/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/ |
H A D | curl_schannel.c | 113 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 131 connssl->cred = old_cred; 196 connssl->cred = malloc(sizeof(struct curl_schannel_cred)); 197 if(!connssl->cred) { 201 memset(connssl->cred, 0, sizeof(struct curl_schannel_cred)); 206 &connssl->cred->cred_handle, &connssl->cred->time_stamp); 215 Curl_safefree(connssl->cred); 234 connssl->req_flags = ISC_REQ_SEQUENCE_DETECT | ISC_REQ_REPLAY_DETECT | 239 connssl 298 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 502 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 566 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 678 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 826 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 1057 const struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 1079 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 1215 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local [all...] |
H A D | polarssl.c | 131 struct ssl_connect_data* connssl = &conn->ssl[sockindex]; local 158 if((ret = ctr_drbg_init(&connssl->ctr_drbg, entropy_func_mutex, &entropy, 159 connssl->ssn.id, connssl->ssn.length)) != 0) { 167 entropy_init(&connssl->entropy); 169 if((ret = ctr_drbg_init(&connssl->ctr_drbg, entropy_func, &connssl->entropy, 170 connssl->ssn.id, connssl->ssn.length)) != 0) { 180 memset(&connssl 317 struct ssl_connect_data* connssl = &conn->ssl[sockindex]; local 398 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 520 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local [all...] |
H A D | curl_darwinssl.c | 125 struct ssl_connect_data *connssl = (struct ssl_connect_data *)connection; local 126 int sock = connssl->ssl_sockfd; 155 connssl->ssl_direction = false; 185 struct ssl_connect_data *connssl = (struct ssl_connect_data *)connection; local 186 int sock = connssl->ssl_sockfd; 206 connssl->ssl_direction = true; 999 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 1018 if(connssl->ssl_ctx) 1019 CFRelease(connssl->ssl_ctx); 1020 connssl 1510 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 1644 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 1768 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 1899 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 1926 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 2004 struct ssl_connect_data *connssl = &conn->ssl[FIRSTSOCKET]; local 2020 const struct ssl_connect_data *connssl = &conn->ssl[connindex]; local 2069 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 2135 struct ssl_connect_data *connssl = &conn->ssl[num]; local [all...] |
H A D | openssl.c | 895 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 897 if(connssl->handle) { 898 (void)SSL_shutdown(connssl->handle); 899 SSL_set_connect_state(connssl->handle); 901 SSL_free (connssl->handle); 902 connssl->handle = NULL; 904 if(connssl->ctx) { 905 SSL_CTX_free (connssl->ctx); 906 connssl->ctx = NULL; 917 struct ssl_connect_data *connssl local 1483 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 1893 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 2180 get_cert_chain(struct connectdata *conn, struct ssl_connect_data *connssl) argument 2352 servercert(struct connectdata *conn, struct ssl_connect_data *connssl, bool strict) argument 2484 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 2564 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local [all...] |
H A D | cyassl.c | 318 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 322 DEBUGASSERT(ssl_connect_3 == connssl->connecting_state); 324 our_ssl_sessionid = SSL_get_session(connssl->handle); 343 connssl->connecting_state = ssl_connect_done; 474 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 476 if(connssl->handle) { 477 SSL_free (connssl->handle); 478 connssl->handle = NULL; 492 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 498 if(ssl_connection_complete == connssl [all...] |
H A D | gskit.c | 489 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 493 QsoWaitForIOCompletion(connssl->iocport, &cstat, (struct timeval *) NULL); 497 static void close_async_handshake(struct ssl_connect_data *connssl) argument 499 QsoDestroyIOCompletionPort(connssl->iocport); 500 connssl->iocport = -1; 559 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 573 connssl->handle = (gsk_handle) NULL; 574 connssl->iocport = -1; 610 cc = gskit_status(data, gsk_secure_soc_open(envir, &connssl->handle), 646 cc = set_buffer(data, connssl 750 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 801 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 869 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 956 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 973 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local [all...] |
H A D | qssl.c | 143 struct ssl_connect_data * connssl = &conn->ssl[sockindex]; local 152 connssl->handle = h; 169 struct ssl_connect_data * connssl = &conn->ssl[sockindex]; local 170 SSLHandle * h = connssl->handle; 275 struct ssl_connect_data * connssl = &conn->ssl[sockindex]; local 286 SSL_Destroy(connssl->handle); 293 connssl->state = ssl_connection_complete; 296 connssl->handle = NULL; 297 connssl->use = FALSE; 298 connssl 336 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 355 struct ssl_connect_data * connssl = &conn->ssl[sockindex]; local [all...] |
H A D | axtls.c | 120 static void free_ssl_structs(struct ssl_connect_data *connssl) argument 122 if(connssl->ssl) { 123 ssl_free (connssl->ssl); 124 connssl->ssl = NULL; 126 if(connssl->ssl_ctx) { 127 ssl_ctx_free(connssl->ssl_ctx); 128 connssl->ssl_ctx = NULL; 525 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 529 /* line from openssl.c: (void)SSL_shutdown(connssl->ssl); 534 SSL_set_connect_state(connssl 549 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 602 struct ssl_connect_data *connssl = &conn->ssl[num]; local [all...] |
H A D | nss.c | 835 struct ssl_connect_data *connssl = (struct ssl_connect_data *)arg; local 836 struct SessionHandle *data = connssl->data; 837 const char *nickname = connssl->client_nickname; 839 if(connssl->obj_clicert) { 853 if(PK11_ReadRawAttribute(PK11_TypeGeneric, connssl->obj_clicert, CKA_VALUE, 1114 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 1116 if(connssl->handle) { 1122 if((connssl->client_nickname != NULL) || (connssl->obj_clicert != NULL)) 1127 SSL_InvalidateSession(connssl 1307 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local [all...] |
H A D | gtls.c | 257 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 275 if(connssl->connecting_state == ssl_connect_2_reading 276 || connssl->connecting_state == ssl_connect_2_writing) { 279 connssl->connecting_state?sockfd:CURL_SOCKET_BAD; 281 connssl->connecting_state?sockfd:CURL_SOCKET_BAD; 306 connssl->connecting_state = 342 connssl->connecting_state = ssl_connect_1; 945 /* We use connssl->connecting_state to keep track of the connection status; 957 struct ssl_connect_data *connssl = &conn->ssl[sockindex]; local 960 if(ssl_connect_1==connssl [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | http.c | 1372 struct ssl_connect_data *connssl = &conn->ssl[FIRSTSOCKET]; local 1377 if(connssl->connecting_state == ssl_connect_2_writing) { 1382 else if(connssl->connecting_state == ssl_connect_2_reading) {
|