| /netbsd-src/external/bsd/libevent/dist/ |
| H A D | bufferevent_filter.c | 87 struct bufferevent *underlying; member 141 struct bufferevent *u = bevf->underlying; in be_underlying_writebuf_full() 173 bufferevent_filter_new(struct bufferevent *underlying, in bufferevent_filter_new() argument 183 if (!underlying) in bufferevent_filter_new() 195 if (bufferevent_init_common_(&bufev_f->bev, underlying->ev_base, in bufferevent_filter_new() 204 bufev_f->underlying = underlying; in bufferevent_filter_new() 211 bufferevent_setcb(bufev_f->underlying, in bufferevent_filter_new() 223 bufferevent_incref_(underlying); in bufferevent_filter_new() 225 bufferevent_enable(underlying, EV_READ|EV_WRITE); in bufferevent_filter_new() 226 bufferevent_suspend_read_(underlying, BEV_SUSPEND_FILT_READ); in bufferevent_filter_new() [all …]
|
| H A D | bufferevent_openssl.c | 298 struct bufferevent *underlying; member 388 if (bev_ssl->underlying) { in start_reading() 389 bufferevent_unsuspend_read_(bev_ssl->underlying, in start_reading() 410 if (bev_ssl->underlying) { in start_writing() 412 bufferevent_unsuspend_read_(bev_ssl->underlying, in start_writing() 430 if (bev_ssl->underlying) { in stop_reading() 431 bufferevent_suspend_read_(bev_ssl->underlying, in stop_reading() 444 if (bev_ssl->underlying) { in stop_writing() 445 bufferevent_unsuspend_read_(bev_ssl->underlying, in stop_writing() 456 if (!bev_ssl->underlying) in set_rbow() [all …]
|
| H A D | bufferevent.c | 754 struct bufferevent *underlying; in bufferevent_finalize_cb_() local 758 underlying = bufferevent_get_underlying(bufev); in bufferevent_finalize_cb_() 798 if (underlying) in bufferevent_finalize_cb_() 799 bufferevent_decref_(underlying); in bufferevent_finalize_cb_() 838 struct bufferevent *underlying; in bufferevent_enable_locking_() 842 underlying = bufferevent_get_underlying(bufev); in bufferevent_enable_locking_() 844 if (!lock && underlying && BEV_UPCAST(underlying)->lock) { in bufferevent_enable_locking_() 845 lock = BEV_UPCAST(underlying)->lock; in bufferevent_enable_locking_() 861 if (underlying && !BEV_UPCAST(underlying)->lock) in bufferevent_enable_locking_() 862 bufferevent_enable_locking_(underlying, lock); in bufferevent_enable_locking_()
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
| H A D | SSL_accept.pod | 17 B<ssl> by setting an underlying B<BIO>. 21 The behaviour of SSL_accept() depends on the underlying BIO. 23 If the underlying BIO is B<blocking>, SSL_accept() will only return once the 26 If the underlying BIO is B<nonblocking>, SSL_accept() will also return 27 when the underlying BIO could not satisfy the needs of SSL_accept() 33 The action depends on the underlying BIO. When using a nonblocking socket,
|
| H A D | SSL_do_handshake.pod | 23 The behaviour of SSL_do_handshake() depends on the underlying BIO. 25 If the underlying BIO is B<blocking>, SSL_do_handshake() will only return 28 If the underlying BIO is B<nonblocking>, SSL_do_handshake() will also return 29 when the underlying BIO could not satisfy the needs of SSL_do_handshake() 34 The action depends on the underlying BIO. When using a nonblocking socket,
|
| H A D | SSL_connect.pod | 17 underlying B<BIO>. 21 The behaviour of SSL_connect() depends on the underlying BIO. 23 If the underlying BIO is B<blocking>, SSL_connect() will only return once the 26 If the underlying BIO is B<nonblocking>, SSL_connect() will also return 27 when the underlying BIO could not satisfy the needs of SSL_connect() 33 The action depends on the underlying BIO. When using a nonblocking socket,
|
| H A D | SSL_read.pod | 25 respectively except no bytes are actually removed from the underlying BIO during 38 underlying BIO. 56 of the underlying transport (e.g. TCP), it may be necessary to read several 68 If the underlying BIO is B<blocking>, a read function will only return once the 75 If the underlying BIO is B<nonblocking>, a read function will also return when 76 the underlying BIO could not satisfy the needs of the function to continue the 85 The action depends on the underlying BIO. 94 receiving new data from the underlying socket.
|
| H A D | BIO_s_file.pod | 32 underlying stream. BIO_gets() and BIO_puts() are supported on file BIOs. 53 BIO_CLOSE, BIO_NOCLOSE (the close flag) BIO_FP_TEXT (sets the underlying 73 When wrapping stdout, stdin or stderr the underlying stream should not 76 Because the file BIO calls the underlying stdio functions any quirks 93 BIO_seek() returns the same value as the underlying fseek() function: 145 BIO_reset() and BIO_seek() are implemented using fseek() on the underlying
|
| H A D | SSL_shutdown.pod | 34 then close the underlying connection without waiting for the peer's response. 47 When the underlying connection shall be used for more communications, the 63 If a unidirectional shutdown is enough (the underlying connection shall be 94 The behaviour of SSL_shutdown() additionally depends on the underlying BIO. 95 If the underlying BIO is B<blocking>, SSL_shutdown() will only return once the 98 If the underlying BIO is B<nonblocking>, SSL_shutdown() will also return 99 when the underlying BIO could not satisfy the needs of SSL_shutdown() 104 The action depends on the underlying BIO. When using a nonblocking socket,
|
| H A D | BIO_should_retry.pod | 77 If the underlying I/O structure is in a blocking mode almost all current 78 BIO types will not request a retry, because the underlying I/O 84 retry even if the underlying I/O structure is blocking, if a handshake 87 on the underlying SSL structure. 93 this is done depends on the underlying I/O structure. 103 It is possible for a BIO to block indefinitely if the underlying I/O
|
| H A D | SSL_write.pod | 29 underlying BIO. 36 If the underlying BIO is B<blocking>, the write functions will only return, once 39 If the underlying BIO is B<nonblocking> the write functions will also return 40 when the underlying BIO could not satisfy the needs of the function to continue 46 of the write function. The action depends on the underlying BIO. When using a
|
| /netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
| H A D | SSL_accept.pod | 17 B<ssl> by setting an underlying B<BIO>. 21 The behaviour of SSL_accept() depends on the underlying BIO. 23 If the underlying BIO is B<blocking>, SSL_accept() will only return once the 26 If the underlying BIO is B<nonblocking>, SSL_accept() will also return 27 when the underlying BIO could not satisfy the needs of SSL_accept() 33 The action depends on the underlying BIO. When using a nonblocking socket,
|
| H A D | SSL_do_handshake.pod | 23 The behaviour of SSL_do_handshake() depends on the underlying BIO. 25 If the underlying BIO is B<blocking>, SSL_do_handshake() will only return 28 If the underlying BIO is B<nonblocking>, SSL_do_handshake() will also return 29 when the underlying BIO could not satisfy the needs of SSL_do_handshake() 34 The action depends on the underlying BIO. When using a nonblocking socket,
|
| H A D | SSL_connect.pod | 17 underlying B<BIO>. 21 The behaviour of SSL_connect() depends on the underlying BIO. 23 If the underlying BIO is B<blocking>, SSL_connect() will only return once the 26 If the underlying BIO is B<nonblocking>, SSL_connect() will also return 27 when the underlying BIO could not satisfy the needs of SSL_connect() 33 The action depends on the underlying BIO. When using a nonblocking socket,
|
| H A D | BIO_s_datagram.pod | 57 the underlying socket is configured and how it is to be used; see below. 83 Despite its name, this function does not cause the underlying socket to become 88 This informs the BIO_s_datagram() whether the underlying socket has been 93 underlying socket has been connected and will attempt to use the socket using OS 98 If the I<peer> argument is NULL, BIO_s_datagram() assumes that the underlying 156 If I<num> is nonzero, configures the underlying network socket to enable Don't 163 the underlying network socket, and returns that Path MTU in bytes. This control 171 This control requests that Path MTU discovery be enabled on the underlying 178 supported by the applicable underlying network layer. Use of datagrams of this 198 peek mode is enabled, calls to L<BIO_read(3)> read datagrams from the underlying
|
| H A D | SSL_read.pod | 25 respectively except no bytes are actually removed from the underlying BIO during 38 underlying BIO. 56 of the underlying transport (e.g. TCP), it may be necessary to read several 68 If the underlying BIO is B<blocking>, a read function will only return once the 75 If the underlying BIO is B<nonblocking>, a read function will also return when 76 the underlying BIO could not satisfy the needs of the function to continue the 85 The action depends on the underlying BIO. 94 receiving new data from the underlying socket.
|
| H A D | SSL_shutdown.pod | 32 then close the underlying connection without waiting for the peer's response. 45 When the underlying connection shall be used for more communications, the 53 The behaviour of SSL_shutdown() additionally depends on the underlying BIO. 54 If the underlying BIO is B<blocking>, SSL_shutdown() will only return once the 57 If the underlying BIO is B<nonblocking>, SSL_shutdown() will also return 58 when the underlying BIO could not satisfy the needs of SSL_shutdown() 63 The action depends on the underlying BIO. When using a nonblocking socket, 99 If a unidirectional shutdown is enough (the underlying connection shall be
|
| H A D | EVP_MAC.pod | 70 different types and with different underlying algorithms if there are 76 the MAC algorithm itself and one for the underlying computation 81 "underlying context", or "computation context", which is to denote the 82 context for the underlying computation algorithm if there is one. 90 rely on an underlying computation algorithm. 117 underlying context if there is one, as well as the context itself. 141 EVP_MAC_init() sets up the underlying context I<ctx> with information given 173 Note that a parameter that is unknown in the underlying context is 177 context I<ctx> and its underlying context. 180 Note that a parameter that is unknown in the underlying context is [all …]
|
| H A D | BIO_should_retry.pod | 77 If the underlying I/O structure is in a blocking mode almost all current 78 BIO types will not request a retry, because the underlying I/O 84 retry even if the underlying I/O structure is blocking, if a handshake 87 on the underlying SSL structure. 93 this is done depends on the underlying I/O structure. 103 It is possible for a BIO to block indefinitely if the underlying I/O
|
| H A D | BIO_s_file.pod | 32 underlying stream. BIO_gets() and BIO_puts() are supported on file BIOs. 53 BIO_CLOSE, BIO_NOCLOSE (the close flag) BIO_FP_TEXT (sets the underlying 73 When wrapping stdout, stdin or stderr the underlying stream should not 76 Because the file BIO calls the underlying stdio functions any quirks 144 BIO_reset() and BIO_seek() are implemented using fseek() on the underlying
|
| H A D | BIO_s_fd.pod | 23 BIO_read_ex() and BIO_write_ex() read or write the underlying descriptor. 26 If the close flag is set then close() is called on the underlying 49 platforms read() and write() calls on the descriptor. If the underlying
|
| /netbsd-src/crypto/external/bsd/openssl/dist/doc/man7/ |
| H A D | EVP_MAC-GMAC.pod | 11 This implementation uses EVP_CIPHER functions to get access to the underlying 41 Sets the IV of the underlying cipher, when applicable. 45 Sets the name of the underlying cipher to be used. 49 Sets the properties to be queried when trying to fetch the underlying cipher.
|
| H A D | EVP_MAC-CMAC.pod | 11 This implementation uses EVP_CIPHER functions to get access to the underlying 41 Sets the name of the underlying cipher to be used. 45 Sets the properties to be queried when trying to fetch the underlying cipher.
|
| H A D | EVP_MAC-HMAC.pod | 11 This implementation uses EVP_MD functions to get access to the underlying 41 Sets the name of the underlying digest to be used. 45 Sets the properties to be queried when trying to fetch the underlying digest.
|
| /netbsd-src/external/gpl3/gcc/dist/gcc/d/ |
| H A D | types.cc | 964 Type *underlying = NULL; in visit() local 975 underlying = build_frontend_type (long_integer_type_node); in visit() 977 underlying = build_frontend_type (long_unsigned_type_node); in visit() 979 underlying = in visit() 982 underlying = build_frontend_type (long_long_integer_type_node); in visit() 984 underlying = build_frontend_type (long_long_unsigned_type_node); in visit() 986 underlying = build_frontend_type (long_double_type_node); in visit() 988 underlying = build_frontend_type (complex_long_double_type_node); in visit() 990 underlying = build_frontend_type (complex_float_type_node); in visit() 992 underlying = build_frontend_type (complex_double_type_node); in visit() [all …]
|