Searched refs:handshake (Results 1 – 25 of 30) sorted by relevance
12
18 Use false start during the TLS handshake. False start is a mode where a TLS20 message, thus saving a round trip when performing a full handshake.
19 handshake ACK) if the client and server have been connected previously.
25 For HTTPS, this means curl negotiates HTTP/2 in the TLS handshake. curl does
25 version in the TLS handshake.
29 LDAPS. Such a transfer always fails if the TLS handshake does not work.
30 sent *before* the TLS handshake is complete. While the early data is also
38 handshake may fail.
33 handshake. False start is a mode where a TLS client starts sending application35 when performing a full handshake.
18 CURLINFO_APPCONNECT_TIME - get the time until the SSL/SSH handshake is completed32 start until the SSL/SSH connect/handshake to the remote host was completed.
18 CURLINFO_APPCONNECT_TIME_T - time until the SSL/SSH handshake completed32 from the start until the SSL/SSH connect/handshake to the remote host was
32 option enables/disables ALPN in the SSL handshake (if the SSL backend libcurl
34 option enables/disables NPN in the SSL handshake (if the SSL backend libcurl
35 SSL handshake (if the SSL backend libcurl is built to use supports it).
32 connection handshake, saving up to one full round-trip time (RTT).
42 handshake may fail.
36 the authentication handshake may fail.
74 handshake. (Added in 7.49.0)
55 object. This reduces the time spent in the SSL handshake when reconnecting to
94 normally post-handshake.
47 the SSL library used for the handshake and a pointer to the respective
29 # GnuTLS seems to not fail on its handshake but instead times out which gives
580 hyper_task *handshake = NULL; in start_CONNECT() local628 handshake = hyper_clientconn_handshake(io, options); in start_CONNECT()629 if(!handshake) { in start_CONNECT()637 if(HYPERE_OK != hyper_executor_push(h->exec, handshake)) { in start_CONNECT()642 handshake = NULL; /* ownership passed on */ in start_CONNECT()783 if(handshake) in start_CONNECT()784 hyper_task_free(handshake); in start_CONNECT()
834 hyper_task *handshake = NULL; in Curl_http() local938 handshake = hyper_clientconn_handshake(io, options); in Curl_http()939 if(!handshake) { in Curl_http()947 if(HYPERE_OK != hyper_executor_push(h->exec, handshake)) { in Curl_http()952 handshake = NULL; /* ownership passed on */ in Curl_http()1181 if(handshake) in Curl_http()1182 hyper_task_free(handshake); in Curl_http()
47 The time it took from the start until the SSL connect/handshake with the52 The time it took from the start until the SSL connect/handshake with the
22 2.11 Schannel TLS 1.2 handshake bug in old Windows versions149 2.11 Schannel TLS 1.2 handshake bug in old Windows versions151 In old versions of Windows such as 7 and 8.1 the Schannel TLS 1.2 handshake369 When using --negotiate (or NTLM) with curl on Windows, SSL/TLS handshake
Completed in 33 milliseconds