{
(void)data;
/* First determine if ssl */
- if(Curl_ssl_use(conn, FIRSTSOCKET)) {
+ if(Curl_conn_is_ssl(data, FIRSTSOCKET)) {
/* use the SSL context */
if(!Curl_ssl_check_cxn(data, conn))
return false; /* FIN received */
result = is_connected(data, conn, sockindex, done);
if(!result && *done) {
Curl_pgrsTime(data, TIMER_CONNECT); /* we're connected already */
- if(Curl_ssl_use(conn, FIRSTSOCKET) ||
+ if(Curl_conn_is_ssl(data, FIRSTSOCKET) ||
(conn->handler->protocol & PROTO_FAMILY_SSH))
Curl_pgrsTime(data, TIMER_APPCONNECT); /* we're connected already */
post_connect(data, conn, sockindex);
line += wordlen;
}
}
- else if(data->set.use_ssl && !Curl_ssl_use(conn, FIRSTSOCKET)) {
+ else if(data->set.use_ssl && !Curl_conn_is_ssl(data, FIRSTSOCKET)) {
/* PREAUTH is not compatible with STARTTLS. */
if(imapcode == IMAP_RESP_OK && imapc->tls_supported && !imapc->preauth) {
/* Switch to TLS connection now */
if(pop3code != '+')
pop3c->authtypes |= POP3_TYPE_CLEARTEXT;
- if(!data->set.use_ssl || Curl_ssl_use(conn, FIRSTSOCKET))
+ if(!data->set.use_ssl || Curl_conn_is_ssl(data, FIRSTSOCKET))
result = pop3_perform_authentication(data, conn);
else if(pop3code == '+' && pop3c->tls_supported)
/* Switch to TLS connection now */
(void)instate; /* no use for this yet */
if(smtpcode/100 != 2 && smtpcode != 1) {
- if(data->set.use_ssl <= CURLUSESSL_TRY || Curl_ssl_use(conn, FIRSTSOCKET))
+ if(data->set.use_ssl <= CURLUSESSL_TRY
+ || Curl_conn_is_ssl(data, FIRSTSOCKET))
result = smtp_perform_helo(data, conn);
else {
failf(data, "Remote access denied: %d", smtpcode);
}
if(smtpcode != 1) {
- if(data->set.use_ssl && !Curl_ssl_use(conn, FIRSTSOCKET)) {
+ if(data->set.use_ssl && !Curl_conn_is_ssl(data, FIRSTSOCKET)) {
/* We don't have a SSL/TLS connection yet, but SSL is requested */
if(smtpc->tls_supported)
/* Switch to TLS connection now */
return result;
}
-bool Curl_ssl_use(struct connectdata *conn, int sockindex)
-{
- return Curl_ssl_cf_get_ssl(conn->cfilter[sockindex]) != NULL;
-}
-
CURLcode Curl_ssl_cfilter_remove(struct Curl_easy *data,
int sockindex)
{
struct Curl_cfilter *Curl_ssl_cf_get_ssl(struct Curl_cfilter *cf)
{
- struct Curl_cfilter *cfn;
-
- for(cfn = cf->next; cfn; cfn = cfn->next) {
- if(cfn->cft == &cft_ssl || cfn->cft == &cft_ssl_proxy)
- return cfn;
+ for(; cf; cf = cf->next) {
+ if(cf->cft == &cft_ssl || cf->cft == &cft_ssl_proxy)
+ return cf;
}
return NULL;
}
void *Curl_ssl_get_internals(struct Curl_easy *data, int sockindex,
CURLINFO info, int n);
-bool Curl_ssl_use(struct connectdata *conn, int sockindex);
-
#else /* if not USE_SSL */
/* When SSL support is not present, just define away these function calls */
#define Curl_ssl_false_start(a) FALSE
#define Curl_ssl_get_internals(a,b,c,d) NULL
#define Curl_ssl_supports(a,b) FALSE
-#define Curl_ssl_use(a,b) FALSE
#define Curl_ssl_cfilter_add(a,b,c) CURLE_NOT_BUILT_IN
#define Curl_ssl_cfilter_proxy_add(a,b,c) CURLE_NOT_BUILT_IN
#define Curl_ssl_get_config(a,b) NULL