Lines Matching refs:TT
79 #define WGET_IS_HTTP (strncmp(TT.url, "http://", 7) == 0)
80 #define WGET_IS_HTTPS (WGET_SSL && (strncmp(TT.url, "https://", 8) == 0))
137 TT.sock = xconnectany(a);
142 if ((TT.tls = tls_client()) == NULL)
143 error_exit("tls_client: %s", tls_error(TT.tls));
150 if (tls_configure(TT.tls, cfg) != 0)
151 error_exit("tls_configure: %s", tls_error(TT.tls));
154 if (tls_connect(TT.tls, host, port) != 0)
155 error_exit("tls_connect: %s", tls_error(TT.tls));
162 TT.ctx = SSL_CTX_new(TLS_client_method());
163 if (!TT.ctx) error_exit("SSL_CTX_new");
167 TT.sock = xconnectany(a);
169 TT.ssl = SSL_new(TT.ctx);
170 if (!TT.ssl)
173 if (!SSL_set_tlsext_host_name(TT.ssl, host))
177 SSL_set_fd(TT.ssl, TT.sock);
178 if (SSL_connect(TT.ssl) == -1)
181 if (FLAG(d)) printf("TLS: %s\n", SSL_get_cipher(TT.ssl));
188 if (WGET_IS_HTTP) return xread(TT.sock, buf, len);
191 ssize_t ret = tls_read(TT.tls, buf, len);
192 if (ret < 0) error_exit("tls_read: %s", tls_error(TT.tls));
195 int ret = SSL_read(TT.ssl, buf, (int) len);
206 xwrite(TT.sock, buf, len);
209 if (len != tls_write(TT.tls, buf, len))
210 error_exit("tls_write: %s", tls_error(TT.tls));
212 if (len != SSL_write(TT.ssl, buf, (int) len))
220 if (TT.sock) {
221 xclose(TT.sock);
222 TT.sock = 0;
226 if (TT.tls) {
227 tls_close(TT.tls);
228 tls_free(TT.tls);
229 TT.tls = NULL;
232 if (TT.ssl) {
233 SSL_shutdown(TT.ssl);
234 SSL_free(TT.ssl);
235 TT.ssl = NULL;
238 if (TT.ctx) {
239 SSL_CTX_free(TT.ctx);
240 TT.ctx = NULL;
281 TT.url = xstrdup(toys.optargs[0]);
283 for (;status != 200; TT.redirects--) {
284 if (TT.redirects < 0) error_exit("Too many redirects");
286 wget_info(TT.url, &host, &port, &path);
318 free(TT.url);
319 TT.url = wget_redirect(toybuf);
325 TT.filename = wget_filename(toybuf, path);
326 if (!access(TT.filename, F_OK))
327 error_exit("%s already exists", TT.filename);
329 fd = xcreate(TT.filename, (O_WRONLY|O_CREAT|O_TRUNC), 0644);
387 free(TT.url);