/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set_mode.pod | 43 SSL_write(). When not set (the default), SSL_write_ex() or SSL_write() will only 45 SSL_write() returns successful, B<r> bytes have been written and the next call 46 to SSL_write_ex() or SSL_write() must only send the n-r bytes left, imitating 51 Make it possible to retry SSL_write_ex() or SSL_write() with changed buffer 53 avoid the misconception that nonblocking SSL_write() behaves like 132 L<SSL_write(3)>, L<SSL_get_error(3)>
|
H A D | SSL_get_error.pod | 18 SSL_write_ex() or SSL_write() on B<ssl>. The value returned by that TLS/SSL I/O 88 even when the call that set this error was an SSL_write() or SSL_write_ex(). 89 However, if the call was an SSL_write() or SSL_write_ex(), it should be called 91 from SSL_write() or SSL_write_ex() then you should not do any other operation 92 that could trigger B<IO> other than to repeat the previous SSL_write() call. 102 and SSL_write() or SSL_write_ex() may want to read data. 106 SSL_peek(), SSL_write_ex(), and SSL_write() will handle any pending handshakes.
|
H A D | SSL_write.pod | 5 SSL_write_ex, SSL_write, SSL_sendfile - write bytes to a TLS/SSL connection 13 int SSL_write(SSL *ssl, const void *buf, int num); 17 SSL_write_ex() and SSL_write() write B<num> bytes from the buffer B<buf> into 32 SSL_write_ex(), or SSL_write(). 78 You should not call SSL_write() with num=0, it will return an error. 95 For SSL_write() the following return values can occur:
|
H A D | SSL_CTX_set_split_send_fragment.pod | 67 amount of data provided to the SSL_write_ex() or SSL_write() call divided by 73 SSL_write/SSL_write_ex called with 0-2000 bytes == 1 pipeline used 75 SSL_write/SSL_write_ex called with 2001-4000 bytes == 2 pipelines used 77 SSL_write/SSL_write_ex called with 4001-6000 bytes == 3 pipelines used 79 SSL_write/SSL_write_ex called with 6001+ bytes == 4 pipelines used
|
H A D | SSL_set_connect_state.pod | 43 using L<SSL_write_ex(3)>, L<SSL_write(3)>, L<SSL_read_ex(3)>, or L<SSL_read(3)>, 64 L<SSL_write_ex(3)>, L<SSL_write(3)>, L<SSL_read_ex(3)>, L<SSL_read(3)>,
|
H A D | SSL_CTX_set_num_tickets.pod | 57 together when it is safe to do so and triggered by SSL_write() or
|
H A D | SSL_shutdown.pod | 50 It is not possible to call SSL_write() after calling SSL_shutdown().
|
H A D | BIO_s_bio.pod | 147 SSL_operations(); /* e.g. SSL_read and SSL_write */
|
/freebsd/crypto/openssl/apps/ |
H A D | s_time.c | 286 if (buf_len <= 0 || SSL_write(scon, buf, buf_len) <= 0) in s_time_main() 340 if (buf_len <= 0 || SSL_write(scon, buf, buf_len) <= 0) in s_time_main() 368 if (buf_len <= 0 || SSL_write(scon, buf, buf_len) <= 0) in s_time_main()
|
/freebsd/crypto/openssl/test/ |
H A D | fatalerrtest.c | 72 if (!TEST_int_le(SSL_write(sssl, msg, strlen(msg)), 0)) in test_fatalerr()
|
H A D | sslbuffertest.c | 100 ret = SSL_write(clientssl, testdata + len, in test_func()
|
H A D | dtls_mtu_test.c | 103 if (!TEST_int_eq(SSL_write(clnt_ssl, buf, s), (int)s)) in mtu_test()
|
H A D | sslcorrupttest.c | 231 if (!TEST_int_ge(SSL_write(client, junk, sizeof(junk)), 0)) in test_ssl_corrupt()
|
H A D | sslapitest.c | 1088 if (!TEST_true(SSL_write(clientssl, cbuf, sizeof(cbuf)) == sizeof(cbuf))) in ping_pong_query() 1097 if (!TEST_true(SSL_write(serverssl, sbuf, sizeof(sbuf)) == sizeof(sbuf))) in ping_pong_query() 1740 if (!TEST_int_eq(SSL_write(clientssl, cbuf, sizeof(cbuf)), sizeof(cbuf))) in execute_cleanse_plaintext() 6529 if (!TEST_int_eq(SSL_write(clientssl, mess, strlen(mess)), strlen(mess)) in test_key_update() 6534 if (!TEST_int_eq(SSL_write(serverssl, mess, strlen(mess)), strlen(mess)) in test_key_update() 6597 if (!TEST_int_eq(SSL_write(peerwrite, mess, strlen(mess)), -1) in test_key_update_peer_in_write() 6614 if (!TEST_int_eq(SSL_write(peerwrite, mess, strlen(mess)), strlen(mess)) in test_key_update_peer_in_write() 6619 if (!TEST_int_eq(SSL_write(peerwrite, mess, strlen(mess)), strlen(mess)) in test_key_update_peer_in_write() 6680 || !TEST_int_eq(SSL_write(local, lwbuf, sizeof(lwbuf)), -1) in test_key_update_peer_in_read() 6693 if (!TEST_int_eq(SSL_write(peer, mess, strlen(mess)), strlen(mess))) in test_key_update_peer_in_read() [all …]
|
H A D | asynciotest.c | 344 ret = SSL_write(clientssl, testdata + len, in test_asyncio()
|
H A D | dtlstest.c | 527 if (!TEST_int_eq(SSL_write(sssl, msg, sizeof(msg)), (int)sizeof(msg))) in test_swap_records()
|
H A D | README.ssltest.md | 56 application data up between more `SSL_write` calls, thus allowing to exercise
|
/freebsd/contrib/libpcap/ |
H A D | sslutils.c | 183 int status = SSL_write(ssl, buffer, size); in ssl_send()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | ssl.pod | 33 L<SSL_read_ex(3)>, L<SSL_read(3)>, L<SSL_write_ex(3)> and L<SSL_write(3)> are
|
/freebsd/secure/lib/libssl/ |
H A D | Version.map | 388 SSL_write;
|
/freebsd/contrib/dma/ |
H A D | net.c | 102 if ((n = SSL_write(config.ssl, (const char*)(cmd + pos), len - pos)) <= 0) { in send_remote_command()
|
/freebsd/contrib/sendmail/src/ |
H A D | sfsasl.c | 854 r = SSL_write(so->con, (char *) buf, size);
|
/freebsd/contrib/unbound/dnstap/ |
H A D | unbound-dnstap-socket.c | 844 if((r=SSL_write(data->ssl, acceptframe, len)) <= 0) { in reply_with_accept() 892 if((r=SSL_write(data->ssl, finishframe, len)) <= 0) { in reply_with_finish()
|
/freebsd/contrib/unbound/util/ |
H A D | netevent.c | 3831 r = SSL_write(c->ssl, 3836 r = SSL_write(c->ssl, 3849 r = SSL_write(c->ssl, (void*)(buf+c->tcp_byte_count), 3854 r = SSL_write(c->ssl, 3904 r = SSL_write(c->ssl, (void*)(c->tcp_write_pkt + c->tcp_write_byte_count - 2), 3907 r = SSL_write(c->ssl, (void*)sldns_buffer_current(c->buffer), 5419 r = SSL_write(c->ssl, (void*)sldns_buffer_current(c->buffer), 5493 r = SSL_write(h2_session->c->ssl, buf, len);
|
/freebsd/contrib/openbsm/bin/auditdistd/ |
H A D | proto_tls.c | 209 ssldone = SSL_write(sendssl, buf, (int)tcpdone); in tcp_recv_ssl_send()
|