Searched refs:connssl (Results 1 - 11 of 11) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/
H A Dcurl_schannel.c113 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
131 connssl->cred = old_cred;
196 connssl->cred = malloc(sizeof(struct curl_schannel_cred));
197 if(!connssl->cred) {
201 memset(connssl->cred, 0, sizeof(struct curl_schannel_cred));
206 &connssl->cred->cred_handle, &connssl->cred->time_stamp);
215 Curl_safefree(connssl->cred);
234 connssl->req_flags = ISC_REQ_SEQUENCE_DETECT | ISC_REQ_REPLAY_DETECT |
239 connssl
298 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
502 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
566 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
678 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
826 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
1057 const struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
1079 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
1215 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
[all...]
H A Dpolarssl.c131 struct ssl_connect_data* connssl = &conn->ssl[sockindex]; local
158 if((ret = ctr_drbg_init(&connssl->ctr_drbg, entropy_func_mutex, &entropy,
159 connssl->ssn.id, connssl->ssn.length)) != 0) {
167 entropy_init(&connssl->entropy);
169 if((ret = ctr_drbg_init(&connssl->ctr_drbg, entropy_func, &connssl->entropy,
170 connssl->ssn.id, connssl->ssn.length)) != 0) {
180 memset(&connssl
317 struct ssl_connect_data* connssl = &conn->ssl[sockindex]; local
398 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
520 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
[all...]
H A Dcurl_darwinssl.c125 struct ssl_connect_data *connssl = (struct ssl_connect_data *)connection; local
126 int sock = connssl->ssl_sockfd;
155 connssl->ssl_direction = false;
185 struct ssl_connect_data *connssl = (struct ssl_connect_data *)connection; local
186 int sock = connssl->ssl_sockfd;
206 connssl->ssl_direction = true;
999 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
1018 if(connssl->ssl_ctx)
1019 CFRelease(connssl->ssl_ctx);
1020 connssl
1510 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
1644 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
1768 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
1899 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
1926 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
2004 struct ssl_connect_data *connssl = &conn->ssl[FIRSTSOCKET]; local
2020 const struct ssl_connect_data *connssl = &conn->ssl[connindex]; local
2069 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
2135 struct ssl_connect_data *connssl = &conn->ssl[num]; local
[all...]
H A Dopenssl.c895 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
897 if(connssl->handle) {
898 (void)SSL_shutdown(connssl->handle);
899 SSL_set_connect_state(connssl->handle);
901 SSL_free (connssl->handle);
902 connssl->handle = NULL;
904 if(connssl->ctx) {
905 SSL_CTX_free (connssl->ctx);
906 connssl->ctx = NULL;
917 struct ssl_connect_data *connssl local
1483 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
1893 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
2180 get_cert_chain(struct connectdata *conn, struct ssl_connect_data *connssl) argument
2352 servercert(struct connectdata *conn, struct ssl_connect_data *connssl, bool strict) argument
2484 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
2564 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
[all...]
H A Dcyassl.c318 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
322 DEBUGASSERT(ssl_connect_3 == connssl->connecting_state);
324 our_ssl_sessionid = SSL_get_session(connssl->handle);
343 connssl->connecting_state = ssl_connect_done;
474 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
476 if(connssl->handle) {
477 SSL_free (connssl->handle);
478 connssl->handle = NULL;
492 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
498 if(ssl_connection_complete == connssl
[all...]
H A Dgskit.c489 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
493 QsoWaitForIOCompletion(connssl->iocport, &cstat, (struct timeval *) NULL);
497 static void close_async_handshake(struct ssl_connect_data *connssl) argument
499 QsoDestroyIOCompletionPort(connssl->iocport);
500 connssl->iocport = -1;
559 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
573 connssl->handle = (gsk_handle) NULL;
574 connssl->iocport = -1;
610 cc = gskit_status(data, gsk_secure_soc_open(envir, &connssl->handle),
646 cc = set_buffer(data, connssl
750 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
801 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
869 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
956 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
973 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
[all...]
H A Dqssl.c143 struct ssl_connect_data * connssl = &conn->ssl[sockindex]; local
152 connssl->handle = h;
169 struct ssl_connect_data * connssl = &conn->ssl[sockindex]; local
170 SSLHandle * h = connssl->handle;
275 struct ssl_connect_data * connssl = &conn->ssl[sockindex]; local
286 SSL_Destroy(connssl->handle);
293 connssl->state = ssl_connection_complete;
296 connssl->handle = NULL;
297 connssl->use = FALSE;
298 connssl
336 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
355 struct ssl_connect_data * connssl = &conn->ssl[sockindex]; local
[all...]
H A Daxtls.c120 static void free_ssl_structs(struct ssl_connect_data *connssl) argument
122 if(connssl->ssl) {
123 ssl_free (connssl->ssl);
124 connssl->ssl = NULL;
126 if(connssl->ssl_ctx) {
127 ssl_ctx_free(connssl->ssl_ctx);
128 connssl->ssl_ctx = NULL;
525 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
529 /* line from openssl.c: (void)SSL_shutdown(connssl->ssl);
534 SSL_set_connect_state(connssl
549 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
602 struct ssl_connect_data *connssl = &conn->ssl[num]; local
[all...]
H A Dnss.c835 struct ssl_connect_data *connssl = (struct ssl_connect_data *)arg; local
836 struct SessionHandle *data = connssl->data;
837 const char *nickname = connssl->client_nickname;
839 if(connssl->obj_clicert) {
853 if(PK11_ReadRawAttribute(PK11_TypeGeneric, connssl->obj_clicert, CKA_VALUE,
1114 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
1116 if(connssl->handle) {
1122 if((connssl->client_nickname != NULL) || (connssl->obj_clicert != NULL))
1127 SSL_InvalidateSession(connssl
1307 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
[all...]
H A Dgtls.c257 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
275 if(connssl->connecting_state == ssl_connect_2_reading
276 || connssl->connecting_state == ssl_connect_2_writing) {
279 connssl->connecting_state?sockfd:CURL_SOCKET_BAD;
281 connssl->connecting_state?sockfd:CURL_SOCKET_BAD;
306 connssl->connecting_state =
342 connssl->connecting_state = ssl_connect_1;
945 /* We use connssl->connecting_state to keep track of the connection status;
957 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local
960 if(ssl_connect_1==connssl
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/
H A Dhttp.c1372 struct ssl_connect_data *connssl = &conn->ssl[FIRSTSOCKET]; local
1377 if(connssl->connecting_state == ssl_connect_2_writing) {
1382 else if(connssl->connecting_state == ssl_connect_2_reading) {

Completed in 117 milliseconds