/openssl/doc/man3/ |
H A D | SSL_read.pod | 5 SSL_read_ex, SSL_read, SSL_peek_ex, SSL_peek 12 int SSL_read_ex(SSL *ssl, void *buf, size_t num, size_t *readbytes); 20 SSL_read_ex() and SSL_read() try to read B<num> bytes from the specified B<ssl> 21 into the buffer B<buf>. On success SSL_read_ex() will store the number of bytes 24 SSL_peek_ex() and SSL_peek() are identical to SSL_read_ex() and SSL_read() 26 the read, so that a subsequent call to SSL_read_ex() or SSL_read() will yield 31 In the paragraphs below a "read function" is defined as one of SSL_read_ex(), 106 SSL_read_ex() and SSL_peek_ex() will return 1 for success or 0 for failure. 149 The SSL_read_ex() and SSL_peek_ex() functions were added in OpenSSL 1.1.1.
|
H A D | SSL_pending.pod | 19 read by the application via a call to L<SSL_read_ex(3)> or L<SSL_read(3)>. 37 return 1, and then a subsequent call to SSL_read_ex() or SSL_read() to return no 41 SSL_read_ex() or SSL_read() call because the buffered and unprocessed data is 53 L<SSL_read_ex(3)>, L<SSL_read(3)>, L<SSL_CTX_set_read_ahead(3)>,
|
H A D | SSL_set_connect_state.pod | 43 using L<SSL_write_ex(3)>, L<SSL_write(3)>, L<SSL_read_ex(3)>, or L<SSL_read(3)>, 64 L<SSL_write_ex(3)>, L<SSL_write(3)>, L<SSL_read_ex(3)>, L<SSL_read(3)>,
|
H A D | SSL_read_early_data.pod | 103 L<SSL_write_ex(3)>, L<SSL_read_ex(3)>, L<SSL_connect(3)>, L<SSL_do_handshake(3)> 108 calls to L<SSL_read_ex(3)> and L<SSL_read(3)> with calls to 132 L<SSL_write_ex(3)>, L<SSL_read_ex(3)>, L<SSL_accept(3)>, L<SSL_do_handshake(3)>, 135 SSL_read_early_data() is similar to L<SSL_read_ex(3)> with the following 136 differences. Refer to L<SSL_read_ex(3)> for full details. 145 same way as a 0 return value from L<SSL_read_ex(3)>. 150 the same way as a 1 return value from L<SSL_read_ex(3)>. You should continue to 172 Servers must not call L<SSL_read_ex(3)>, L<SSL_read(3)>, L<SSL_write_ex(3)> or 177 standard read function such as L<SSL_read_ex(3)>, which will transparently 360 L<SSL_read_ex(3)>,
|
H A D | SSL_get_error.pod | 17 SSL_read_ex(), SSL_read(), SSL_peek_ex(), SSL_peek(), SSL_shutdown(), 72 SSL_read() and SSL_read_ex() can also set B<SSL_ERROR_WANT_READ> when there is 97 It is safe to call SSL_read() or SSL_read_ex() when more data is available 111 SSL_read_ex(), SSL_read(), SSL_peek_ex(), or SSL_peek() may want to write data 115 either the client or the server); SSL_read_ex(), SSL_read(), SSL_peek_ex(),
|
H A D | SSL_CTX_set_mode.pod | 64 L<SSL_read_ex(3)> and L<SSL_read(3)> can return with a failure and indicate the 84 Otherwise the call to SSL_read() or SSL_read_ex() might hang when a 134 L<ssl(7)>, L<SSL_read_ex(3)>, L<SSL_read(3)>, L<SSL_write_ex(3)> or
|
H A D | SSL_key_update.pod | 38 SSL_read_ex() or SSL_write_ex() takes place on the connection. Alternatively 52 such as SSL_read_ex() or SSL_write_ex() takes place on the connection a check 110 L<ssl(7)>, L<SSL_read_ex(3)>,
|
/openssl/test/ |
H A D | sslbuffertest.c | 253 if (!TEST_true(SSL_read_ex(serverssl, buf, readlen, &readbytes)) in test_free_buffers() 310 if (!TEST_true(SSL_read_ex(serverssl, buf, sizeof(buf), in test_free_buffers() 319 if (!TEST_false(SSL_read_ex(serverssl, buf, sizeof(buf), in test_free_buffers()
|
H A D | quic_tserver_test.c | 263 ret = SSL_read_ex(c_ssl, msg3 + c_total_read, in do_test() 282 ret = SSL_read_ex(c_ssl, &c, sizeof(c), &l); in do_test()
|
H A D | sslapitest.c | 916 if (SSL_read_ex(clientssl, &buf, sizeof(buf), &readbytes) > 0) { in test_ccs_change_cipher() 923 if (SSL_read_ex(serverssl, &buf, sizeof(buf), &readbytes) > 0) { in test_ccs_change_cipher() 3688 || !TEST_false(SSL_read_ex(clientssl, buf, sizeof(buf), in test_early_data_read_write() 4689 || !SSL_read_ex(clientssl, buf, sizeof(buf), &readbytes) in test_early_data_tls1_2() 7202 if (!TEST_true(SSL_read_ex(reader, buf, sizeof(buf), &readbytes)) in test_ssl_clear() 8667 if (!TEST_true(SSL_read_ex(clientssl, buf, sizeof(buf), in test_shutdown() 11105 if (!TEST_true(SSL_read_ex(serverssl, buf, sizeof(buf) - 1, in test_read_ahead_key_change() 11239 if (!TEST_true(SSL_read_ex(serverssl, buf, sizeof(buf) - 1, in test_tls13_record_padding() 11393 if (!TEST_true(SSL_read_ex(peerb, buf + offset, in test_pipelining() 11425 if (!TEST_true(SSL_read_ex(peera, buf, msglen, &readbytes)) in test_pipelining() [all …]
|
H A D | recordlentest.c | 167 if (!TEST_false(SSL_read_ex(serverssl, &buf, sizeof(buf), &written))) in test_record_overflow()
|
H A D | quicapitest.c | 130 if (!TEST_false(SSL_read_ex(clientquic, buf, 1, &numbytes)) in test_quic_write_read() 146 if (!TEST_true(SSL_read_ex(clientquic, buf, 1, &numbytes)) in test_quic_write_read() 150 || !TEST_true(SSL_read_ex(clientquic, buf + 1, in test_quic_write_read() 248 if (!TEST_true(SSL_read_ex(clientquic, buf, sizeof(buf), &numbytes)) in test_fin_only_blocking() 258 if (!TEST_false(SSL_read_ex(clientquic, buf, sizeof(buf), &numbytes))) in test_fin_only_blocking() 1298 if (!TEST_true(SSL_read_ex(clientquic, buf, sizeof(buf), &numbytes)) in test_client_auth() 1443 if (SSL_read_ex(*stream, buf, buflen, readbytes)) in unreliable_client_read()
|
H A D | quic_client_test.c | 131 ret = SSL_read_ex(c_ssl, msg2 + c_total_read, in test_quic_client_ex()
|
H A D | quicfaultstest.c | 350 if (!TEST_true(SSL_read_ex(cssl, buf, sizeof(buf), &bytesread))) in test_corrupted_data()
|
/openssl/demos/guide/ |
H A D | quic-multi-stream.c | 301 while (SSL_read_ex(stream1, buf, sizeof(buf), &readbytes)) { in main() 378 while (SSL_read_ex(stream3, buf, sizeof(buf), &readbytes)) in main()
|
H A D | tls-server-block.c | 266 while (SSL_read_ex(ssl, buf, sizeof(buf), &nread) > 0) { in main()
|
H A D | tls-client-block.c | 233 while (SSL_read_ex(ssl, buf, sizeof(buf), &readbytes)) { in main()
|
H A D | quic-client-block.c | 255 while (SSL_read_ex(ssl, buf, sizeof(buf), &readbytes)) { in main()
|
H A D | tls-client-non-block.c | 314 while (!eof && !SSL_read_ex(ssl, buf, sizeof(buf), &readbytes)) { in main()
|
H A D | quic-client-non-block.c | 376 while (!eof && !SSL_read_ex(ssl, buf, sizeof(buf), &readbytes)) { in main()
|
/openssl/doc/man7/ |
H A D | ossl-guide-quic-multi-stream.pod | 60 L<SSL_read_ex(3)>, L<SSL_read(3)>, L<SSL_write_ex(3)> or L<SSL_write(3)> and 65 stream. If a client application calls L<SSL_read_ex(3)> or L<SSL_read(3)> 111 using the L<SSL_write_ex(3)>, L<SSL_write(3)>, L<SSL_read_ex(3)> or 261 we just repeatedly call L<SSL_read_ex(3)> until that function fails (indicating 271 while (SSL_read_ex(stream1, buf, sizeof(buf), &readbytes)) { 284 In a blocking application like this one calls to L<SSL_read_ex(3)> will either 290 L<SSL_read_ex(3)> gave a 0 response code so we call the L<SSL_get_error(3)> 303 * code we received from the SSL_read_ex() call. It must be 0 in order
|
H A D | ossl-guide-tls-client-block.pod | 349 data from the server we use the L<SSL_read_ex(3)> function. In HTTP 1.0 the 384 while (SSL_read_ex(ssl, buf, sizeof(buf), &readbytes)) { 398 We use the L<SSL_read_ex(3)> function to read the response. We don't know 401 screen. The loop ends as soon as L<SSL_read_ex(3)> returns 0 - meaning that it 409 in a 0 return value from L<SSL_read_ex(3)> and we need to use the function 415 * code we received from the SSL_read_ex() call. It must be 0 in order 462 call to L<SSL_read_ex(3)>. So this scenario should never happen in practice. We
|
H A D | ossl-guide-quic-client-non-block.pod | 42 L<SSL_read_ex(3)> or L<SSL_write_ex(3)> will return immediately with a non-fatal 134 L<SSL_read_ex(3)> or L<SSL_write_ex(3)> (or similar) call which indicates the 169 L<SSL_read_ex(3)> or L<SSL_write_ex(3)>. Errors may be fatal for the stream (for 174 L<SSL_read_ex(3)> and L<SSL_write_ex(3)> will return 0 to indicate an error and 182 from the stream but was unable to. Note that a call to L<SSL_read_ex(3)> or 377 while (!eof && !SSL_read_ex(ssl, buf, sizeof(buf), &readbytes)) {
|
H A D | ossl-guide-tls-client-non-block.pod | 41 as L<SSL_read_ex(3)> or L<SSL_write_ex(3)> will not block. 136 handle errors returned from OpenSSL I/O functions such as L<SSL_read_ex(3)> or 141 L<SSL_read_ex(3)> and L<SSL_write_ex(3)> will return 0 to indicate an error and 149 from the socket but was unable to. Note that a call to L<SSL_read_ex(3)> or 289 while (!eof && !SSL_read_ex(ssl, buf, sizeof(buf), &readbytes)) {
|
H A D | ossl-guide-quic-client-block.pod | 247 using L<SSL_write_ex(3)>, and receive data using L<SSL_read_ex(3)> in the same 257 while (SSL_read_ex(ssl, buf, sizeof(buf), &readbytes)) { 273 * code we received from the SSL_read_ex() call. It must be 0 in order 318 L<SSL_read_ex(3)> returned 0, and L<SSL_get_error(3)> returned
|