Searched refs:SSL_SET_OPTION (Results 1 – 12 of 12) sorted by relevance
/external/curl/lib/vtls/ |
D | gtls.c | 583 if(SSL_SET_OPTION(authtype) == CURL_TLSAUTH_SRP) { in gtls_connect_step1() 584 infof(data, "Using TLS-SRP username: %s\n", SSL_SET_OPTION(username)); in gtls_connect_step1() 595 SSL_SET_OPTION(username), in gtls_connect_step1() 596 SSL_SET_OPTION(password)); in gtls_connect_step1() 650 if(SSL_SET_OPTION(CRLfile)) { in gtls_connect_step1() 653 SSL_SET_OPTION(CRLfile), in gtls_connect_step1() 657 SSL_SET_OPTION(CRLfile), gnutls_strerror(rc)); in gtls_connect_step1() 662 rc, SSL_SET_OPTION(CRLfile)); in gtls_connect_step1() 834 if(SSL_SET_OPTION(cert)) { in gtls_connect_step1() 835 if(SSL_SET_OPTION(key_passwd)) { in gtls_connect_step1() [all …]
|
D | polarssl.c | 288 if(SSL_SET_OPTION(cert)) { in polarssl_connect_step1() 290 SSL_SET_OPTION(cert)); in polarssl_connect_step1() 295 SSL_SET_OPTION(cert), -ret, errorbuf); in polarssl_connect_step1() 302 if(SSL_SET_OPTION(key)) { in polarssl_connect_step1() 305 ret = pk_parse_keyfile(&pk, SSL_SET_OPTION(key), in polarssl_connect_step1() 306 SSL_SET_OPTION(key_passwd)); in polarssl_connect_step1() 318 SSL_SET_OPTION(key), -ret, errorbuf); in polarssl_connect_step1() 327 if(SSL_SET_OPTION(CRLfile)) { in polarssl_connect_step1() 329 SSL_SET_OPTION(CRLfile)); in polarssl_connect_step1() 334 SSL_SET_OPTION(CRLfile), -ret, errorbuf); in polarssl_connect_step1() [all …]
|
D | mbedtls.c | 246 char * const ssl_cert = SSL_SET_OPTION(cert); in mbed_connect_step1() 247 const char * const ssl_crlfile = SSL_SET_OPTION(CRLfile); in mbed_connect_step1() 342 if(SSL_SET_OPTION(key)) { in mbed_connect_step1() 343 ret = mbedtls_pk_parse_keyfile(&BACKEND->pk, SSL_SET_OPTION(key), in mbed_connect_step1() 344 SSL_SET_OPTION(key_passwd)); in mbed_connect_step1() 353 SSL_SET_OPTION(key), -ret, errorbuf); in mbed_connect_step1() 450 if(SSL_SET_OPTION(primary.sessionid)) { in mbed_connect_step1() 470 if(SSL_SET_OPTION(key)) { in mbed_connect_step1() 706 if(SSL_SET_OPTION(primary.sessionid)) { in mbed_connect_step3()
|
D | cyassl.c | 308 if(SSL_SET_OPTION(cert) && SSL_SET_OPTION(key)) { in cyassl_connect_step1() 309 int file_type = do_file_type(SSL_SET_OPTION(cert_type)); in cyassl_connect_step1() 311 if(SSL_CTX_use_certificate_file(BACKEND->ctx, SSL_SET_OPTION(cert), in cyassl_connect_step1() 318 file_type = do_file_type(SSL_SET_OPTION(key_type)); in cyassl_connect_step1() 319 if(SSL_CTX_use_PrivateKey_file(BACKEND->ctx, SSL_SET_OPTION(key), in cyassl_connect_step1() 415 if(SSL_SET_OPTION(primary.sessionid)) { in cyassl_connect_step1() 635 if(SSL_SET_OPTION(primary.sessionid)) { in cyassl_connect_step3()
|
D | nss.c | 685 status = PK11_Authenticate(slot, PR_TRUE, SSL_SET_OPTION(key_passwd)); in nss_load_key() 1858 ssl_no_cache = (SSL_SET_OPTION(primary.sessionid) in nss_setup_connect() 1883 ssl_cbc_random_iv = !SSL_SET_OPTION(enable_beast); in nss_setup_connect() 1933 if(SSL_SET_OPTION(CRLfile)) { in nss_setup_connect() 1934 const CURLcode rv = nss_load_crl(SSL_SET_OPTION(CRLfile)); in nss_setup_connect() 1939 infof(data, " CRLfile: %s\n", SSL_SET_OPTION(CRLfile)); in nss_setup_connect() 1942 if(SSL_SET_OPTION(cert)) { in nss_setup_connect() 1943 char *nickname = dup_nickname(data, SSL_SET_OPTION(cert)); in nss_setup_connect() 1949 CURLcode rv = cert_stuff(conn, sockindex, SSL_SET_OPTION(cert), in nss_setup_connect() 1950 SSL_SET_OPTION(key)); in nss_setup_connect() [all …]
|
D | openssl.c | 2257 if(SSL_SET_OPTION(primary.sessionid)) { in ossl_new_session_cb() 2311 const enum CURL_TLSAUTH ssl_authtype = SSL_SET_OPTION(authtype); in ossl_connect_step1() 2313 char * const ssl_cert = SSL_SET_OPTION(cert); in ossl_connect_step1() 2314 const char * const ssl_cert_type = SSL_SET_OPTION(cert_type); in ossl_connect_step1() 2318 const char * const ssl_crlfile = SSL_SET_OPTION(CRLfile); in ossl_connect_step1() 2454 if(!SSL_SET_OPTION(enable_beast)) in ossl_connect_step1() 2541 SSL_SET_OPTION(key), SSL_SET_OPTION(key_type), in ossl_connect_step1() 2542 SSL_SET_OPTION(key_passwd))) { in ossl_connect_step1() 2579 char * const ssl_username = SSL_SET_OPTION(username); in ossl_connect_step1() 2587 if(!SSL_CTX_set_srp_password(BACKEND->ctx, SSL_SET_OPTION(password))) { in ossl_connect_step1() [all …]
|
D | mesalink.c | 226 if(SSL_SET_OPTION(primary.sessionid)) { in mesalink_connect_step1() 310 if(SSL_SET_OPTION(primary.sessionid)) { in mesalink_connect_step3()
|
D | sectransp.c | 1377 char * const ssl_cert = SSL_SET_OPTION(cert); 1607 if(SSL_SET_OPTION(key)) { 1621 if(!SSL_SET_OPTION(cert_type)) 1624 else if(strncmp(SSL_SET_OPTION(cert_type), "P12", 1625 strlen(SSL_SET_OPTION(cert_type))) != 0) 1630 SSL_SET_OPTION(key_passwd), &cert_and_key); 1914 if(SSL_SET_OPTION(primary.sessionid)) {
|
D | vtls.c | 324 DEBUGASSERT(SSL_SET_OPTION(primary.sessionid)); in Curl_ssl_getsessionid() 326 if(!SSL_SET_OPTION(primary.sessionid)) in Curl_ssl_getsessionid() 428 DEBUGASSERT(SSL_SET_OPTION(primary.sessionid)); in Curl_ssl_addsessionid()
|
D | vtls.h | 136 #define SSL_SET_OPTION(var) (SSL_IS_PROXY() ? data->set.proxy_ssl.var : \ macro
|
D | gskit.c | 801 const char * const keyringpwd = SSL_SET_OPTION(key_passwd); in gskit_connect_step1() 802 const char * const keyringlabel = SSL_SET_OPTION(cert); in gskit_connect_step1()
|
D | schannel.c | 497 if(SSL_SET_OPTION(primary.sessionid)) { in schannel_connect_step1() 1276 if(SSL_SET_OPTION(primary.sessionid)) { in schannel_connect_step3()
|