Searched refs:SSL_SET_OPTION (Results 1 – 13 of 13) sorted by relevance
/third_party/curl/lib/vtls/ |
D | gtls.c | 434 if(SSL_SET_OPTION(primary.authtype) == CURL_TLSAUTH_SRP) { in gtls_connect_step1() 436 SSL_SET_OPTION(primary.username)); in gtls_connect_step1() 447 SSL_SET_OPTION(primary.username), in gtls_connect_step1() 448 SSL_SET_OPTION(primary.password)); in gtls_connect_step1() 504 if(SSL_SET_OPTION(primary.CRLfile)) { in gtls_connect_step1() 507 SSL_SET_OPTION(primary.CRLfile), in gtls_connect_step1() 511 SSL_SET_OPTION(primary.CRLfile), gnutls_strerror(rc)); in gtls_connect_step1() 516 rc, SSL_SET_OPTION(primary.CRLfile)); in gtls_connect_step1() 589 if(SSL_SET_OPTION(primary.authtype) == CURL_TLSAUTH_SRP) { in gtls_connect_step1() 643 if(SSL_SET_OPTION(primary.clientcert)) { in gtls_connect_step1() [all …]
|
D | mbedtls.c | 256 char * const ssl_cert = SSL_SET_OPTION(primary.clientcert); in mbed_connect_step1() 257 const struct curl_blob *ssl_cert_blob = SSL_SET_OPTION(primary.cert_blob); in mbed_connect_step1() 258 const char * const ssl_crlfile = SSL_SET_OPTION(primary.CRLfile); in mbed_connect_step1() 347 SSL_SET_OPTION(key), -ret, errorbuf); in mbed_connect_step1() 355 if(SSL_SET_OPTION(key) || SSL_SET_OPTION(key_blob)) { in mbed_connect_step1() 356 if(SSL_SET_OPTION(key)) { in mbed_connect_step1() 357 ret = mbedtls_pk_parse_keyfile(&backend->pk, SSL_SET_OPTION(key), in mbed_connect_step1() 358 … SSL_SET_OPTION(key_passwd), mbedtls_ctr_drbg_random, &backend->ctr_drbg); in mbed_connect_step1() 363 SSL_SET_OPTION(key), -ret, errorbuf); in mbed_connect_step1() 368 const struct curl_blob *ssl_key_blob = SSL_SET_OPTION(key_blob); in mbed_connect_step1() [all …]
|
D | mesalink.c | 181 if(SSL_SET_OPTION(primary.clientcert) && SSL_SET_OPTION(key)) { in mesalink_connect_step1() 182 int file_type = do_file_type(SSL_SET_OPTION(cert_type)); in mesalink_connect_step1() 185 SSL_SET_OPTION(primary.clientcert), in mesalink_connect_step1() 192 file_type = do_file_type(SSL_SET_OPTION(key_type)); in mesalink_connect_step1() 193 if(SSL_CTX_use_PrivateKey_file(BACKEND->ctx, SSL_SET_OPTION(key), in mesalink_connect_step1() 259 if(SSL_SET_OPTION(primary.sessionid)) { in mesalink_connect_step1() 345 if(SSL_SET_OPTION(primary.sessionid)) { in mesalink_connect_step3()
|
D | wolfssl.c | 364 if(SSL_SET_OPTION(primary.clientcert) && SSL_SET_OPTION(key)) { in wolfssl_connect_step1() 365 int file_type = do_file_type(SSL_SET_OPTION(cert_type)); in wolfssl_connect_step1() 368 SSL_SET_OPTION(primary.clientcert), in wolfssl_connect_step1() 375 file_type = do_file_type(SSL_SET_OPTION(key_type)); in wolfssl_connect_step1() 376 if(SSL_CTX_use_PrivateKey_file(backend->ctx, SSL_SET_OPTION(key), in wolfssl_connect_step1() 488 if(SSL_SET_OPTION(primary.sessionid)) { in wolfssl_connect_step1() 730 if(SSL_SET_OPTION(primary.sessionid)) { in wolfssl_connect_step3()
|
D | nss.c | 721 status = PK11_Authenticate(slot, PR_TRUE, SSL_SET_OPTION(key_passwd)); in nss_load_key() 1925 ssl_no_cache = (SSL_SET_OPTION(primary.sessionid) in nss_setup_connect() 1950 ssl_cbc_random_iv = !SSL_SET_OPTION(enable_beast); in nss_setup_connect() 1997 if(SSL_SET_OPTION(primary.CRLfile)) { in nss_setup_connect() 1998 const CURLcode rv = nss_load_crl(SSL_SET_OPTION(primary.CRLfile)); in nss_setup_connect() 2003 infof(data, " CRLfile: %s", SSL_SET_OPTION(primary.CRLfile)); in nss_setup_connect() 2006 if(SSL_SET_OPTION(primary.clientcert)) { in nss_setup_connect() 2007 char *nickname = dup_nickname(data, SSL_SET_OPTION(primary.clientcert)); in nss_setup_connect() 2014 SSL_SET_OPTION(primary.clientcert), in nss_setup_connect() 2015 SSL_SET_OPTION(key)); in nss_setup_connect() [all …]
|
D | openssl.c | 2490 if(SSL_SET_OPTION(primary.sessionid)) { in ossl_new_session_cb() 2608 const enum CURL_TLSAUTH ssl_authtype = SSL_SET_OPTION(primary.authtype); in ossl_connect_step1() 2610 char * const ssl_cert = SSL_SET_OPTION(primary.clientcert); in ossl_connect_step1() 2611 const struct curl_blob *ssl_cert_blob = SSL_SET_OPTION(primary.cert_blob); in ossl_connect_step1() 2613 const char * const ssl_cert_type = SSL_SET_OPTION(cert_type); in ossl_connect_step1() 2619 const char * const ssl_crlfile = SSL_SET_OPTION(primary.CRLfile); in ossl_connect_step1() 2738 if(!SSL_SET_OPTION(enable_beast)) in ossl_connect_step1() 2819 SSL_SET_OPTION(key), SSL_SET_OPTION(key_blob), in ossl_connect_step1() 2820 SSL_SET_OPTION(key_type), SSL_SET_OPTION(key_passwd))) in ossl_connect_step1() 2871 char * const ssl_username = SSL_SET_OPTION(primary.username); in ossl_connect_step1() [all …]
|
D | vtls.h | 149 #define SSL_SET_OPTION(var) \ macro 166 #define SSL_SET_OPTION(var) data->set.ssl.var macro
|
D | sectransp.c | 1670 char * const ssl_cert = SSL_SET_OPTION(primary.clientcert); 1671 const struct curl_blob *ssl_cert_blob = SSL_SET_OPTION(primary.cert_blob); 1863 if(SSL_SET_OPTION(key)) { 1882 if(!SSL_SET_OPTION(cert_type)) 1885 else if(!strcasecompare(SSL_SET_OPTION(cert_type), "P12")) { 1892 SSL_SET_OPTION(key_passwd), 2068 !SSL_SET_OPTION(enable_beast)); 2075 if(SSL_SET_OPTION(primary.sessionid)) {
|
D | schannel.c | 439 if(SSL_SET_OPTION(no_revoke)) { in schannel_acquire_credential_handle() 446 else if(SSL_SET_OPTION(revoke_best_effort)) { in schannel_acquire_credential_handle() 474 if(!SSL_SET_OPTION(auto_client_cert)) { in schannel_acquire_credential_handle() 833 if(SSL_SET_OPTION(primary.sessionid)) { in schannel_connect_step1() 929 if(!SSL_SET_OPTION(auto_client_cert)) { in schannel_connect_step1() 1437 if(SSL_SET_OPTION(primary.sessionid)) { in schannel_connect_step3()
|
D | vtls.c | 436 DEBUGASSERT(SSL_SET_OPTION(primary.sessionid)); in Curl_ssl_getsessionid() 438 if(!SSL_SET_OPTION(primary.sessionid) || !data->state.session) in Curl_ssl_getsessionid() 556 DEBUGASSERT(SSL_SET_OPTION(primary.sessionid)); in Curl_ssl_addsessionid()
|
D | bearssl.c | 369 if(SSL_SET_OPTION(primary.sessionid)) { in bearssl_connect_step1() 559 if(SSL_SET_OPTION(primary.sessionid)) { in bearssl_connect_step3()
|
D | gskit.c | 714 const char * const keyringpwd = SSL_SET_OPTION(key_passwd); in gskit_connect_step1() 715 const char * const keyringlabel = SSL_SET_OPTION(primary.clientcert); in gskit_connect_step1()
|
D | schannel_verify.c | 672 (SSL_SET_OPTION(no_revoke) ? 0 : in Curl_verify_certificate()
|