#if defined(THREADING_SUPPORT)
static mbedtls_entropy_context entropy;
-static int entropy_init_initialized = 0;
+static int entropy_init_initialized = 0;
/* start of entropy_init_mutex() */
static void entropy_init_mutex(mbedtls_entropy_context *ctx)
#undef MBEDTLS_DEBUG
#ifdef MBEDTLS_DEBUG
-static void mbedtls_debug(void *context, int level, const char *line)
+static void mbed_debug(void *context, int level, const char *line)
{
struct SessionHandle *data = NULL;
#define PUB_DER_MAX_BYTES (RSA_PUB_DER_MAX_BYTES > ECP_PUB_DER_MAX_BYTES ? \
RSA_PUB_DER_MAX_BYTES : ECP_PUB_DER_MAX_BYTES)
-static Curl_recv mbedtls_recv;
-static Curl_send mbedtls_send;
+static Curl_recv mbed_recv;
+static Curl_send mbed_send;
static CURLcode
-mbedtls_connect_step1(struct connectdata *conn,
- int sockindex)
+mbed_connect_step1(struct connectdata *conn,
+ int sockindex)
{
struct SessionHandle *data = conn->data;
struct ssl_connect_data* connssl = &conn->ssl[sockindex];
}
static CURLcode
-mbedtls_connect_step2(struct connectdata *conn,
- int sockindex)
+mbed_connect_step2(struct connectdata *conn,
+ int sockindex)
{
int ret;
struct SessionHandle *data = conn->data;
char errorbuf[128];
errorbuf[0] = 0;
- conn->recv[sockindex] = mbedtls_recv;
- conn->send[sockindex] = mbedtls_send;
+ conn->recv[sockindex] = mbed_recv;
+ conn->send[sockindex] = mbed_send;
ret = mbedtls_ssl_handshake(&connssl->ssl);
}
static CURLcode
-mbedtls_connect_step3(struct connectdata *conn,
- int sockindex)
+mbed_connect_step3(struct connectdata *conn,
+ int sockindex)
{
CURLcode retcode = CURLE_OK;
struct ssl_connect_data *connssl = &conn->ssl[sockindex];
return CURLE_OK;
}
-static ssize_t mbedtls_send(struct connectdata *conn,
- int sockindex,
- const void *mem,
- size_t len,
- CURLcode *curlcode)
+static ssize_t mbed_send(struct connectdata *conn, int sockindex,
+ const void *mem, size_t len,
+ CURLcode *curlcode)
{
int ret = -1;
#endif /* THREADING_SUPPORT */
}
-static ssize_t mbedtls_recv(struct connectdata *conn,
- int num,
- char *buf,
- size_t buffersize,
- CURLcode *curlcode)
+static ssize_t mbed_recv(struct connectdata *conn, int num,
+ char *buf, size_t buffersize,
+ CURLcode *curlcode)
{
int ret = -1;
ssize_t len = -1;
}
static CURLcode
-mbedtls_connect_common(struct connectdata *conn,
- int sockindex,
- bool nonblocking,
- bool *done)
+mbed_connect_common(struct connectdata *conn,
+ int sockindex,
+ bool nonblocking,
+ bool *done)
{
CURLcode retcode;
struct SessionHandle *data = conn->data;
failf(data, "SSL connection timeout");
return CURLE_OPERATION_TIMEDOUT;
}
- retcode = mbedtls_connect_step1(conn, sockindex);
+ retcode = mbed_connect_step1(conn, sockindex);
if(retcode)
return retcode;
}
* ensuring that a client using select() or epoll() will always
* have a valid fdset to wait on.
*/
- retcode = mbedtls_connect_step2(conn, sockindex);
+ retcode = mbed_connect_step2(conn, sockindex);
if(retcode || (nonblocking &&
(ssl_connect_2 == connssl->connecting_state ||
ssl_connect_2_reading == connssl->connecting_state ||
} /* repeat step2 until all transactions are done. */
if(ssl_connect_3==connssl->connecting_state) {
- retcode = mbedtls_connect_step3(conn, sockindex);
+ retcode = mbed_connect_step3(conn, sockindex);
if(retcode)
return retcode;
}
if(ssl_connect_done==connssl->connecting_state) {
connssl->state = ssl_connection_complete;
- conn->recv[sockindex] = mbedtls_recv;
- conn->send[sockindex] = mbedtls_send;
+ conn->recv[sockindex] = mbed_recv;
+ conn->send[sockindex] = mbed_send;
*done = TRUE;
}
else
int sockindex,
bool *done)
{
- return mbedtls_connect_common(conn, sockindex, TRUE, done);
+ return mbed_connect_common(conn, sockindex, TRUE, done);
}
CURLcode retcode;
bool done = FALSE;
- retcode = mbedtls_connect_common(conn, sockindex, FALSE, &done);
+ retcode = mbed_connect_common(conn, sockindex, FALSE, &done);
if(retcode)
return retcode;