/openssl-master/doc/man3/ |
A D | BIO_should_retry.pod | 7 BIO_get_retry_BIO, BIO_get_retry_reason, BIO_set_retry_reason - BIO retry 36 has insufficient data to return. Check for readability and/or retry the 40 has pending data to write. Check for writability and/or retry the 46 BIO_retry_type() returns a mask of the cause of a retry condition 78 BIO types will not request a retry, because the underlying I/O 80 signal a retry then it need not call BIO_should_retry() after a failed 84 retry even if the underlying I/O structure is blocking, if a handshake 85 occurs during a call to BIO_read(). An application can retry the failed 89 While an application may retry a failed non blocking call immediately 97 available and then retry the BIO operation. By combining the retry [all …]
|
A D | SSL_CTX_set_mode.pod | 51 Make it possible to retry SSL_write_ex() or SSL_write() with changed buffer 62 need to retry with B<SSL_ERROR_WANT_READ>. 74 deal with the functions returning intermediate reports such as retry 104 Enable asynchronous processing. TLS I/O operations may indicate a retry with
|
A D | BIO_read.pod | 87 the application should retry the operation later. 97 a retry instead of blocking. 100 determine the cause of a retry and other I/O issues.
|
A D | SSL_set_async_callback.pod | 67 OpenSSL submits the asynchronous request to the engine. If a retry occurs at 101 SSL_get_async_status() to determine whether a retry happened instead of the
|
A D | BIO_s_bio.pod | 46 Calls to BIO_read_ex() will read data from the buffer or request a retry if no 49 Calls to BIO_write_ex() will place data in the buffer or request a retry if the 83 if the buffer is full request a retry. BIO_ctrl_get_write_guarantee() is a
|
A D | DTLSv1_listen.pod | 94 of -1 indicates any other error. User code may retry the SSL_stateless() call. 103 further information if appropriate. Typically user code is expected to retry the
|
A D | SSL_get_error.pod | 79 Note that the retry may again lead to an B<SSL_ERROR_WANT_READ> or 142 through a call to L<ASYNC_init_thread(3)>. The application should retry the
|
A D | OCSP_sendreq_new.pod | 92 OCSP_sendreq_nbio() returns 1 for success, 0 on error, -1 if retry is needed.
|
A D | BIO_f_ssl.pod | 111 is non blocking they can still request a retry in exceptional 119 retry.
|
A D | BIO_s_accept.pod | 116 connection, or request a retry in non blocking mode. 159 accepted a connection and retry the call.
|
A D | X509_verify_cert.pod | 56 or if a retry operation is requested during internal lookups
|
A D | BIO_s_connect.pod | 132 the underlying socket has connected and retry the call.
|
A D | BIO_s_mem.pod | 56 zero then it will return B<v> when it is empty and it will set the read retry
|
/openssl-master/test/ |
A D | rdrand_sanitytest.c | 34 int retry; in sanity_check_bytes() local 35 for (retry = 0; retry < max_retries; retry++) { in sanity_check_bytes()
|
A D | tls-provider.c | 815 retry: in randomize_tls_group_id() 828 goto retry; in randomize_tls_group_id()
|
/openssl-master/test/ssl-tests/ |
A D | 03-custom_verify.cnf | 8 test-3 = 3-verify-custom-retry 95 [3-verify-custom-retry] 96 ssl_conf = 3-verify-custom-retry-ssl 98 [3-verify-custom-retry-ssl] 99 server = 3-verify-custom-retry-server 100 client = 3-verify-custom-retry-client 102 [3-verify-custom-retry-server] 107 [3-verify-custom-retry-client] 114 client = 3-verify-custom-retry-client-extra 116 [3-verify-custom-retry-client-extra]
|
A D | 03-custom_verify.cnf.in | 54 # Same test as above but with a custom callback that requests retry once. 56 name => "verify-custom-retry",
|
/openssl-master/engines/ |
A D | e_afalg.c | 268 int retry = 0; in afalg_fin_cipher_aio() local 349 if (events[0].res == -EBUSY && retry++ < 3) { in afalg_fin_cipher_aio() 353 __FILE__, __LINE__, retry); in afalg_fin_cipher_aio()
|
/openssl-master/crypto/bio/ |
A D | bio_addr.c | 711 retry: in BIO_lookup_ex() 735 goto retry; in BIO_lookup_ex()
|
A D | bio_lib.c | 917 retry: in BIO_do_connect_retry() 950 goto retry; in BIO_do_connect_retry()
|
/openssl-master/ssl/statem/ |
A D | statem_dtls.c | 117 int retry = 1; in dtls1_do_write() local 251 if (retry && BIO_ctrl(SSL_get_wbio(s), in dtls1_do_write() 257 retry = 0; in dtls1_do_write()
|
/openssl-master/crypto/cmp/ |
A D | cmp_client.c | 546 retry: in cert_response() 572 goto retry; /* got ip/cp/kup, which may still indicate 'waiting' */ in cert_response()
|
/openssl-master/ssl/ |
A D | ssl_sess.c | 318 unsigned int retry = 0; in def_generate_session_id() local 323 (++retry < MAX_SESS_ID_ATTEMPTS)) ; in def_generate_session_id() 324 if (retry < MAX_SESS_ID_ATTEMPTS) in def_generate_session_id()
|
/openssl-master/apps/ |
A D | s_server.c | 2796 int retry = 0; in init_ssl_connection() local 2841 retry = is_retryable(con, i); in init_ssl_connection() 2851 retry = is_retryable(con, i); in init_ssl_connection() 2866 retry = is_retryable(con, i); in init_ssl_connection() 2874 || (!dtlslisten && !stateless && retry)) { in init_ssl_connection()
|
A D | cmp.c | 2560 int retry = 1; in cmp_server() local 2575 if (retry) { in cmp_server() 2577 retry = 0; in cmp_server()
|