/freebsd-13-stable/crypto/openssl/apps/ |
H A D | s_time.c | 232 if (buf_len <= 0 || SSL_write(scon, buf, buf_len) <= 0) 286 if (buf_len <= 0 || SSL_write(scon, buf, buf_len) <= 0) 313 if (buf_len <= 0 || SSL_write(scon, buf, buf_len) <= 0)
|
H A D | s_server.c | 2576 k = SSL_write(con, &(buf[l]), (unsigned int)i); 2589 k = SSL_write(con, &(buf[l]), (unsigned int)i);
|
H A D | s_client.c | 2879 k = SSL_write(con, &(cbuf[cbuf_off]), (unsigned int)cbuf_len);
|
/freebsd-13-stable/contrib/dma/ |
H A D | net.c | 99 while ((s = SSL_write(config.ssl, (const char*)cmd, len)) <= 0) {
|
/freebsd-13-stable/contrib/unbound/util/ |
H A D | netevent.c | 1456 r = SSL_write(c->ssl, 1461 r = SSL_write(c->ssl, 1474 r = SSL_write(c->ssl, (void*)(buf+c->tcp_byte_count), 1479 r = SSL_write(c->ssl, 1500 log_err("SSL_write syscall: %s", 1504 log_crypto_err("could not SSL_write"); 1527 r = SSL_write(c->ssl, (void*)(c->tcp_write_pkt + c->tcp_write_byte_count - 2), 1530 r = SSL_write(c->ssl, (void*)sldns_buffer_current(c->buffer), 1550 log_err("SSL_write syscall: %s", 1554 log_crypto_err("could not SSL_write"); [all...] |
/freebsd-13-stable/contrib/sendmail/src/ |
H A D | sfsasl.c | 862 r = SSL_write(so->con, (char *) buf, size);
|
/freebsd-13-stable/contrib/unbound/smallapp/ |
H A D | unbound-control.c | 774 if(SSL_write(ssl, buf, (int)len) <= 0) 775 ssl_err("could not SSL_write");
|
H A D | unbound-anchor.c | 841 if(verb >= 2) printf("SSL_write: %s\n", buf); 846 if(SSL_write(ssl, buf, (int)strlen(buf)) <= 0) { 847 if(verb) printf("could not SSL_write %s", str);
|
/freebsd-13-stable/contrib/libevent/ |
H A D | bufferevent_openssl.c | 306 /* If this value is greater than 0, then the last SSL_write blocked, 673 /* SSL_write will (reasonably) return 0 if we tell it to 680 r = SSL_write(bev_ssl->ssl, space[i].iov_base,
|
/freebsd-13-stable/contrib/openbsm/bin/auditdistd/ |
H A D | proto_tls.c | 209 ssldone = SSL_write(sendssl, buf, (int)tcpdone);
|
/freebsd-13-stable/lib/libfetch/ |
H A D | common.c | 1514 wlen = SSL_write(conn->ssl,
|
/freebsd-13-stable/contrib/unbound/dnstap/ |
H A D | unbound-dnstap-socket.c | 760 if((r=SSL_write(data->ssl, acceptframe, len)) <= 0) { 762 log_err("SSL_write, peer closed connection"); 764 log_err("could not SSL_write");
|
H A D | dtstream.c | 758 r = SSL_write(dtio->ssl, buf, len); 781 log_err("dnstap io, SSL_write syscall: %s", 786 log_crypto_err("dnstap io, could not SSL_write");
|
/freebsd-13-stable/contrib/ntp/sntp/libevent/ |
H A D | bufferevent_openssl.c | 308 /* If this value is greater than 0, then the last SSL_write blocked, 668 /* SSL_write will (reasonably) return 0 if we tell it to 674 r = SSL_write(bev_ssl->ssl, space[i].iov_base,
|
/freebsd-13-stable/contrib/serf/buckets/ |
H A D | ssl_buckets.c | 78 * |- 3. Call SSL_write with read data 931 that is with SSL_write requires. */ 958 ssl_len = SSL_write(ctx->ssl, vecs_data, interim_len);
|
/freebsd-13-stable/crypto/openssl/include/openssl/ |
H A D | ssl.h | 454 * Allow SSL_write(..., n) to return r with 0 < r < n (i.e. report success 459 * Make it possible to retry SSL_write() with changed buffer location (buffer 461 * misconception that non-blocking SSL_write() behaves like non-blocking 1850 __owur int SSL_write(SSL *ssl, const void *buf, int num);
|
/freebsd-13-stable/secure/lib/libcrypto/man/man3/ |
H A D | Makefile | 412 MAN+= SSL_write.3 2849 MLINKS+= SSL_write.3 SSL_sendfile.3 2850 MLINKS+= SSL_write.3 SSL_write_ex.3
|
/freebsd-13-stable/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 4378 res = SSL_write(conn->ssl, wpabuf_head(in_data), wpabuf_len(in_data)); 4381 "Encryption failed - SSL_write");
|
/freebsd-13-stable/contrib/unbound/daemon/ |
H A D | remote.c | 554 if((r=SSL_write(res->ssl, text, (int)strlen(text))) <= 0) { 556 verbose(VERB_QUERY, "warning, in SSL_write, peer " 560 log_crypto_err("could not SSL_write");
|
/freebsd-13-stable/crypto/openssl/ssl/ |
H A D | ssl_lib.c | 2049 int SSL_write(SSL *s, const void *buf, int num) function
|