Lines Matching +refs:write +refs:if +refs:changed

5 the new and changed APIs, and the design constraints motivating those API
21 - [`SSL_write`, `SSL_write_ex`](#-ssl-write----ssl-write-ex-)
37 … - [`SSL_net_read_desired`, `SSL_net_write_desired`](#-ssl-want-net-read----ssl-want-net-write-)
38 … - [`SSL_want`, `SSL_want_read`, `SSL_want_write`](#-ssl-want----ssl-want-read----ssl-want-write-)
44 …get_stream_write_error_code`](#-ssl-get-stream-read-error-code----ssl-get-stream-write-error-code-)
85 Non-SSL object APIs which are new or changed, or otherwise discussed in this
135 - **Changed**: The semantics are changed for QUIC.
213 **Note:** Idempotent if handshake already completed.
215 **Blocking Considerations:** Blocks until handshake completed if in blocking
225 error occurs if in blocking mode (including the peek functions).
250 (i.e., copied) all data provided, or an error occurs, if in blocking mode. In
273 - Change semantics to only determine the return value based on if there is
299 >may fail if that peer changes its settings between connections.
335 already been transmitted, and even if already transmitted, may or may not be
347 immediately freed. This means that, if a QUIC connection SSL object which has
357 (if negotiated) takes effect.
410 non-partial-write `SSL_write` operation spanning multiple `SSL_write` calls,
411 this mode does not take effect until the non-partial write operation is
418 - `SSL_MODE_RELEASE_BUFFERS`: Ignored. This is an optimization and if it has
421 - `SSL_MODE_SEND_FALLBACK_SCSV`: TBD: Either ignore or fail if the client
424 Ignored if set after handshake (existing behaviour).
447 event, if any.
485 is relevant if `SSL_net_read_desired` returns 1, and `SSL_get_wpoll_descriptor`
486 is relevant if `SSL_net_write_desired` returns 1.
500 These calls return 1 if the QUIC state machine is interested in receiving
515 traditionally used to determine if the SSL state machine has exited in
516 non-blocking mode due to a desire to read from or write to the underlying
519 write), not both. This call will not be implemented for QUIC (e.g. always
532 The initial peer address may be autodetected if no peer address has already been
573 connection closure process is initiated if it has not already begun.
603 connection has terminated until the negotiated idle timeout (if any) expires.
622 state semantics if the application happens to call `SSL_handle_events`, until it
659 unidirectional streams. It is a no-op if it has already been called for a given
660 stream, or if either the stream or connection have entered an error state.
709 if `args` is non-NULL.
728 * The read or write part of the stream is still available and has not been
743 * The read or write part of the stream has been finished in a normal manner.
764 * using a locally transmitted RESET_STREAM frame. Attempts to write to
788 * For SSL_get_stream_write_state, this means that attempts to write to the
815 `SSL_get_stream_write_error_code` gets the error code for the write part of
851 `info_len` must be set to `sizeof(*info)`. Returns -1 if called on a non-QUIC
852 SSL object or if the connection status cannot be determined.
860 `info->flags` has `SSL_CONN_CLOSE_FLAG_LOCAL` set if the connection closure was
863 `info->flags` has `SSL_CONN_CLOSE_FLAG_TRANSPORT` if the connection closure was
864 initiated by QUIC, and 0 if it was initiated by the application. The namespace
878 reading or writing to that stream. It is an error to attempt to read or write
896 stream is created. This can be changed independently. For example, a QUIC
935 * Returns 1 if the object represents a connection. This always returns 1 for
958 * It returns SSL_STREAM_TYPE_NONE for a QUIC connection object if it
977 * or UINT64_MAX if the stream ID is not available. If called on a QUIC
978 * connection, returns the unique stream ID for the default stream if there is
994 * QUIC: Returns 1 if the stream was locally initiated, or 0 otherwise.
1044 * Must be called only on a QUIC connection SSL object. Fails if called on a
1045 * stream object. Checks if a new stream has been created by the peer. If it
1060 * This function returns NULL if the effective incoming stream reject policy is
1096 * - if the default stream mode is
1108 * used for the purposes of this termination. The default AEC value used if this
1147 * stream, which may be bidirectional or unidirectional; if it is
1154 * functions identically to `SSL_DEFAULT_STREAM_MODE_AUTO_BIDI`, but if the
1210 - Require applications to be changed to not use QUIC with a `BIO_f_buffer`.
1235 multiple read or write operations in a single system call, on supported OSes. On
1325 if a BIO is potentially capable of supporting local addressing on the current
1372 A BIO may be queried for whether it has a poll descriptor for read or write
1378 `BIO_read` or, if supported by the BIO, `BIO_recvmmsg`.
1383 `BIO_write` or, if supported by the BIO, `BIO_sendmmsg`.
1404 A new predicate function `BIO_err_is_non_fatal` is defined which determines if
1424 TLS 1.3 Finished messages have been exchanged by both parties, even if the
1444 to it, just like `write(2)` or `send(2)`. In other words, it blocks until it can
1462 However, if the caller immediately frees the SSL object, this precludes
1486 Closing state may last only briefly, namely if the peer chooses to respond to
1518 if the `CONNECTION_CLOSE` frame was lost, the peer will have to wait for idle
1520 possibility that, if the socket is closed by the application after teardown, a
1549 We trigger `STOP_SENDING` automatically if an application frees the associated
1636 inconsistencies of QUIC internal state if a client is accidentally connected to
1654 this can be changed. This stream is bound as the default stream.