infof(data, "\t MAC: %s\n", ptr);
conn->ssl[sockindex].state = ssl_connection_complete;
- conn->recv = gtls_recv;
- conn->send = gtls_send;
+ conn->recv[sockindex] = gtls_recv;
+ conn->send[sockindex] = gtls_send;
{
/* we always unconditionally get the session id here, as even if we
}
connssl->state = ssl_connection_complete;
- conn->recv = nss_recv;
- conn->send = nss_send;
+ conn->recv[sockindex] = nss_recv;
+ conn->send[sockindex] = nss_send;
display_conn_info(conn, connssl->handle);
}
conn->ssl[sockindex].state = ssl_connection_complete;
- conn->recv = polarssl_recv;
- conn->send = polarssl_send;
+ conn->recv[sockindex] = polarssl_recv;
+ conn->send[sockindex] = polarssl_send;
/* Save the current session data for possible re-use */
{
}
if (rc == CURLE_OK) {
connssl->state = ssl_connection_complete;
- conn->recv = qsossl_recv;
- conn->send = qsossl_send;
+ conn->recv[sockindex] = qsossl_recv;
+ conn->send[sockindex] = qsossl_send;
}
return rc;
conn->mech = *m;
conn->sec_complete = 1;
if (conn->data_prot != prot_clear) {
- conn->recv = sec_read;
- conn->send = _sec_send;
+ conn->recv[FIRSTSOCKET] = sec_read;
+ conn->send[FIRSTSOCKET] = _sec_send;
+ conn->recv[SECONDARYSOCKET] = sec_read;
+ conn->send[SECONDARYSOCKET] = _sec_send;
}
conn->command_prot = prot_safe;
/* Set the requested protection level */
CURLcode curlcode = CURLE_OK;
int num = (sockfd == conn->sock[SECONDARYSOCKET]);
- bytes_written = conn->send(conn, num, mem, len, &curlcode);
+ bytes_written = conn->send[num](conn, num, mem, len, &curlcode);
*written = bytes_written;
if(-1 != bytes_written)
buffertofill = buf;
}
- nread = conn->recv(conn, num, buffertofill, bytesfromsocket, &curlcode);
+ nread = conn->recv[num](conn, num, buffertofill, bytesfromsocket, &curlcode);
if(nread == -1)
return curlcode;
return result;
if(conn->protocol & PROT_SCP) {
- conn->recv = scp_recv;
- conn->send = scp_send;
+ conn->recv[FIRSTSOCKET] = scp_recv;
+ conn->send[FIRSTSOCKET] = scp_send;
} else {
- conn->recv = sftp_recv;
- conn->send = sftp_send;
+ conn->recv[FIRSTSOCKET] = sftp_recv;
+ conn->send[FIRSTSOCKET] = sftp_send;
}
ssh = &conn->proto.sshc;
if(ssl_connect_done==connssl->connecting_state) {
connssl->state = ssl_connection_complete;
- conn->recv = ossl_recv;
- conn->send = ossl_send;
+ conn->recv[sockindex] = ossl_recv;
+ conn->send[sockindex] = ossl_send;
*done = TRUE;
}
else
return result;
}
- conn->recv = Curl_recv_plain;
- conn->send = Curl_send_plain;
+ conn->recv[FIRSTSOCKET] = Curl_recv_plain;
+ conn->send[FIRSTSOCKET] = Curl_send_plain;
+ conn->recv[SECONDARYSOCKET] = Curl_recv_plain;
+ conn->send[SECONDARYSOCKET] = Curl_send_plain;
/***********************************************************************
* file: is a special case in that it doesn't need a network connection
curl_socket_t sock[2]; /* two sockets, the second is used for the data
transfer when doing FTP */
- Curl_recv *recv;
- Curl_send *send;
+ Curl_recv *recv[2];
+ Curl_send *send[2];
struct ssl_connect_data ssl[2]; /* this is for ssl-stuff */
struct ssl_config_data ssl_config;