Lines Matching defs:so

62 	struct sasl_obj *so = (struct sasl_obj *) fp->f_cookie;
67 if (so->fp == NULL)
69 return so->fp->f_file; /* for stdio fileno() compatibility */
72 if (so->fp == NULL)
76 return sm_io_getinfo(so->fp, what, valp);
108 struct sasl_obj *so;
111 so = (struct sasl_obj *) sm_malloc(sizeof(struct sasl_obj));
112 if (so == NULL)
117 so->fp = si->fp;
118 so->conn = si->conn;
121 ** The underlying 'fp' is set to SM_IO_NOW so that the entire
131 (void) sm_io_setvbuf(so->fp, SM_TIME_DEFAULT, NULL, SM_IO_NOW, 0);
132 fp->f_cookie = so;
152 struct sasl_obj *so;
154 so = (struct sasl_obj *) fp->f_cookie;
155 if (so == NULL)
157 SM_CLOSE_FP(so->fp);
158 sm_free(so);
159 so = NULL;
197 struct sasl_obj *so = (struct sasl_obj *) fp->f_cookie;
217 len = sm_io_read(so->fp, SM_TIME_DEFAULT, buf, size);
220 result = sasl_decode(so->conn, buf,
291 struct sasl_obj *so = (struct sasl_obj *) fp->f_cookie;
307 result = sasl_getprop(so->conn, SASL_MAXOUTBUF,
312 result = sasl_encode(so->conn, buf,
329 ret = sm_io_write(so->fp, SM_TIME_DEFAULT,
454 struct tls_obj *so = (struct tls_obj *) fp->f_cookie;
459 if (so->fp == NULL)
461 return so->fp->f_file; /* for stdio fileno() compatibility */
464 return SSL_pending(so->con) > 0;
496 struct tls_obj *so;
499 so = (struct tls_obj *) sm_malloc(sizeof(struct tls_obj));
500 if (so == NULL)
505 so->fp = ti->fp;
506 so->con = ti->con;
516 fp->f_file = sm_io_getinfo(so->fp, SM_IO_WHAT_FD, NULL);
517 (void) sm_io_setvbuf(so->fp, SM_TIME_DEFAULT, NULL, SM_IO_NOW, 0);
518 fp->f_cookie = so;
538 struct tls_obj *so;
540 so = (struct tls_obj *) fp->f_cookie;
541 if (so == NULL)
543 SM_CLOSE_FP(so->fp);
544 sm_free(so);
545 so = NULL;
597 ** so both read and write "want errors" need to be handled.
598 ** A select() exception loops back so that a proper SSL
719 struct tls_obj *so = (struct tls_obj *) fp->f_cookie;
728 r = SSL_read(so->con, (char *) buf, size);
734 switch (ssl_err = SSL_get_error(so->con, r))
745 rfd = SSL_get_rfd(so->con);
746 wfd = SSL_get_wfd(so->con);
747 try = tls_retry(so->con, rfd, wfd, tlsstart,
845 struct tls_obj *so = (struct tls_obj *) fp->f_cookie;
854 r = SSL_write(so->con, (char *) buf, size);
859 switch (ssl_err = SSL_get_error(so->con, r))
870 rfd = SSL_get_rfd(so->con);
871 wfd = SSL_get_wfd(so->con);
872 try = tls_retry(so->con, rfd, wfd, tlsstart,