Lines Matching refs:data

75   /* buffer for DN data */
84 const char *data;
131 fp = fopen(source->data, "rb");
154 p = (unsigned char *) source->data;
197 ta->dn.data = NULL;
208 /* calculate space needed for trust anchor data */
222 /* fill in trust anchor DN and public key data */
223 ta->dn.data = malloc(ta_size);
224 if(!ta->dn.data) {
228 memcpy(ta->dn.data, ca.dn, ca.dn_len);
232 ta->pkey.key.rsa.n = ta->dn.data + ta->dn.len;
238 ta->pkey.key.ec.q = ta->dn.data + ta->dn.len;
263 free(ca.anchors[i].dn.data);
369 /* Macro to initialize st_cipher data structure */
506 static CURLcode bearssl_set_selected_ciphers(struct Curl_easy *data,
551 infof(data, "BearSSL: unknown cipher in list: %.*s",
560 infof(data, "BearSSL: duplicate cipher in list: %.*s",
571 failf(data, "BearSSL: no supported cipher in list");
580 struct Curl_easy *data)
586 struct ssl_config_data *ssl_config = Curl_ssl_cf_get_config(cf, data);
599 CURL_TRC_CF(data, cf, "connect_step1");
603 failf(data, "BearSSL does not support SSLv2");
606 failf(data, "BearSSL does not support SSLv3");
626 failf(data, "BearSSL: unknown CURLOPT_SSLVERSION");
634 source.data = ca_info_blob->data;
637 CURL_TRC_CF(data, cf, "connect_step1, load ca_info_blob");
640 failf(data, "error importing CA certificate blob");
648 source.data = ssl_cafile;
651 CURL_TRC_CF(data, cf, "connect_step1, load cafile");
654 failf(data, "error setting certificate verify locations."
671 CURL_TRC_CF(data, cf, "connect_step1, set ciphers");
672 ret = bearssl_set_selected_ciphers(data, &backend->ctx.eng,
687 CURL_TRC_CF(data, cf, "connect_step1, check session cache");
688 Curl_ssl_sessionid_lock(data);
689 if(!Curl_ssl_getsessionid(cf, data, &session, NULL)) {
692 infof(data, "BearSSL: reusing session ID");
694 Curl_ssl_sessionid_unlock(data);
707 infof(data, VTLS_INFOF_ALPN_OFFER_1STR, proto.data);
712 failf(data, "BearSSL: "
720 failf(data, "Failed to set SNI");
724 CURL_TRC_CF(data, cf, "connect_step1, SNI set");
728 if(data->set.ssl.fsslctx) {
729 Curl_set_in_callback(data, true);
730 ret = (*data->set.ssl.fsslctx)(data, &backend->ctx,
731 data->set.ssl.fsslctxp);
732 Curl_set_in_callback(data, false);
734 failf(data, "BearSSL: error signaled by ssl ctx callback");
749 struct Curl_easy *data,
753 curl_socket_t sock = Curl_conn_cf_get_socket(cf->next, data);
761 Curl_pollset_set_out_only(data, ps, sock);
764 Curl_pollset_set_in_only(data, ps, sock);
771 struct Curl_easy *data,
794 failf(data, "SSL: connection closed during handshake");
799 failf(data, "SSL: X.509 verification: "
803 failf(data, "SSL: X.509 verification: "
807 failf(data, "SSL: X.509 verification: "
820 ret = Curl_conn_cf_send(cf->next, data, (char *)buf, len, &result);
821 CURL_TRC_CF(data, cf, "ssl_send(len=%zu) -> %zd, %d", len, ret, result);
829 ret = Curl_conn_cf_recv(cf->next, data, (char *)buf, len, &result);
830 CURL_TRC_CF(data, cf, "ssl_recv(len=%zu) -> %zd, %d", len, ret, result);
832 failf(data, "SSL: EOF without close notify");
844 struct Curl_easy *data)
852 CURL_TRC_CF(data, cf, "connect_step2");
854 ret = bearssl_run_until(cf, data, BR_SSL_SENDAPP | BR_SSL_RECVAPP);
860 failf(data, "SSL: connection closed during handshake");
867 infof(data, "SSL connection using TLSv1.2");
869 infof(data, "SSL connection using TLSv1.3");
871 infof(data, "SSL connection using TLS 0x%x", tver);
877 struct Curl_easy *data)
882 struct ssl_config_data *ssl_config = Curl_ssl_cf_get_config(cf, data);
887 CURL_TRC_CF(data, cf, "connect_step3");
893 Curl_alpn_set_negotiated(cf, data, (const unsigned char *)proto,
907 Curl_ssl_sessionid_lock(data);
908 incache = !(Curl_ssl_getsessionid(cf, data, &oldsession, NULL));
910 Curl_ssl_delsessionid(data, oldsession);
911 ret = Curl_ssl_addsessionid(cf, data, session, 0, &added);
912 Curl_ssl_sessionid_unlock(data);
925 static ssize_t bearssl_send(struct Curl_cfilter *cf, struct Curl_easy *data,
937 *err = bearssl_run_until(cf, data, BR_SSL_SENDAPP);
942 failf(data, "SSL: connection closed during write");
960 static ssize_t bearssl_recv(struct Curl_cfilter *cf, struct Curl_easy *data,
971 *err = bearssl_run_until(cf, data, BR_SSL_RECVAPP);
986 struct Curl_easy *data,
992 curl_socket_t sockfd = Curl_conn_cf_get_socket(cf, data);
996 CURL_TRC_CF(data, cf, "connect_common(blocking=%d)", !nonblocking);
999 CURL_TRC_CF(data, cf, "connect_common, connected");
1005 ret = bearssl_connect_step1(cf, data);
1014 timeout_ms = Curl_timeleft(data, NULL, TRUE);
1018 failf(data, "SSL connection timeout");
1031 CURL_TRC_CF(data, cf, "connect_common, check socket");
1034 CURL_TRC_CF(data, cf, "connect_common, check socket -> %d", what);
1037 failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO);
1047 failf(data, "SSL connection timeout");
1060 ret = bearssl_connect_step2(cf, data);
1069 ret = bearssl_connect_step3(cf, data);
1093 const struct Curl_easy *data)
1098 (void)data;
1104 static CURLcode bearssl_random(struct Curl_easy *data UNUSED_PARAM,
1125 struct Curl_easy *data)
1130 ret = bearssl_connect_common(cf, data, FALSE, &done);
1140 struct Curl_easy *data,
1143 return bearssl_connect_common(cf, data, TRUE, done);
1155 static void bearssl_close(struct Curl_cfilter *cf, struct Curl_easy *data)
1167 (void)bearssl_run_until(cf, data, BR_SSL_CLOSED);
1171 free(backend->anchors[i].dn.data);
1222 bearssl_recv, /* recv decrypted data */
1223 bearssl_send, /* send data to encrypt */