return result;
}
- if(conn->handler->protocol & CURLPROTO_FTPS) {
+ if(conn->handler->flags & PROTOPT_SSL) {
/* BLOCKING */
- /* FTPS is simply ftp with SSL for the control channel */
- /* now, perform the SSL initialization for this socket */
result = Curl_ssl_connect(conn, FIRSTSOCKET);
if(result)
return result;
return res;
}
- if(conn->handler->protocol & CURLPROTO_HTTPS) {
+ if(conn->handler->flags & PROTOPT_SSL) {
/* We never send more than CURL_MAX_WRITE_SIZE bytes in one single chunk
when we speak HTTPS, as if only a fraction of it is sent now, this data
needs to fit into the normal read-callback buffer later on and that
}
#endif /* CURL_DISABLE_PROXY */
- if(conn->given->protocol & CURLPROTO_HTTPS) {
+ if(conn->given->flags & PROTOPT_SSL) {
/* perform SSL initialization */
if(data->state.used_interface == Curl_if_multi) {
result = https_connecting(conn, done);
static CURLcode https_connecting(struct connectdata *conn, bool *done)
{
CURLcode result;
- DEBUGASSERT((conn) && (conn->handler->protocol & CURLPROTO_HTTPS));
+ DEBUGASSERT((conn) && (conn->handler->flags & PROTOPT_SSL));
/* perform SSL initialization for this socket */
result = Curl_ssl_connect_nonblocking(conn, FIRSTSOCKET, done);
curl_socket_t *socks,
int numsocks)
{
- if(conn->handler->protocol & CURLPROTO_HTTPS) {
+ if(conn->handler->flags & PROTOPT_SSL) {
struct ssl_connect_data *connssl = &conn->ssl[FIRSTSOCKET];
if(!numsocks)
struct imap_conn *imapc = &conn->proto.imapc;
CURLcode result;
- if((conn->handler->protocol & CURLPROTO_IMAPS) && !imapc->ssldone) {
+ if((conn->handler->flags & PROTOPT_SSL) && !imapc->ssldone)
result = Curl_ssl_connect_nonblocking(conn, FIRSTSOCKET, &imapc->ssldone);
- }
- else {
+ else
result = Curl_pp_multi_statemach(&imapc->pp);
- }
*done = (bool)(imapc->state == IMAP_STOP);
return result;
}
- if((conn->handler->protocol & CURLPROTO_IMAPS) &&
+ if((conn->handler->flags & PROTOPT_SSL) &&
data->state.used_interface != Curl_if_multi) {
/* BLOCKING */
- /* IMAPS is simply imap with SSL for the control channel */
- /* now, perform the SSL initialization for this socket */
result = Curl_ssl_connect(conn, FIRSTSOCKET);
if(result)
return result;
}
/* Get the URL scheme ( either ldap or ldaps ) */
- if(conn->given->protocol & CURLPROTO_LDAPS)
+ if(conn->given->flags & PROTOPT_SSL)
ldap_ssl = 1;
infof(data, "LDAP local: trying to establish %s connection\n",
ldap_ssl ? "encrypted" : "cleartext");
return result;
}
- if(conn->handler->protocol & CURLPROTO_POP3S) {
+ if(conn->handler->flags & PROTOPT_SSL) {
/* BLOCKING */
- /* POP3S is simply pop3 with SSL for the control channel */
- /* now, perform the SSL initialization for this socket */
result = Curl_ssl_connect(conn, FIRSTSOCKET);
if(result)
return result;
struct smtp_conn *smtpc = &conn->proto.smtpc;
CURLcode result;
- if((conn->handler->protocol & CURLPROTO_SMTPS) && !smtpc->ssldone) {
+ if((conn->handler->flags & PROTOPT_SSL) && !smtpc->ssldone)
result = Curl_ssl_connect_nonblocking(conn, FIRSTSOCKET, &smtpc->ssldone);
- }
- else {
+ else
result = Curl_pp_multi_statemach(&smtpc->pp);
- }
*done = (bool)(smtpc->state == SMTP_STOP);