)> to determine 332 failure call L<SSL_get_error(3)> to determine the correct course of action. 337 event of a failure call L<SSL_get_error(3)> to determine the correct course of 353 L<SSL_get_error(3)>,
|
| H A D | SSL_CTX_set_client_cert_cb.pod | 35 handshake function will return immediately. L<SSL_get_error(3)>
|
| /freebsd-13.1/crypto/openssl/ssl/ |
| H A D | bio_ssl.c | 108 switch (SSL_get_error(ssl, ret)) { in ssl_read() 177 switch (SSL_get_error(ssl, ret)) { in ssl_write() 349 switch (SSL_get_error(ssl, (int)ret)) { in ssl_ctrl()
|
| /freebsd-13.1/contrib/dma/ |
| H A D | net.c | 103 s = SSL_get_error(config.ssl, n); in send_remote_command() 158 switch (SSL_get_error(config.ssl, rlen)) { in read_remote()
|
| /freebsd-13.1/crypto/openssl/apps/ |
| H A D | s_server.c | 2385 switch (SSL_get_error(con, 0)) { in sv_body() 2589 while (SSL_get_error(con, k) == SSL_ERROR_WANT_X509_LOOKUP) { in sv_body() 2603 switch (SSL_get_error(con, k)) { in sv_body() 2664 while (SSL_get_error(con, i) == SSL_ERROR_WANT_X509_LOOKUP) { in sv_body() 2678 switch (SSL_get_error(con, i)) { in sv_body() 2739 int err = SSL_get_error(con, i); in is_retryable() 2800 && SSL_get_error(con, i) == SSL_ERROR_WANT_X509_LOOKUP in init_ssl_connection() 2813 && SSL_get_error(con, i) == SSL_ERROR_WANT_X509_LOOKUP) { in init_ssl_connection() 3096 SSL_get_error(con, i)); in www_body()
|
| /freebsd-13.1/contrib/sendmail/src/ |
| H A D | sfsasl.c | 742 switch (ssl_err = SSL_get_error(so->con, r)) 867 switch (ssl_err = SSL_get_error(so->con, r))
|
| /freebsd-13.1/contrib/ntp/sntp/libevent/ |
| H A D | bufferevent_openssl.c | 608 int err = SSL_get_error(bev_ssl->ssl, r); in do_read() 685 int err = SSL_get_error(bev_ssl->ssl, r); in do_write() 1023 int err = SSL_get_error(bev_ssl->ssl, r); in do_handshake()
|
| /freebsd-13.1/contrib/libevent/ |
| H A D | bufferevent_openssl.c | 613 int err = SSL_get_error(bev_ssl->ssl, r); in do_read() 691 int err = SSL_get_error(bev_ssl->ssl, r); in do_write() 1043 int err = SSL_get_error(bev_ssl->ssl, r); in do_handshake()
|
| /freebsd-13.1/secure/lib/libssl/ |
| H A D | Version.map | 260 SSL_get_error;
|
| /freebsd-13.1/contrib/unbound/dnstap/ |
| H A D | unbound-dnstap-socket.c | 684 int want = SSL_get_error(data->ssl, r); in ssl_read_bytes() 761 if(SSL_get_error(data->ssl, r) == SSL_ERROR_ZERO_RETURN) in reply_with_accept() 884 int want = SSL_get_error(data->ssl, r); in tap_handshake()
|
| /freebsd-13.1/contrib/unbound/util/ |
| H A D | netevent.c | 1256 int want = SSL_get_error(c->ssl, r); 1394 int want = SSL_get_error(c->ssl, r); 1444 int want = SSL_get_error(c->ssl, r); 1537 int want = SSL_get_error(c->ssl, r); 1589 int want = SSL_get_error(c->ssl, r); 2261 int want = SSL_get_error(c->ssl, r); 2712 int want = SSL_get_error(h2_session->c->ssl, r); 2967 int want = SSL_get_error(c->ssl, r); 3040 int want = SSL_get_error(h2_session->c->ssl, r);
|
| /freebsd-13.1/contrib/unbound/smallapp/ |
| H A D | unbound-control.c | 746 r = SSL_get_error(ssl, r); in setup_ssl() 771 if(SSL_get_error(ssl, r) == SSL_ERROR_ZERO_RETURN) { in remote_read()
|
| H A D | unbound-anchor.c | 793 r = SSL_get_error(ssl, r); in TLS_initiate() 895 if(SSL_get_error(ssl, r) == SSL_ERROR_ZERO_RETURN) { in read_ssl_line() 953 if(SSL_get_error(ssl, r) == SSL_ERROR_ZERO_RETURN) { in read_data_chunk()
|
| /freebsd-13.1/contrib/serf/buckets/ |
| H A D | ssl_buckets.c | 793 ssl_err = SSL_get_error(ctx->ssl, ssl_len); in ssl_decrypt() 828 ssl_err = SSL_get_error(ctx->ssl, ssl_len); in ssl_decrypt() 977 ssl_err = SSL_get_error(ctx->ssl, ssl_len); in ssl_encrypt()
|