Lines Matching refs:data

288   struct Curl_easy *data = CF_DATA_CURRENT(cf);
292 DEBUGASSERT(data);
293 nwritten = Curl_conn_cf_send(cf->next, data, buf, blen, &result);
295 CURL_TRC_CF(data, cf, "bio_write(len=%d) -> %zd, %d",
309 struct Curl_easy *data = CF_DATA_CURRENT(cf);
313 DEBUGASSERT(data);
318 nread = Curl_conn_cf_recv(cf->next, data, buf, blen, &result);
320 CURL_TRC_CF(data, cf, "bio_read(len=%d) -> %zd, %d", blen, nread, result);
356 wolfssl_connect_step1(struct Curl_cfilter *cf, struct Curl_easy *data)
364 const struct ssl_config_data *ssl_config = Curl_ssl_cf_get_config(cf, data);
389 failf(data, "wolfSSL does not support to set maximum SSL/TLS version");
401 infof(data, "wolfSSL <3.3.0 cannot be configured to use TLS 1.0-1.2, "
412 failf(data, "wolfSSL does not support TLS 1.0");
421 failf(data, "wolfSSL does not support TLS 1.1");
430 failf(data, "wolfSSL does not support TLS 1.2");
440 failf(data, "wolfSSL: TLS 1.3 is not yet supported");
444 failf(data, "Unrecognized parameter passed via CURLOPT_SSLVERSION");
449 failf(data, "SSL: couldn't create a method");
458 failf(data, "SSL: couldn't create a context");
479 failf(data, "SSL: couldn't set the minimum protocol version");
490 failf(data, "failed setting cipher list: %s", ciphers);
493 infof(data, "Cipher selection: %s", ciphers);
511 failf(data, "failed setting curves list: '%s'", curves);
521 infof(data, "error importing native CA store, continuing anyway");
525 infof(data, "successfully imported native CA store");
532 if(wolfSSL_CTX_load_verify_buffer(backend->ctx, ca_info_blob->data,
536 infof(data, "error importing CA certificate blob, continuing anyway");
539 failf(data, "error importing CA certificate blob");
545 infof(data, "successfully imported CA certificate blob");
561 failf(data, "error setting certificate verify locations:"
570 infof(data, "error setting certificate verify locations,"
576 infof(data, "successfully set certificate verify locations:");
578 infof(data, " CAfile: %s", ssl_cafile ? ssl_cafile : "none");
579 infof(data, " CApath: %s", ssl_capath ? ssl_capath : "none");
590 failf(data, "unable to use client certificate");
598 failf(data, "unable to use client certificate");
603 failf(data, "unknown cert type");
610 failf(data, "unable to set private key");
631 failf(data, "Failed to set SNI");
639 if(data->set.ssl.fsslctx) {
640 CURLcode result = (*data->set.ssl.fsslctx)(data, backend->ctx,
641 data->set.ssl.fsslctxp);
643 failf(data, "error signaled by ssl ctx callback");
649 failf(data, "SSL: Certificates can't be loaded because wolfSSL was built"
662 failf(data, "SSL: couldn't create a handle");
669 failf(data, "unable to use oqs KEM");
681 wolfSSL_UseALPN(backend->handle, (char *)proto.data, proto.len,
683 failf(data, "SSL: failed setting ALPN protocols");
686 infof(data, VTLS_INFOF_ALPN_OFFER_1STR, proto.data);
703 failf(data, "SSL: failed setting secure renegotiation");
712 Curl_ssl_sessionid_lock(data);
713 if(!Curl_ssl_getsessionid(cf, data, &ssl_sessionid, NULL)) {
716 Curl_ssl_delsessionid(data, ssl_sessionid);
717 infof(data, "Can't use session ID, going on without");
720 infof(data, "SSL reusing session ID");
722 Curl_ssl_sessionid_unlock(data);
739 (int)Curl_conn_cf_get_socket(cf, data))) {
740 failf(data, "SSL: SSL_set_fd failed");
751 wolfssl_connect_step2(struct Curl_cfilter *cf, struct Curl_easy *data)
759 data->set.str[STRING_SSL_PINNEDPUBLICKEY_PROXY]:
760 data->set.str[STRING_SSL_PINNEDPUBLICKEY];
817 failf(data, " subject alt name(s) or common name do not match \"%s\"",
828 failf(data,
834 infof(data,
844 failf(data, " CA signer not available for verification");
850 infof(data, "CA signer not available for verification, "
859 failf(data, "SSL_connect failed with error %d: %s", detail,
876 failf(data, "SSL: failed retrieving server certificate");
882 failf(data, "SSL: failed retrieving ASN.1 server certificate");
892 failf(data, "SSL: failed retrieving public key from server certificate");
896 result = Curl_pin_peer_pubkey(data,
902 failf(data, "SSL: public key does not match pinned public key");
906 failf(data, "Library lacks pinning support built-in");
920 Curl_alpn_set_negotiated(cf, data, (const unsigned char *)protocol,
924 Curl_alpn_set_negotiated(cf, data, NULL, 0);
926 failf(data, "ALPN, failure getting protocol, error %d", rc);
934 infof(data, "SSL connection using %s / %s",
938 infof(data, "SSL connected");
946 wolfssl_connect_step3(struct Curl_cfilter *cf, struct Curl_easy *data)
952 const struct ssl_config_data *ssl_config = Curl_ssl_cf_get_config(cf, data);
965 Curl_ssl_sessionid_lock(data);
966 incache = !(Curl_ssl_getsessionid(cf, data, &old_ssl_sessionid, NULL));
969 infof(data, "old SSL session ID is stale, removing");
970 Curl_ssl_delsessionid(data, old_ssl_sessionid);
976 result = Curl_ssl_addsessionid(cf, data, our_ssl_sessionid, 0, NULL);
978 Curl_ssl_sessionid_unlock(data);
980 failf(data, "failed to store ssl session");
987 Curl_ssl_sessionid_unlock(data);
1003 struct Curl_easy *data,
1026 /* there's data pending, re-invoke SSL_write() */
1027 CURL_TRC_CF(data, cf, "wolfssl_send(len=%zu) -> AGAIN", len);
1032 CURL_TRC_CF(data, cf, "wolfssl_send(len=%zu) -> AGAIN", len);
1036 CURL_TRC_CF(data, cf, "wolfssl_send(len=%zu) -> %d, %d", len, rc, err);
1037 failf(data, "SSL write: %s, errno %d",
1044 CURL_TRC_CF(data, cf, "wolfssl_send(len=%zu) -> %d", len, rc);
1048 static void wolfssl_close(struct Curl_cfilter *cf, struct Curl_easy *data)
1054 (void) data;
1074 struct Curl_easy *data,
1096 case SSL_ERROR_ZERO_RETURN: /* no more data */
1097 CURL_TRC_CF(data, cf, "wolfssl_recv(len=%zu) -> CLOSED", blen);
1103 /* there's data pending, re-invoke wolfSSL_read() */
1104 CURL_TRC_CF(data, cf, "wolfssl_recv(len=%zu) -> AGAIN", blen);
1109 CURL_TRC_CF(data, cf, "wolfssl_recv(len=%zu) -> AGAIN", blen);
1113 failf(data, "SSL read: %s, errno %d",
1119 CURL_TRC_CF(data, cf, "wolfssl_recv(len=%zu) -> %d", blen, nread);
1164 const struct Curl_easy *data)
1169 (void)data;
1185 struct Curl_easy *data)
1191 (void)data;
1206 struct Curl_easy *data,
1212 curl_socket_t sockfd = Curl_conn_cf_get_socket(cf, data);
1223 const timediff_t timeout_ms = Curl_timeleft(data, NULL, TRUE);
1227 failf(data, "SSL connection timeout");
1231 result = wolfssl_connect_step1(cf, data);
1241 const timediff_t timeout_ms = Curl_timeleft(data, NULL, TRUE);
1245 failf(data, "SSL connection timeout");
1262 failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO);
1272 failf(data, "SSL connection timeout");
1286 result = wolfssl_connect_step2(cf, data);
1295 result = wolfssl_connect_step3(cf, data);
1315 struct Curl_easy *data,
1318 return wolfssl_connect_common(cf, data, TRUE, done);
1323 struct Curl_easy *data)
1328 result = wolfssl_connect_common(cf, data, FALSE, &done);
1337 static CURLcode wolfssl_random(struct Curl_easy *data,
1341 (void)data;
1415 wolfssl_recv, /* recv decrypted data */
1416 wolfssl_send, /* send data to encrypt */