/openssl/dev/release-aux/ |
H A D | release-state-fn.sh | 48 local retry=true 52 while $retry; do 53 retry=false 175 retry=true 182 retry=true
|
/openssl/doc/man3/ |
H A D | BIO_should_retry.pod | 7 BIO_get_retry_BIO, BIO_get_retry_reason, BIO_set_retry_reason - BIO retry 36 has insufficient data to return. Check for readability and/or retry the 40 has pending data to write. Check for writability and/or retry the 46 BIO_retry_type() returns a mask of the cause of a retry condition 78 BIO types will not request a retry, because the underlying I/O 80 signal a retry then it need not call BIO_should_retry() after a failed 84 retry even if the underlying I/O structure is blocking, if a handshake 85 occurs during a call to BIO_read(). An application can retry the failed 89 While an application may retry a failed non blocking call immediately 97 available and then retry the BIO operation. By combining the retry [all …]
|
H A D | SSL_CTX_set_mode.pod | 54 Make it possible to retry SSL_write_ex() or SSL_write() with changed buffer 65 need to retry with B<SSL_ERROR_WANT_READ>. 77 deal with the functions returning intermediate reports such as retry 107 Enable asynchronous processing. TLS I/O operations may indicate a retry with
|
H A D | BIO_read.pod | 87 the application should retry the operation later. 97 a retry instead of blocking. 100 determine the cause of a retry and other I/O issues.
|
H A D | SSL_set_async_callback.pod | 67 OpenSSL submits the asynchronous request to the engine. If a retry occurs at 101 SSL_get_async_status() to determine whether a retry happened instead of the
|
H A D | SSL_set_retry_verify.pod | 45 if (/* we need to retry verification callback */)
|
H A D | BIO_s_bio.pod | 46 Calls to BIO_read_ex() will read data from the buffer or request a retry if no 49 Calls to BIO_write_ex() will place data in the buffer or request a retry if the 83 if the buffer is full request a retry. BIO_ctrl_get_write_guarantee() is a
|
H A D | DTLSv1_listen.pod | 114 of -1 indicates any other error. User code may retry the SSL_stateless() call. 123 further information if appropriate. Typically user code is expected to retry the
|
H A D | OCSP_sendreq_new.pod | 92 OCSP_sendreq_nbio() returns 1 for success, 0 on error, -1 if retry is needed.
|
H A D | BIO_s_mem.pod | 48 the "retry" flags will be set (i.e. calling L<BIO_should_retry(3)> will return 77 zero then it will return B<v> when it is empty and it will set the read retry
|
H A D | SSL_get_error.pod | 82 Note that the retry may again lead to an B<SSL_ERROR_WANT_READ> or 154 through a call to L<ASYNC_init_thread(3)>. The application should retry the
|
H A D | BIO_s_accept.pod | 124 connection, or request a retry in non blocking mode. 167 accepted a connection and retry the call.
|
/openssl/test/ssl-tests/ |
H A D | 03-custom_verify.cnf | 8 test-3 = 3-verify-custom-retry 95 [3-verify-custom-retry] 96 ssl_conf = 3-verify-custom-retry-ssl 98 [3-verify-custom-retry-ssl] 99 server = 3-verify-custom-retry-server 100 client = 3-verify-custom-retry-client 102 [3-verify-custom-retry-server] 107 [3-verify-custom-retry-client] 114 client = 3-verify-custom-retry-client-extra 116 [3-verify-custom-retry-client-extra]
|
H A D | 03-custom_verify.cnf.in | 54 # Same test as above but with a custom callback that requests retry once. 56 name => "verify-custom-retry",
|
/openssl/test/ |
H A D | rdcpu_sanitytest.c | 48 int retry; in sanity_check_bytes() local 49 for (retry = 0; retry < max_retries; retry++) { in sanity_check_bytes()
|
H A D | bio_base64_test.c | 26 int retry; member 228 if (t->retry) in test_bio_base64_run() 239 if (t->retry) in test_bio_base64_run() 268 if (t->retry) in test_bio_base64_run() 341 if (t->retry) in generic_case() 379 t.retry = quotrem(q, 2, &q); in test_bio_base64_generated() 410 t.retry = quotrem(q, 2, &q); in test_bio_base64_corner_case_bug()
|
/openssl/crypto/evp/ |
H A D | names.c | 98 retry: in evp_get_cipherbyname_ex() 111 goto retry; in evp_get_cipherbyname_ex() 157 retry: in evp_get_digestbyname_ex() 170 goto retry; in evp_get_digestbyname_ex()
|
/openssl/doc/man7/ |
H A D | ossl-guide-quic-client-non-block.pod | 59 the case. It can retry at any time. 61 Note that it is important that you retry exactly the same operation that you 65 write some other text when you retry the operation. 133 With QUIC that is not the case. OpenSSL may signal retry as a result of an 136 socket needs to retry or not. 323 goto end; /* Cannot retry: error */ 339 data on a retry. An optional mode does exist 352 goto end; /* Cannot retry: error */ 358 goto end; /* Cannot retry: error */ 364 goto end; /* Cannot retry: error */ [all …]
|
H A D | ossl-guide-tls-client-non-block.pod | 70 application has to do, it must also be prepared to come back and retry the 74 before), but this does not have to be the case. It can retry at any time. 76 Note that it is important that you retry exactly the same operation that you 80 some other text when you retry the operation. 235 goto end; /* Cannot retry: error */ 253 one retry to the next. However, in this case, you must still retry exactly the 264 goto end; /* Cannot retry: error */ 270 goto end; /* Cannot retry: error */ 276 goto end; /* Cannot retry: error */ 299 goto end; /* Cannot retry: error */ [all …]
|
/openssl/.github/workflows/ |
H A D | run_quic_interop.yml | 13 tests: [http3, transfer, handshake, retry, chacha20, resumption]
|
/openssl/doc/designs/quic-design/ |
H A D | record-layer.md | 196 transport has indicated a retry), then the `write_records` function will return 197 a "retry" response. It is permissible for the data to be partially sent, but 198 this is still considered a "retry" until all of the data is sent. 200 On a success or retry response libssl may free its buffers immediately. The 204 If a "retry" occurs, then libssl will subsequently call `retry_write_records` 469 * In the event of a retry the caller should call retry_write_records() 473 * write_records() returns - even in the case a retry. 478 * 0 on retry 487 * each retry more of the data may have been incrementally sent. 490 * 0 on retry
|
/openssl/engines/ |
H A D | e_afalg.c | 267 int retry = 0; in afalg_fin_cipher_aio() local 348 if (events[0].res == -EBUSY && retry++ < 3) { in afalg_fin_cipher_aio() 352 __FILE__, __LINE__, retry); in afalg_fin_cipher_aio()
|
/openssl/ssl/ |
H A D | ssl_sess.c | 325 unsigned int retry = 0; in def_generate_session_id() local 330 if (retry > 0) { in def_generate_session_id() 335 (++retry < MAX_SESS_ID_ATTEMPTS)) ; in def_generate_session_id() 336 if (retry < MAX_SESS_ID_ATTEMPTS) in def_generate_session_id()
|
/openssl/crypto/bio/ |
H A D | bio_addr.c | 730 retry: in BIO_lookup_ex() 755 goto retry; in BIO_lookup_ex()
|
/openssl/ssl/statem/ |
H A D | statem_dtls.c | 114 int retry = 1; in dtls1_do_write() local 234 if (retry && BIO_ctrl(SSL_get_wbio(ssl), in dtls1_do_write() 240 retry = 0; in dtls1_do_write()
|