/curl/lib/vtls/ |
H A D | schannel.c | 1342 if(!backend->cred || !backend->ctxt) in schannel_connect_step2() 1349 backend->decdata_buffer = malloc(backend->decdata_length); in schannel_connect_step2() 1361 backend->encdata_buffer = malloc(backend->encdata_length); in schannel_connect_step2() 1369 if(backend->encdata_length - backend->encdata_offset < in schannel_connect_step2() 1440 &backend->cred->cred_handle, &backend->ctxt->ctxt_handle, in schannel_connect_step2() 1441 backend->cred->sni_hostname, backend->req_flags, in schannel_connect_step2() 1725 if(backend->ret_flags != backend->req_flags) { in schannel_connect_step3() 2141 size = backend->encdata_length - backend->encdata_offset; in schannel_recv() 2159 size = backend->encdata_length - backend->encdata_offset; in schannel_recv() 2490 if(backend->cred && backend->ctxt && !backend->sent_shutdown) { in schannel_shutdown() [all …]
|
H A D | mbedtls.c | 473 mbedtls_ssl_conf_ciphersuites(&backend->config, backend->ciphersuites); in mbed_set_selected_ciphers() 572 DEBUGASSERT(backend); 828 ret = mbedtls_ssl_setup(&backend->ssl, &backend->config); 900 &backend->clicert, &backend->pk); 974 DEBUGASSERT(backend); 1122 DEBUGASSERT(backend); 1168 DEBUGASSERT(backend); 1202 DEBUGASSERT(backend); 1287 DEBUGASSERT(backend); 1317 DEBUGASSERT(backend); [all …]
|
H A D | bearssl.c | 550 DEBUGASSERT(backend); in bearssl_connect_step1() 561 ret = load_cafile(&source, &backend->anchors, &backend->anchors_len); in bearssl_connect_step1() 575 ret = load_cafile(&source, &backend->anchors, &backend->anchors_len); in bearssl_connect_step1() 585 br_ssl_client_init_full(&backend->ctx, &backend->x509.minimal, in bearssl_connect_step1() 586 backend->anchors, backend->anchors_len); in bearssl_connect_step1() 592 br_ssl_engine_set_buffer(&backend->ctx.eng, backend->buf, in bearssl_connect_step1() 609 br_ssl_engine_set_x509(&backend->ctx.eng, &backend->x509.vtable); in bearssl_connect_step1() 631 br_ssl_engine_set_protocol_names(&backend->ctx.eng, backend->protocols, in bearssl_connect_step1() 689 DEBUGASSERT(backend); in bearssl_run_until() 767 DEBUGASSERT(backend); in bearssl_connect_step2() [all …]
|
H A D | wolfssl.c | 298 if(backend->shutting_down && backend->io_send_blocked_len && in wolfssl_bio_cf_out_write() 315 if(backend->shutting_down && !backend->io_send_blocked_len) in wolfssl_bio_cf_out_write() 722 DEBUGASSERT(backend); in wolfssl_connect_step1() 737 if(backend->ctx) in wolfssl_connect_step1() 741 if(!backend->ctx) { in wolfssl_connect_step1() 1006 if(backend->handle) in wolfssl_connect_step1() 1008 backend->handle = wolfSSL_new(backend->ctx); in wolfssl_connect_step1() 1210 DEBUGASSERT(backend); in wolfssl_connect_step2() 1452 DEBUGASSERT(backend); in wolfssl_connect_step3() 1646 if(backend->ctx) { in wolfssl_close() [all …]
|
H A D | rustls.c | 80 backend = (struct rustls_ssl_backend_data *)ctx->backend; in cr_data_pending() 204 DEBUGASSERT(backend); in cr_recv() 205 rconn = backend->conn; in cr_recv() 335 DEBUGASSERT(backend); in cr_send() 336 rconn = backend->conn; in cr_send() 547 DEBUGASSERT(backend); in cr_init_backend() 746 &backend->config); in cr_init_backend() 808 DEBUGASSERT(backend); in cr_connect_common() 812 if(!backend->conn) { in cr_connect_common() 961 DEBUGASSERT(backend); in cr_get_internals() [all …]
|
H A D | gtls.c | 252 DEBUGASSERT(backend); in handshake() 1122 DEBUGASSERT(backend); in gtls_connect_step1() 1738 DEBUGASSERT(backend); in gtls_connect_common() 1784 backend = (struct gtls_ssl_backend_data *)ctx->backend; in gtls_data_pending() 1785 if(backend->gtls.session && in gtls_data_pending() 1804 DEBUGASSERT(backend); in gtls_send() 1817 (backend->gtls.io_result ? backend->gtls.io_result : CURLE_SEND_ERROR); in gtls_send() 1850 DEBUGASSERT(backend); in gtls_shutdown() 1918 DEBUGASSERT(backend); in gtls_close() 1947 DEBUGASSERT(backend); in gtls_recv() [all …]
|
H A D | sectransp.c | 1051 DEBUGASSERT(backend); 1059 if(backend->ssl_ctx) 1070 if(backend->ssl_ctx) 1080 if(backend->ssl_ctx) 1808 DEBUGASSERT(backend); 2185 DEBUGASSERT(backend); 2190 if(!backend->ssl_ctx) 2430 DEBUGASSERT(backend); 2506 DEBUGASSERT(backend); 2539 DEBUGASSERT(backend); [all …]
|
/curl/docs/libcurl/ |
H A D | curl_global_sslset.md | 17 curl_global_sslset - select SSL backend to use 31 This function configures at runtime which SSL backend to use with 32 libcurl. This function can only be used to select an SSL backend once, and it 35 The backend can be identified by the *id* 36 (e.g. **CURLSSLBACKEND_OPENSSL**). The backend can also be specified via the 51 If the specified SSL backend is not available, the function returns 54 function again to try to select a different backend. 112 /* choose a specific backend */ 120 printf("SSL backend #%d: '%s' (ID: %d)\n", 129 If this function returns *CURLSSLSET_OK*, the backend was successfully [all …]
|
/curl/docs/libcurl/opts/ |
H A D | CURLOPT_SSL_EC_CURVES.md | 13 TLS-backend: 35 SSL handshake (if the SSL backend libcurl is built to use supports it). 45 "", embedded in SSL backend
|
H A D | CURLOPT_SSL_ENABLE_ALPN.md | 12 TLS-backend: 32 option enables/disables ALPN in the SSL handshake (if the SSL backend libcurl
|
H A D | CURLOPT_SSL_ENABLE_NPN.md | 12 TLS-backend: 34 option enables/disables NPN in the SSL handshake (if the SSL backend libcurl
|
H A D | CURLOPT_SSLENGINE_DEFAULT.md | 12 TLS-backend: 67 CURLE_NOT_BUILT_IN - Option not built in, OpenSSL is not the SSL backend.
|
H A D | CURLOPT_SSL_FALSESTART.md | 11 TLS-backend: 61 Returns CURLE_OK if false start is supported by the SSL backend, otherwise
|
H A D | CURLOPT_SSL_VERIFYSTATUS.md | 13 TLS-backend: 68 Returns CURLE_OK if OCSP stapling is supported by the SSL backend, otherwise
|
H A D | CURLOPT_DOH_SSL_VERIFYSTATUS.md | 13 TLS-backend: 76 Returns CURLE_OK if OCSP stapling is supported by the SSL backend, otherwise
|
H A D | CURLOPT_SSLENGINE.md | 13 TLS-backend: 74 CURLE_NOT_BUILT_IN - Option not built in, OpenSSL is not the SSL backend.
|
H A D | CURLINFO_TLS_SESSION.md | 13 TLS-backend: 39 case of OpenSSL. If the session *backend* is CURLSSLBACKEND_OPENSSL the
|
H A D | CURLOPT_DNS_INTERFACE.md | 66 This option requires that libcurl was built with a resolver backend that 67 supports this operation. The c-ares backend is the only such one.
|
H A D | CURLOPT_DNS_SERVERS.md | 70 This option requires that libcurl was built with a resolver backend that 71 supports this operation. The c-ares backend is the only such one.
|
H A D | CURLINFO_TLS_SSL_PTR.md | 13 TLS-backend: 56 curl_sslbackend backend; 61 The *backend* struct member is one of the defines in the CURLSSLBACKEND_* 101 If the *internals* pointer is NULL then either the SSL backend is not 151 if(CURLSSLBACKEND_OPENSSL == info->backend) {
|
H A D | CURLOPT_RESOLVER_START_FUNCTION.md | 39 *resolver_state* points to a backend-specific resolver state. Currently only 40 the ares resolver backend has a resolver state. It can be used to set up any
|
H A D | CURLOPT_DNS_LOCAL_IP4.md | 65 This option requires that libcurl was built with a resolver backend that 66 supports this operation. The c-ares backend is the only such one.
|
H A D | CURLOPT_DNS_LOCAL_IP6.md | 65 This option requires that libcurl was built with a resolver backend that 66 supports this operation. The c-ares backend is the only such one.
|
/curl/docs/cmdline-opts/ |
H A D | ssl-reqd.md | 24 OpenLDAP backend and rejected by the generic ldap backend if explicit TLS is
|
H A D | ssl.md | 29 OpenLDAP backend and ignored by the generic ldap backend.
|