• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/

Lines Matching defs:conn

137 static CURLcode connect_prep(struct connectdata *conn, int sockindex)
139 struct SessionHandle *data = conn->data;
155 if(conn->ssl[sockindex].state == ssl_connection_complete)
183 conn->ssl[sockindex].ssl_ctx = ssl_ctx;
184 conn->ssl[sockindex].ssl = NULL;
261 if(!Curl_ssl_getsessionid(conn, (void **) &ssl_sessionid, &ssl_idsize)) {
264 ssl = ssl_client_new(ssl_ctx, conn->sock[sockindex],
268 ssl = ssl_client_new(ssl_ctx, conn->sock[sockindex], NULL, 0);
270 conn->ssl[sockindex].ssl = ssl;
278 static CURLcode connect_finish(struct connectdata *conn, int sockindex)
280 struct SessionHandle *data = conn->data;
281 SSL *ssl = conn->ssl[sockindex].ssl;
297 Curl_axtls_close(conn, sockindex);
326 dns_altname, conn->host.name);
327 if(Curl_cert_hostcheck(dns_altname, conn->host.name)) {
337 Curl_axtls_close(conn, sockindex);
339 conn->host.dispname);
344 conn->host.dispname);
352 Curl_axtls_close(conn, sockindex);
360 if(!Curl_cert_hostcheck((const char *)peer_CN, conn->host.name)) {
363 Curl_axtls_close(conn, sockindex);
365 peer_CN, conn->host.dispname);
370 peer_CN, conn->host.dispname);
376 conn->ssl[sockindex].state = ssl_connection_complete;
377 conn->recv[sockindex] = axtls_recv;
378 conn->send[sockindex] = axtls_send;
383 if(Curl_ssl_addsessionid(conn, (void *) ssl_sessionid, ssl_idsize)
395 struct connectdata *conn,
406 if(conn->ssl[sockindex].connecting_state == ssl_connect_1) {
407 conn_step = connect_prep(conn, sockindex);
409 Curl_axtls_close(conn, sockindex);
412 conn->ssl[sockindex].connecting_state = ssl_connect_2;
415 if(conn->ssl[sockindex].connecting_state == ssl_connect_2) {
417 if(ssl_handshake_status(conn->ssl[sockindex].ssl) != SSL_OK) {
422 ssl_fcn_return = ssl_read(conn->ssl[sockindex].ssl, NULL);
424 Curl_axtls_close(conn, sockindex);
431 infof (conn->data, "handshake completed successfully\n");
432 conn->ssl[sockindex].connecting_state = ssl_connect_3;
435 if(conn->ssl[sockindex].connecting_state == ssl_connect_3) {
436 conn_step = connect_finish(conn, sockindex);
438 Curl_axtls_close(conn, sockindex);
443 conn->ssl[sockindex].connecting_state = ssl_connect_1;
450 conn->ssl[sockindex].state = ssl_connection_none;
451 conn->ssl[sockindex].connecting_state = ssl_connect_1;
462 Curl_axtls_connect(struct connectdata *conn,
466 CURLcode conn_step = connect_prep(conn, sockindex);
468 SSL *ssl = conn->ssl[sockindex].ssl;
471 Curl_axtls_close(conn, sockindex);
479 Curl_axtls_close(conn, sockindex);
485 infof (conn->data, "handshake completed successfully\n");
487 conn_step = connect_finish(conn, sockindex);
489 Curl_axtls_close(conn, sockindex);
497 static ssize_t axtls_send(struct connectdata *conn,
504 int rc = ssl_write(conn->ssl[sockindex].ssl, mem, (int)len);
506 infof(conn->data, " axtls_send\n");
523 void Curl_axtls_close(struct connectdata *conn, int sockindex)
525 struct ssl_connect_data *connssl = &conn->ssl[sockindex];
527 infof(conn->data, " Curl_axtls_close\n");
543 int Curl_axtls_shutdown(struct connectdata *conn, int sockindex)
549 struct ssl_connect_data *connssl = &conn->ssl[sockindex];
550 struct SessionHandle *data = conn->data;
554 infof(conn->data, " Curl_axtls_shutdown\n");
567 int what = Curl_socket_ready(conn->sock[sockindex],
596 static ssize_t axtls_recv(struct connectdata *conn, /* connection data */
602 struct ssl_connect_data *connssl = &conn->ssl[num];
606 infof(conn->data, " axtls_recv\n");
625 Curl_axtls_close(conn, num);
628 failf(conn->data, "axTLS recv error (%d)", ret);
643 int Curl_axtls_check_cxn(struct connectdata *conn)
645 /* openssl.c line: rc = SSL_peek(conn->ssl[FIRSTSOCKET].ssl, (void*)&buf, 1);
649 infof(conn->data, " Curl_axtls_check_cxn\n");