• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/

Lines Matching defs:conn

341 int cert_stuff(struct connectdata *conn,
348 struct SessionHandle *data = conn->data;
785 int Curl_ossl_check_cxn(struct connectdata *conn)
790 rc = SSL_peek(conn->ssl[FIRSTSOCKET].handle, (void*)&buf, 1);
893 void Curl_ossl_close(struct connectdata *conn, int sockindex)
895 struct ssl_connect_data *connssl = &conn->ssl[sockindex];
914 int Curl_ossl_shutdown(struct connectdata *conn, int sockindex)
917 struct ssl_connect_data *connssl = &conn->ssl[sockindex];
918 struct SessionHandle *data = conn->data;
938 int what = Curl_socket_ready(conn->sock[sockindex],
945 nread = (ssize_t)SSL_read(conn->ssl[sockindex].handle, buf,
947 err = SSL_get_error(conn->ssl[sockindex].handle, (int)nread);
968 failf(conn->data, "SSL read: %s, errno %d",
1102 static CURLcode verifyhost(struct connectdata *conn,
1109 struct SessionHandle *data = conn->data;
1119 if(conn->bits.ipv6_ip &&
1120 Curl_inet_pton(AF_INET6, conn->host.name, &addr)) {
1126 if(Curl_inet_pton(AF_INET, conn->host.name, &addr)) {
1168 Curl_cert_hostcheck(altptr, conn->host.name))
1190 infof(data, "\t subjectAltName: %s matched\n", conn->host.dispname);
1194 infof(data, "\t subjectAltName does not match %s\n", conn->host.dispname);
1196 "target host name '%s'", conn->host.dispname);
1269 else if(!Curl_cert_hostcheck((const char *)peer_CN, conn->host.name)) {
1271 "target host name '%s'", peer_CN, conn->host.dispname);
1355 struct connectdata *conn)
1362 if(!conn || !conn->data || !conn->data->set.fdebug ||
1366 data = conn->data;
1428 struct connectdata *conn = (struct connectdata*) arg;
1433 infof(conn->data, "NPN, negotiated HTTP2\n");
1434 conn->negnpn = NPN_HTTP2_DRAFT09;
1437 infof(conn->data, "NPN, negotiated HTTP1.1\n");
1438 conn->negnpn = NPN_HTTP1_1;
1441 infof(conn->data, "NPN, no overlap, negotiated nothing\n");
1473 ossl_connect_step1(struct connectdata *conn,
1478 struct SessionHandle *data = conn->data;
1482 curl_socket_t sockfd = conn->sock[sockindex];
1483 struct ssl_connect_data *connssl = &conn->ssl[sockindex];
1561 conn)) {
1621 if(!conn->data->set.ssl_enable_beast)
1697 conn);
1724 if(!cert_stuff(conn,
1855 if((0 == Curl_inet_pton(AF_INET, conn->host.name, &addr)) &&
1857 (0 == Curl_inet_pton(AF_INET6, conn->host.name, &addr)) &&
1860 !SSL_set_tlsext_host_name(connssl->handle, conn->host.name))
1866 if(!Curl_ssl_getsessionid(conn, &ssl_sessionid, NULL)) {
1889 ossl_connect_step2(struct connectdata *conn, int sockindex)
1891 struct SessionHandle *data = conn->data;
1893 struct ssl_connect_data *connssl = &conn->ssl[sockindex];
1977 conn->host.name, conn->remote_port);
2006 conn->negnpn = NPN_HTTP2_DRAFT09;
2010 conn->negnpn = NPN_HTTP1_1;
2180 static CURLcode get_cert_chain(struct connectdata *conn,
2187 struct SessionHandle *data = conn->data;
2352 static CURLcode servercert(struct connectdata *conn,
2360 struct SessionHandle *data = conn->data;
2367 (void)get_cert_chain(conn, connssl);
2392 retcode = verifyhost(conn, connssl->server_cert);
2478 ossl_connect_step3(struct connectdata *conn,
2483 struct SessionHandle *data = conn->data;
2484 struct ssl_connect_data *connssl = &conn->ssl[sockindex];
2510 incache = !(Curl_ssl_getsessionid(conn, &old_ssl_sessionid, NULL));
2514 Curl_ssl_delsessionid(conn, old_ssl_sessionid);
2519 retcode = Curl_ssl_addsessionid(conn, our_ssl_sessionid,
2544 (void)servercert(conn, connssl, FALSE);
2546 retcode = servercert(conn, connssl, TRUE);
2557 ossl_connect_common(struct connectdata *conn,
2563 struct SessionHandle *data = conn->data;
2564 struct ssl_connect_data *connssl = &conn->ssl[sockindex];
2565 curl_socket_t sockfd = conn->sock[sockindex];
2584 retcode = ossl_connect_step1(conn, sockindex);
2637 retcode = ossl_connect_step2(conn, sockindex);
2648 retcode = ossl_connect_step3(conn, sockindex);
2655 conn->recv[sockindex] = ossl_recv;
2656 conn->send[sockindex] = ossl_send;
2669 Curl_ossl_connect_nonblocking(struct connectdata *conn,
2673 return ossl_connect_common(conn, sockindex, TRUE, done);
2677 Curl_ossl_connect(struct connectdata *conn,
2683 retcode = ossl_connect_common(conn, sockindex, FALSE, &done);
2692 bool Curl_ossl_data_pending(const struct connectdata *conn,
2695 if(conn->ssl[connindex].handle)
2697 return (0 != SSL_pending(conn->ssl[connindex].handle)) ? TRUE : FALSE;
2702 static ssize_t ossl_send(struct connectdata *conn,
2720 rc = SSL_write(conn->ssl[sockindex].handle, mem, memlen);
2723 err = SSL_get_error(conn->ssl[sockindex].handle, rc);
2734 failf(conn->data, "SSL_write() returned SYSCALL, errno = %d",
2742 failf(conn->data, "SSL_write() error: %s",
2748 failf(conn->data, "SSL_write() return error %d", err);
2755 static ssize_t ossl_recv(struct connectdata *conn, /* connection data */
2770 nread = (ssize_t)SSL_read(conn->ssl[num].handle, buf, buffsize);
2773 int err = SSL_get_error(conn->ssl[num].handle, (int)nread);
2792 failf(conn->data, "SSL read: %s, errno %d",