Symbol: http
sbin/unwind/libunbound/services/authzone.c
3740
if(master->allow_notify && !master->http &&
sbin/unwind/libunbound/services/authzone.c
5244
if(xfr->task_transfer->master->http) {
sbin/unwind/libunbound/services/authzone.c
5308
if(xfr->task_transfer->master->http) {
sbin/unwind/libunbound/services/authzone.c
5526
if(master->http) {
sbin/unwind/libunbound/services/authzone.c
6374
if(master->http) return 0; /* only masters get SOA UDP probe,
sbin/unwind/libunbound/services/authzone.c
6552
xfr->task_transfer->masters->http)
sbin/unwind/libunbound/services/authzone.c
6616
if(master->allow_notify && !master->http &&
sbin/unwind/libunbound/services/authzone.c
7310
m->http = 1;
sbin/unwind/libunbound/services/authzone.h
454
int http;
usr.sbin/acme-client/http.c
128
http_read(char *buf, size_t sz, const struct http *http)
usr.sbin/acme-client/http.c
134
if ((ssz = dotlsread(buf, sz, http)) < 0)
usr.sbin/acme-client/http.c
147
http_write(const char *buf, size_t sz, const struct http *http)
usr.sbin/acme-client/http.c
153
if ((ssz = dotlswrite(buf, sz, http)) < 0)
usr.sbin/acme-client/http.c
162
http_disconnect(struct http *http)
usr.sbin/acme-client/http.c
166
if (http->ctx != NULL) {
usr.sbin/acme-client/http.c
169
rc = tls_close(http->ctx);
usr.sbin/acme-client/http.c
172
tls_free(http->ctx);
usr.sbin/acme-client/http.c
174
if (http->fd != -1) {
usr.sbin/acme-client/http.c
175
if (close(http->fd) == -1)
usr.sbin/acme-client/http.c
176
warn("%s: close", http->src.ip);
usr.sbin/acme-client/http.c
179
http->fd = -1;
usr.sbin/acme-client/http.c
180
http->ctx = NULL;
usr.sbin/acme-client/http.c
184
http_free(struct http *http)
usr.sbin/acme-client/http.c
187
if (http == NULL)
usr.sbin/acme-client/http.c
189
http_disconnect(http);
usr.sbin/acme-client/http.c
190
free(http->host);
usr.sbin/acme-client/http.c
191
free(http->path);
usr.sbin/acme-client/http.c
192
free(http->src.ip);
usr.sbin/acme-client/http.c
193
free(http);
usr.sbin/acme-client/http.c
196
struct http *
usr.sbin/acme-client/http.c
204
struct http *http;
usr.sbin/acme-client/http.c
257
http = calloc(1, sizeof(struct http));
usr.sbin/acme-client/http.c
258
if (http == NULL) {
usr.sbin/acme-client/http.c
263
http->fd = fd;
usr.sbin/acme-client/http.c
264
http->port = port;
usr.sbin/acme-client/http.c
265
http->src.family = addrs[cur].family;
usr.sbin/acme-client/http.c
266
http->src.ip = strdup(addrs[cur].ip);
usr.sbin/acme-client/http.c
267
http->host = strdup(host);
usr.sbin/acme-client/http.c
268
http->path = strdup(path);
usr.sbin/acme-client/http.c
269
if (http->src.ip == NULL || http->host == NULL || http->path == NULL) {
usr.sbin/acme-client/http.c
274
if ((http->ctx = tls_client()) == NULL) {
usr.sbin/acme-client/http.c
277
} else if (tls_configure(http->ctx, tlscfg) == -1) {
usr.sbin/acme-client/http.c
279
http->src.ip, tls_error(http->ctx));
usr.sbin/acme-client/http.c
283
if (tls_connect_socket(http->ctx, http->fd, http->host) != 0) {
usr.sbin/acme-client/http.c
284
warnx("%s: tls_connect_socket: %s, %s", http->src.ip,
usr.sbin/acme-client/http.c
285
http->host, tls_error(http->ctx));
usr.sbin/acme-client/http.c
289
return http;
usr.sbin/acme-client/http.c
291
http_free(http);
usr.sbin/acme-client/http.c
296
http_open(const struct http *http, int headreq, const void *p, size_t psz)
usr.sbin/acme-client/http.c
303
if (http->port != 443) {
usr.sbin/acme-client/http.c
304
int rv = snprintf(port, sizeof(port), ":%d", http->port);
usr.sbin/acme-client/http.c
318
http->path, http->host, port);
usr.sbin/acme-client/http.c
325
http->path, http->host, port);
usr.sbin/acme-client/http.c
334
http->path, http->host, port, psz);
usr.sbin/acme-client/http.c
340
} else if (!http_write(req, c, http)) {
usr.sbin/acme-client/http.c
343
} else if (p != NULL && !http_write(p, psz, http)) {
usr.sbin/acme-client/http.c
377
http_body_read(const struct http *http, struct httpxfer *trans, size_t *sz)
usr.sbin/acme-client/http.c
400
if ((ssz = http_read(buf, sizeof(buf), http)) < 0)
usr.sbin/acme-client/http.c
437
http_head_status(const struct http *http, struct httphead *h, size_t sz)
usr.sbin/acme-client/http.c
444
warnx("%s: no status header", http->src.ip);
usr.sbin/acme-client/http.c
453
warnx("%s: cannot convert status header", http->src.ip);
usr.sbin/acme-client/http.c
472
http_head_parse(const struct http *http, struct httpxfer *trans, size_t *sz)
usr.sbin/acme-client/http.c
537
warnx("%s: header without separator", http->src.ip);
usr.sbin/acme-client/http.c
562
http_head_read(const struct http *http, struct httpxfer *trans, size_t *sz)
usr.sbin/acme-client/http.c
594
if ((ssz = http_read(buf, sizeof(buf), http)) < 0)
usr.sbin/acme-client/http.c
612
warnx("%s: partial transfer", http->src.ip);
usr.sbin/acme-client/http.c
625
warnx("%s: binary data in header", http->src.ip);
usr.sbin/acme-client/http.c
654
http_free(g->http);
usr.sbin/acme-client/http.c
662
struct http *h;
usr.sbin/acme-client/http.c
68
dotlsread(char *buf, size_t sz, const struct http *http)
usr.sbin/acme-client/http.c
714
g->http = h;
usr.sbin/acme-client/http.c
73
rc = tls_read(http->ctx, buf, sz);
usr.sbin/acme-client/http.c
77
warnx("%s: tls_read: %s", http->src.ip,
usr.sbin/acme-client/http.c
78
tls_error(http->ctx));
usr.sbin/acme-client/http.c
83
dotlswrite(const void *buf, size_t sz, const struct http *http)
usr.sbin/acme-client/http.c
88
rc = tls_write(http->ctx, buf, sz);
usr.sbin/acme-client/http.c
92
warnx("%s: tls_write: %s", http->src.ip,
usr.sbin/acme-client/http.c
93
tls_error(http->ctx));
usr.sbin/acme-client/http.h
25
struct http;
usr.sbin/acme-client/http.h
45
struct http *http; /* underlying connection */
usr.sbin/acme-client/http.h
64
struct http *http_alloc(const struct source *, size_t,
usr.sbin/acme-client/http.h
66
void http_free(struct http *);
usr.sbin/acme-client/http.h
67
struct httpxfer *http_open(const struct http *, int, const void *, size_t);
usr.sbin/acme-client/http.h
69
void http_disconnect(struct http *);
usr.sbin/acme-client/http.h
72
char *http_head_read(const struct http *,
usr.sbin/acme-client/http.h
74
struct httphead *http_head_parse(const struct http *,
usr.sbin/acme-client/http.h
76
char *http_body_read(const struct http *,
usr.sbin/acme-client/http.h
78
int http_head_status(const struct http *,
usr.sbin/ocspcheck/http.c
100
warnx("%s: tls_read: %s", http->src.ip,
usr.sbin/ocspcheck/http.c
101
tls_error(http->ctx));
usr.sbin/ocspcheck/http.c
106
dotlswrite(const void *buf, size_t sz, const struct http *http)
usr.sbin/ocspcheck/http.c
111
rc = tls_write(http->ctx, buf, sz);
usr.sbin/ocspcheck/http.c
115
warnx("%s: tls_write: %s", http->src.ip,
usr.sbin/ocspcheck/http.c
116
tls_error(http->ctx));
usr.sbin/ocspcheck/http.c
147
http_read(char *buf, size_t sz, const struct http *http)
usr.sbin/ocspcheck/http.c
153
if ((ssz = http->reader(buf, sz, http)) < 0)
usr.sbin/ocspcheck/http.c
166
http_write(const char *buf, size_t sz, const struct http *http)
usr.sbin/ocspcheck/http.c
172
if ((ssz = http->writer(buf, sz, http)) < 0)
usr.sbin/ocspcheck/http.c
181
http_disconnect(struct http *http)
usr.sbin/ocspcheck/http.c
185
if (http->ctx != NULL) {
usr.sbin/ocspcheck/http.c
188
rc = tls_close(http->ctx);
usr.sbin/ocspcheck/http.c
192
warnx("%s: tls_close: %s", http->src.ip,
usr.sbin/ocspcheck/http.c
193
tls_error(http->ctx));
usr.sbin/ocspcheck/http.c
195
tls_free(http->ctx);
usr.sbin/ocspcheck/http.c
197
if (http->fd != -1) {
usr.sbin/ocspcheck/http.c
198
if (close(http->fd) == -1)
usr.sbin/ocspcheck/http.c
199
warn("%s: close", http->src.ip);
usr.sbin/ocspcheck/http.c
202
http->fd = -1;
usr.sbin/ocspcheck/http.c
203
http->ctx = NULL;
usr.sbin/ocspcheck/http.c
207
http_free(struct http *http)
usr.sbin/ocspcheck/http.c
210
if (http == NULL)
usr.sbin/ocspcheck/http.c
212
http_disconnect(http);
usr.sbin/ocspcheck/http.c
213
free(http->host);
usr.sbin/ocspcheck/http.c
214
free(http->path);
usr.sbin/ocspcheck/http.c
215
free(http->src.ip);
usr.sbin/ocspcheck/http.c
216
free(http);
usr.sbin/ocspcheck/http.c
219
struct http *
usr.sbin/ocspcheck/http.c
227
struct http *http;
usr.sbin/ocspcheck/http.c
280
http = calloc(1, sizeof(struct http));
usr.sbin/ocspcheck/http.c
281
if (http == NULL) {
usr.sbin/ocspcheck/http.c
286
http->fd = fd;
usr.sbin/ocspcheck/http.c
287
http->port = port;
usr.sbin/ocspcheck/http.c
288
http->src.family = addrs[cur].family;
usr.sbin/ocspcheck/http.c
289
http->src.ip = strdup(addrs[cur].ip);
usr.sbin/ocspcheck/http.c
290
http->host = strdup(host);
usr.sbin/ocspcheck/http.c
291
http->path = strdup(path);
usr.sbin/ocspcheck/http.c
292
if (http->src.ip == NULL || http->host == NULL || http->path == NULL) {
usr.sbin/ocspcheck/http.c
300
http->writer = dosyswrite;
usr.sbin/ocspcheck/http.c
301
http->reader = dosysread;
usr.sbin/ocspcheck/http.c
302
return http;
usr.sbin/ocspcheck/http.c
305
http->writer = dotlswrite;
usr.sbin/ocspcheck/http.c
306
http->reader = dotlsread;
usr.sbin/ocspcheck/http.c
308
if ((http->ctx = tls_client()) == NULL) {
usr.sbin/ocspcheck/http.c
311
} else if (tls_configure(http->ctx, tlscfg) == -1) {
usr.sbin/ocspcheck/http.c
313
http->src.ip, tls_error(http->ctx));
usr.sbin/ocspcheck/http.c
317
if (tls_connect_socket(http->ctx, http->fd, http->host) != 0) {
usr.sbin/ocspcheck/http.c
318
warnx("%s: tls_connect_socket: %s, %s", http->src.ip,
usr.sbin/ocspcheck/http.c
319
http->host, tls_error(http->ctx));
usr.sbin/ocspcheck/http.c
323
return http;
usr.sbin/ocspcheck/http.c
325
http_free(http);
usr.sbin/ocspcheck/http.c
330
http_open(const struct http *http, const void *p, size_t psz)
usr.sbin/ocspcheck/http.c
341
http->path, http->host);
usr.sbin/ocspcheck/http.c
349
http->path, http->host, psz);
usr.sbin/ocspcheck/http.c
354
} else if (!http_write(req, c, http)) {
usr.sbin/ocspcheck/http.c
357
} else if (p != NULL && !http_write(p, psz, http)) {
usr.sbin/ocspcheck/http.c
391
http_body_read(const struct http *http, struct httpxfer *trans, size_t *sz)
usr.sbin/ocspcheck/http.c
414
if ((ssz = http_read(buf, sizeof(buf), http)) < 0)
usr.sbin/ocspcheck/http.c
453
http_head_status(const struct http *http, struct httphead *h, size_t sz)
usr.sbin/ocspcheck/http.c
460
warnx("%s: no status header", http->src.ip);
usr.sbin/ocspcheck/http.c
469
warnx("%s: cannot convert status header", http->src.ip);
usr.sbin/ocspcheck/http.c
488
http_head_parse(const struct http *http, struct httpxfer *trans, size_t *sz)
usr.sbin/ocspcheck/http.c
553
warnx("%s: header without separator", http->src.ip);
usr.sbin/ocspcheck/http.c
578
http_head_read(const struct http *http, struct httpxfer *trans, size_t *sz)
usr.sbin/ocspcheck/http.c
610
if ((ssz = http_read(buf, sizeof(buf), http)) < 0)
usr.sbin/ocspcheck/http.c
627
warnx("%s: partial transfer", http->src.ip);
usr.sbin/ocspcheck/http.c
640
warnx("%s: binary data in header", http->src.ip);
usr.sbin/ocspcheck/http.c
669
http_free(g->http);
usr.sbin/ocspcheck/http.c
677
struct http *h;
usr.sbin/ocspcheck/http.c
69
dosysread(char *buf, size_t sz, const struct http *http)
usr.sbin/ocspcheck/http.c
729
g->http = h;
usr.sbin/ocspcheck/http.c
73
rc = read(http->fd, buf, sz);
usr.sbin/ocspcheck/http.c
75
warn("%s: read", http->src.ip);
usr.sbin/ocspcheck/http.c
768
httph = http_head_parse(g->http, g->xfer, &httphsz);
usr.sbin/ocspcheck/http.c
80
dosyswrite(const void *buf, size_t sz, const struct http *http)
usr.sbin/ocspcheck/http.c
84
rc = write(http->fd, buf, sz);
usr.sbin/ocspcheck/http.c
86
warn("%s: write", http->src.ip);
usr.sbin/ocspcheck/http.c
91
dotlsread(char *buf, size_t sz, const struct http *http)
usr.sbin/ocspcheck/http.c
96
rc = tls_read(http->ctx, buf, sz);
usr.sbin/ocspcheck/http.h
25
struct http;
usr.sbin/ocspcheck/http.h
33
typedef ssize_t (*writefp)(const void *, size_t, const struct http *);
usr.sbin/ocspcheck/http.h
34
typedef ssize_t (*readfp)(char *, size_t, const struct http *);
usr.sbin/ocspcheck/http.h
54
struct http *http; /* underlying connection */
usr.sbin/ocspcheck/http.h
73
struct http *http_alloc(const struct source *, size_t,
usr.sbin/ocspcheck/http.h
75
void http_free(struct http *);
usr.sbin/ocspcheck/http.h
76
struct httpxfer *http_open(const struct http *, const void *, size_t);
usr.sbin/ocspcheck/http.h
78
void http_disconnect(struct http *);
usr.sbin/ocspcheck/http.h
81
char *http_head_read(const struct http *,
usr.sbin/ocspcheck/http.h
83
struct httphead *http_head_parse(const struct http *,
usr.sbin/ocspcheck/http.h
85
char *http_body_read(const struct http *,
usr.sbin/ocspcheck/http.h
87
int http_head_status(const struct http *,
usr.sbin/unbound/daemon/remote.c
5377
if((m1->http && !m2->http) || (!m1->http && m2->http))
usr.sbin/unbound/services/authzone.c
3740
if(master->allow_notify && !master->http &&
usr.sbin/unbound/services/authzone.c
5244
if(xfr->task_transfer->master->http) {
usr.sbin/unbound/services/authzone.c
5308
if(xfr->task_transfer->master->http) {
usr.sbin/unbound/services/authzone.c
5526
if(master->http) {
usr.sbin/unbound/services/authzone.c
6374
if(master->http) return 0; /* only masters get SOA UDP probe,
usr.sbin/unbound/services/authzone.c
6552
xfr->task_transfer->masters->http)
usr.sbin/unbound/services/authzone.c
6616
if(master->allow_notify && !master->http &&
usr.sbin/unbound/services/authzone.c
7310
m->http = 1;
usr.sbin/unbound/services/authzone.h
454
int http;