• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/

Lines Matching defs:conn

515 static CURLcode nss_load_key(struct connectdata *conn, int sockindex,
521 struct ssl_connect_data *ssl = conn->ssl;
539 conn->data->set.str[STRING_KEY_PASSWD]);
546 static int display_error(struct connectdata *conn, PRInt32 err,
551 failf(conn->data, "Unable to load client key: Incorrect password");
554 failf(conn->data, "Unable to load certificate %s", filename);
562 static CURLcode cert_stuff(struct connectdata *conn, int sockindex,
565 struct SessionHandle *data = conn->data;
569 rv = nss_load_cert(&conn->ssl[sockindex], cert_file, PR_FALSE);
572 if(!display_error(conn, err, cert_file)) {
583 rv = nss_load_key(conn, sockindex, key_file);
586 rv = nss_load_key(conn, sockindex, cert_file);
589 if(!display_error(conn, err, key_file)) {
615 struct connectdata *conn = (struct connectdata *)arg;
616 if(!conn->data->set.ssl.verifypeer) {
617 infof(conn->data, "skipping SSL peer certificate verification\n");
630 struct connectdata *conn = (struct connectdata*) arg;
636 if(!conn->data->set.ssl_enable_npn && !conn->data->set.ssl_enable_alpn) {
645 infof(conn->data, "TLS, neither ALPN nor NPN succeeded\n");
649 infof(conn->data, "ALPN, server accepted to use %.*s\n", buflen, buf);
653 infof(conn->data, "NPN, server accepted to use %.*s\n", buflen, buf);
660 conn->negnpn = NPN_HTTP2_DRAFT09;
664 conn->negnpn = NPN_HTTP1_1;
701 static void display_conn_info(struct connectdata *conn, PRFileDesc *sock)
716 infof(conn->data, "SSL connection using %s\n", suite.cipherSuiteName);
723 infof(conn->data, "Server certificate:\n");
725 if(!conn->data->set.ssl.certinfo) {
726 display_cert_info(conn->data, cert);
746 Curl_ssl_init_certinfo(conn->data, i);
748 Curl_extract_certinfo(conn, i++, (char *)cert->derCert.data,
765 struct connectdata *conn = (struct connectdata *)arg;
766 struct SessionHandle *data = conn->data;
1092 Curl_nss_check_cxn(struct connectdata *conn)
1098 PR_Recv(conn->ssl[FIRSTSOCKET].handle, (void *)&buf, 1, PR_MSG_PEEK,
1112 void Curl_nss_close(struct connectdata *conn, int sockindex)
1114 struct ssl_connect_data *connssl = &conn->ssl[sockindex];
1119 fake_sclose(conn->sock[sockindex]);
1120 conn->sock[sockindex] = CURL_SOCKET_BAD;
1187 static CURLcode nss_load_ca_certificates(struct connectdata *conn,
1190 struct SessionHandle *data = conn->data;
1195 CURLcode rv = nss_load_cert(&conn->ssl[sockindex], cafile, PR_TRUE);
1218 if(CURLE_OK != nss_load_cert(&conn->ssl[sockindex], fullpath, PR_TRUE))
1299 CURLcode Curl_nss_connect(struct connectdata *conn, int sockindex)
1305 struct SessionHandle *data = conn->data;
1306 curl_socket_t sockfd = conn->sock[sockindex];
1307 struct ssl_connect_data *connssl = &conn->ssl[sockindex];
1341 curlerr = nss_init(conn->data);
1384 ssl_no_cache = (conn->ssl_config.sessionid && data->set.ssl.verifypeer) ?
1422 if(SSL_AuthCertificateHook(model, nss_auth_cert_hook, conn) != SECSuccess)
1426 if(SSL_BadCertHook(model, BadCertHandler, conn) != SECSuccess)
1429 if(SSL_HandshakeCallback(model, HandshakeCallback, conn) != SECSuccess)
1433 const CURLcode rv = nss_load_ca_certificates(conn, sockindex);
1457 CURLcode rv = cert_stuff(conn, sockindex, data->set.str[STRING_CERT],
1535 SSL_SetURL(connssl->handle, conn->host.name);
1548 if(conn->data->set.ssl.certverifyresult == SSL_ERROR_BAD_CERT_DOMAIN)
1550 else if(conn->data->set.ssl.certverifyresult!=0)
1562 conn->recv[sockindex] = nss_recv;
1563 conn->send[sockindex] = nss_send;
1565 display_conn_info(conn, connssl->handle);
1624 static ssize_t nss_send(struct connectdata *conn, /* connection data */
1630 ssize_t rc = PR_Send(conn->ssl[sockindex].handle, mem, (int)len, 0,
1639 infof(conn->data, "SSL write: error %d (%s)\n", err, err_name);
1642 nss_print_error_message(conn->data, err);
1653 static ssize_t nss_recv(struct connectdata * conn, /* connection data */
1659 ssize_t nread = PR_Recv(conn->ssl[num].handle, buf, (int)buffersize, 0,
1670 infof(conn->data, "SSL read: errno %d (%s)\n", err, err_name);
1673 nss_print_error_message(conn->data, err);