Home | History | Annotate | Download | only in vtls

Lines Matching refs:backend

89 #define BACKEND connssl->backend
448 if(insert_wrapped_ptr(&BACKEND->obj_list, obj) != CURLE_OK) {
455 BACKEND->obj_clicert = obj;
1030 struct Curl_easy *data = BACKEND->data;
1038 BACKEND->handle);
1082 struct Curl_easy *data = BACKEND->data;
1083 const char *nickname = BACKEND->client_nickname;
1086 if(BACKEND->obj_clicert) {
1099 if(PK11_ReadRawAttribute(PK11_TypeGeneric, BACKEND->obj_clicert, CKA_VALUE,
1446 PR_Recv(BACKEND->handle, (void *)&buf, 1, PR_MSG_PEEK,
1460 const bool client_cert = (BACKEND->client_nickname != NULL)
1461 || (BACKEND->obj_clicert != NULL);
1463 free(BACKEND->client_nickname);
1464 BACKEND->client_nickname = NULL;
1467 Curl_llist_destroy(&BACKEND->obj_list, NULL);
1468 BACKEND->obj_clicert = NULL;
1470 if(BACKEND->handle) {
1476 SSL_InvalidateSession(BACKEND->handle);
1478 PR_Close(BACKEND->handle);
1479 BACKEND->handle = NULL;
1491 if(BACKEND->handle || connssl_proxy->backend->handle) {
1498 if(BACKEND->handle)
1500 connssl_proxy->backend->handle if both are used. Clear it to avoid
1502 connssl_proxy->backend->handle = NULL;
1746 Curl_llist_destroy(&BACKEND->obj_list, NULL);
1760 if(PR_SetSocketOption(BACKEND->handle, &sock_opt) != PR_SUCCESS)
1784 BACKEND->data = data;
1787 Curl_llist_init(&BACKEND->obj_list, nss_destroy_object);
1896 BACKEND->obj_clicert = NULL;
1909 BACKEND->client_nickname = nickname;
1912 BACKEND->client_nickname = NULL;
1922 DEBUGASSERT(conn->proxy_ssl[sockindex].backend->handle != NULL);
1923 nspr_io = conn->proxy_ssl[sockindex].backend->handle;
1953 BACKEND->handle = SSL_ImportFD(model, nspr_io);
1954 if(!BACKEND->handle) {
1965 SSL_SetPKCS11PinArg(BACKEND->handle, SSL_SET_OPTION(key_passwd));
1970 if(SSL_OptionSet(BACKEND->handle, SSL_ENABLE_OCSP_STAPLING, PR_TRUE)
1977 if(SSL_OptionSet(BACKEND->handle, SSL_ENABLE_NPN, conn->bits.tls_enable_npn
1983 if(SSL_OptionSet(BACKEND->handle, SSL_ENABLE_ALPN, conn->bits.tls_enable_alpn
1990 if(SSL_OptionSet(BACKEND->handle, SSL_ENABLE_FALSE_START, PR_TRUE)
1994 if(SSL_SetCanFalseStartCallback(BACKEND->handle, CanFalseStartCallback,
2018 if(SSL_SetNextProtoNego(BACKEND->handle, protocols, cur) != SECSuccess)
2025 if(SSL_ResetHandshake(BACKEND->handle, /* asServer */ PR_FALSE)
2030 if(SSL_SetURL(BACKEND->handle, SSL_IS_PROXY() ? conn->http_proxy.host.name :
2035 if(SSL_SetSockPeerID(BACKEND->handle, SSL_IS_PROXY() ?
2072 if(SSL_ForceHandshakeWithTimeout(BACKEND->handle, timeout) != SECSuccess) {
2083 result = display_conn_info(conn, BACKEND->handle);
2092 ret = check_issuer_cert(BACKEND->handle, nickname);
2200 BACKEND->data = conn->data;
2202 rc = PR_Send(BACKEND->handle, mem, (int)len, 0, PR_INTERVAL_NO_WAIT);
2237 BACKEND->data = conn->data;
2239 nread = PR_Recv(BACKEND->handle, buf, (int)buffersize, 0,
2342 return BACKEND->handle;