• Home
  • Raw
  • Download

Lines Matching refs:BACKEND

89 #define BACKEND connssl->backend  macro
489 if(insert_wrapped_ptr(&BACKEND->obj_list, obj) != CURLE_OK) { in nss_create_object()
496 BACKEND->obj_clicert = obj; in nss_create_object()
1071 struct Curl_easy *data = BACKEND->data; in cmp_peer_pubkey()
1079 cert = SSL_PeerCertificate(BACKEND->handle); in cmp_peer_pubkey()
1123 struct Curl_easy *data = BACKEND->data; in SelectClientCert()
1124 const char *nickname = BACKEND->client_nickname; in SelectClientCert()
1127 if(BACKEND->obj_clicert) { in SelectClientCert()
1140 if(PK11_ReadRawAttribute(PK11_TypeGeneric, BACKEND->obj_clicert, CKA_VALUE, in SelectClientCert()
1488 PR_Recv(BACKEND->handle, (void *)&buf, 1, PR_MSG_PEEK, in Curl_nss_check_cxn()
1502 const bool client_cert = (BACKEND->client_nickname != NULL) in nss_close()
1503 || (BACKEND->obj_clicert != NULL); in nss_close()
1505 free(BACKEND->client_nickname); in nss_close()
1506 BACKEND->client_nickname = NULL; in nss_close()
1509 Curl_llist_destroy(&BACKEND->obj_list, NULL); in nss_close()
1510 BACKEND->obj_clicert = NULL; in nss_close()
1512 if(BACKEND->handle) { in nss_close()
1518 SSL_InvalidateSession(BACKEND->handle); in nss_close()
1520 PR_Close(BACKEND->handle); in nss_close()
1521 BACKEND->handle = NULL; in nss_close()
1533 if(BACKEND->handle || connssl_proxy->backend->handle) { in Curl_nss_close()
1540 if(BACKEND->handle) in Curl_nss_close()
1773 Curl_llist_destroy(&BACKEND->obj_list, NULL); in nss_fail_connect()
1787 if(PR_SetSocketOption(BACKEND->handle, &sock_opt) != PR_SUCCESS) in nss_set_blocking()
1820 BACKEND->data = data; in nss_setup_connect()
1823 Curl_llist_init(&BACKEND->obj_list, nss_destroy_object); in nss_setup_connect()
1946 BACKEND->obj_clicert = NULL; in nss_setup_connect()
1959 BACKEND->client_nickname = nickname; in nss_setup_connect()
1962 BACKEND->client_nickname = NULL; in nss_setup_connect()
2003 BACKEND->handle = SSL_ImportFD(model, nspr_io); in nss_setup_connect()
2004 if(!BACKEND->handle) { in nss_setup_connect()
2015 SSL_SetPKCS11PinArg(BACKEND->handle, SSL_SET_OPTION(key_passwd)); in nss_setup_connect()
2020 if(SSL_OptionSet(BACKEND->handle, SSL_ENABLE_OCSP_STAPLING, PR_TRUE) in nss_setup_connect()
2027 if(SSL_OptionSet(BACKEND->handle, SSL_ENABLE_NPN, conn->bits.tls_enable_npn in nss_setup_connect()
2033 if(SSL_OptionSet(BACKEND->handle, SSL_ENABLE_ALPN, conn->bits.tls_enable_alpn in nss_setup_connect()
2040 if(SSL_OptionSet(BACKEND->handle, SSL_ENABLE_FALSE_START, PR_TRUE) in nss_setup_connect()
2044 if(SSL_SetCanFalseStartCallback(BACKEND->handle, CanFalseStartCallback, in nss_setup_connect()
2068 if(SSL_SetNextProtoNego(BACKEND->handle, protocols, cur) != SECSuccess) in nss_setup_connect()
2075 if(SSL_ResetHandshake(BACKEND->handle, /* asServer */ PR_FALSE) in nss_setup_connect()
2080 if(SSL_SetURL(BACKEND->handle, SSL_IS_PROXY() ? conn->http_proxy.host.name : in nss_setup_connect()
2085 if(SSL_SetSockPeerID(BACKEND->handle, SSL_IS_PROXY() ? in nss_setup_connect()
2122 if(SSL_ForceHandshakeWithTimeout(BACKEND->handle, timeout) != SECSuccess) { in nss_do_connect()
2133 result = display_conn_info(conn, BACKEND->handle); in nss_do_connect()
2142 ret = check_issuer_cert(BACKEND->handle, nickname); in nss_do_connect()
2250 BACKEND->data = conn->data; in nss_send()
2252 rc = PR_Send(BACKEND->handle, mem, (int)len, 0, PR_INTERVAL_NO_WAIT); in nss_send()
2287 BACKEND->data = conn->data; in nss_recv()
2289 nread = PR_Recv(BACKEND->handle, buf, (int)buffersize, 0, in nss_recv()
2394 return BACKEND->handle; in Curl_nss_get_internals()