Searched refs:socket (Results 1 – 25 of 64) sorted by relevance
123
5 BIO_s_socket, BIO_new_socket - socket BIO17 BIO_s_socket() returns the socket BIO method. This is a wrapper18 round the platform's socket routines.20 BIO_read_ex() and BIO_write_ex() read or write the underlying socket.23 If the close flag is set then the socket is shut down and closed26 BIO_new_socket() returns a socket BIO using B<sock> and B<close_flag>.33 The reason for having separate file descriptor and socket BIOs is that on some40 BIO_s_socket() returns the socket BIO method.
54 connected socket is a network socket which has had L<BIO_connect(3)> or a55 similar OS-specific function called on it. Such a socket can only receive56 datagrams from the specified peer. Any other socket is an unconnected socket and64 the underlying socket is configured and how it is to be used; see below.103 This informs the BIO_s_datagram() whether the underlying socket has been105 socket.108 underlying socket has been connected and will attempt to use the socket using OS114 socket is not connected and will attempt to use the socket using an OS APIs194 can only be used with a connected socket.202 network socket.[all …]
6 socket communication setup routines21 BIO_socket() creates a socket in the domain B<domain>, of type25 BIO_bind() binds the source address and service to a socket and41 socket B<accept_sock>. When it gets a connection, the address and44 on the accepted socket. The flags are described in L</FLAGS> below.58 Sets the socket to nonblocking mode.64 buffered until there's enough for the socket to send out in one go.73 When creating an IPv6 socket, make it only listen for IPv6 addresses78 Enables TCP Fast Open on the socket. Uses appropriate APIs on94 BIO_socket() returns the socket number on success or B<INVALID_SOCKET>[all …]
19 socket file descriptor of a network connection.21 When performing the operation, a B<socket BIO> is automatically created to27 created instead of a B<socket BIO>. These functions fail if called54 On Windows, a socket handle is a 64-bit data type (UINT_PTR), which leads to a56 passing the socket handle to SSL_set_*fd(). For the time being, this warning can58 upper limit is INVALID_SOCKET-1 (2^64 - 2), in practice the current socket()
42 round the platform's TCP/IP socket accept routines.56 connection on that chain is shutdown and the socket closed when64 the accept socket. See L<BIO_s_fd(3)>88 BIO_set_nbio_accept() sets the accept socket to blocking mode91 BIO_set_tfo_accept() enables TCP Fast Open on the accept socket111 then another socket cannot be bound to the same port. If117 the socket will be configured to accept TCP Fast Open122 to create the accept socket and bind an address to it. Second135 accept->socket. This effectively means that attempting I/O on140 then they are placed between the socket and the accept BIO,[all …]
64 AF_UNSPEC. Typically user code is expected to "connect" the underlying socket to67 Warning: It is essential that the calling code connects the underlying socket to70 datagram on an unconnected socket. If the socket is not connected, it can74 socket means that any host on the network can cause outgoing DTLS traffic to be75 redirected to it by sending a datagram to the socket in question. This does not81 Once a socket has been connected, L<BIO_ctrl_set_connected(3)> should be used to82 inform the BIO that the socket is to be used in connected mode.
20 socket to obtain randomness and seed the OpenSSL RNG.25 specified socket B<path>, and passes the data it receives into RAND_add().29 the specified socket B<path>, where B<num> must be less than 256.
22 BIO_socket_wait() waits on the socket B<fd> for reading if B<for_read> is not 0,26 BIO_wait() waits at most until B<max_time> on the given (typically socket-based)37 For nonblocking and potentially even non-socket BIOs it polls
41 round the platform's TCP/IP socket connection routines.55 connection is shutdown and the socket closed when the BIO109 BIO_set_sock_type() can be used to set a socket type value as would be passed in110 a call to socket(2). The only currently supported values are B<SOCK_STREAM> (the112 created is a UDP datagram socket handled via L<BIO_s_datagram(3)>.150 the underlying socket has connected and retry the call.184 BIO_get_sock_type() returns a socket type or 0 if the call is not supported.
48 determine what protocol family, socket type and protocol should be used for57 parameter and expects the B<host> parameter to hold the path to the socket file.66 BIO_ADDRINFO_socktype() returns the socket type of the given
54 File descriptor BIOs should not be used for socket I/O. Use socket BIOs
18 AFALG_R_SOCKET_ACCEPT_FAILED:110:socket accept failed19 AFALG_R_SOCKET_BIND_FAILED:103:socket bind failed20 AFALG_R_SOCKET_CREATE_FAILED:109:socket create failed21 AFALG_R_SOCKET_OPERATION_FAILED:104:socket operation failed22 AFALG_R_SOCKET_SET_KEY_FAILED:106:socket set key failed
20 supports a nonblocking socket.29 data yet. Similarly it waits when writing if the socket is currently unable to35 updating a GUI or performing operations on some other socket.37 With a nonblocking socket attempting to read or write to a socket that is47 =head2 Setting the socket to be nonblocking50 the socket into nonblocking mode. A socket will be default be blocking. The64 =head2 Performing work while waiting for the socket68 this is the whole point of using a nonblocking socket, i.e. to give the79 socket is currently unable to write, then you cannot then attempt to write84 for the state of the socket to change.[all …]
21 We use a blocking socket for the purposes of this example. This means that124 =head2 Creating the socket and BIO127 socket. It is the application's responsibility for ensuring that the socket is131 constructing the socket; and connecting the socket.135 to create an IPv4 TCP socket:139 sock = socket(AF_INET, SOCK_STREAM, 0);197 /* Connect the socket to the server's address */204 /* We have a connected socket so break out of the loop */227 /* Create a BIO to wrap the socket */505 =head2 Failure to connect the underlying socket[all …]
85 =head2 Creating the socket and BIO88 TLS uses TCP while QUIC uses UDP. The way that the QUIC socket is created in our107 * Create a TCP socket. We could equally use non-OpenSSL calls such108 * as "socket" here for this and the subsequent connect and close117 /* Connect the socket to the server's address */148 Firstly, we set the socket into nonblocking mode. This must always be done for168 /* Create a BIO to wrap the socket */176 * Associate the newly created BIO with the underlying socket. By177 * passing BIO_CLOSE here the socket will be automatically closed when179 * case you must close the socket explicitly when it is no longer[all …]
51 functionality but also avoids the round trip needed to open a TCP socket; thus,73 =item Multiplexing over a single UDP socket76 same UDP socket as some other UDP-based protocols, such as RTP.157 expects blocking behaviour then you configure the underlying socket for159 underlying socket is configured to be nonblocking.161 With an OpenSSL QUIC application the underlying socket must always be configured166 socket. If nonblocking behaviour is desired then the application must call
28 nonblocking socket. However, despite this, the B<SSL> object still has blocking49 =head2 Performing work while waiting for the socket69 for the state of the underlying socket to change or until a timeout expires80 /* Get hold of the underlying file descriptor for the socket */98 * whether the state of the underlying socket has changed or not.104 * Wait until the socket is writeable or readable. We use select here132 read or write to the underlying socket and the socket signalled the "retry".136 socket needs to retry or not.139 socket for a QUIC application we must call the L<SSL_net_read_desired(3)> and159 readability/writeability of the socket because it is very simple to use and is[all …]
22 Both the acceptor socket and client connections are "blocking". A more typical203 socket. This delayed processing allows the programmer to specify additional204 behaviours before the listening socket is actually created.207 * Create a listener socket wrapped in a BIO.208 * The first call to BIO_do_accept() initialises the socket220 socket, without accepting a client connection. Subsequent calls to the same227 errx(res, "Error setting up acceptor socket");269 And now we're ready to attempt the SSL handshake. With a blocking socket296 closes the underlying socket.
82 return socket(family, type, protocol); in hpns_socket()87 return socket(family, type, protocol); in hpns_socket()93 socket_rc = socket(family, type, protocol); in hpns_socket()129 fd = socket(AF_UNIX, SOCK_STREAM, 0); in RAND_query_egd_bytes()
54 events as well as the circumstances where a network socket becomes readable or56 until a socket becomes readable, or writable, or a timeout expires, whichever85 such as select(3) or poll(3), regardless of whether the network socket is89 mode, this is not an advisable usage mode. If a socket is in blocking mode,188 underlying socket.225 This approach in general requires that a network socket be configured in229 socket FD we use into non-blocking mode.284 also be trying to make use of the same socket.359 with are socket BIOs:456 just yield the socket's FD. For memory-based BIOs, see below.[all …]
172 fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP); in main()174 fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); in main()
5 of Windows socket API.16 structure which embeds a fixed-length array of socket handles. This is necessary39 model, you make a read or write on a socket and an event is posted to the IOCP
340 fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP); in main()342 fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); in main()
60 # define socket(d,t,p) ((int)socket(d,t,p)) macro
2 to simplify socket programming.
Completed in 33 milliseconds