Lines Matching refs:PR_FALSE
303 SSL_CipherPrefSet(model, implemented_ciphers[i], PR_FALSE); in set_ciphers()
308 cipher_state[i] = PR_FALSE; in set_ciphers()
322 found = PR_FALSE; in set_ciphers()
332 if(found == PR_FALSE) { in set_ciphers()
492 (slot, attrs, attr_cnt, PR_FALSE); in nss_create_object()
653 SECITEM_FreeItem(&filedata, PR_FALSE); in nss_load_crl()
665 SECITEM_FreeItem(&filedata, PR_FALSE); in nss_load_crl()
728 result = nss_load_cert(&conn->ssl[sockindex], cert_file, PR_FALSE); in cert_stuff()
878 *canFalseStart = PR_FALSE; in CanFalseStartCallback()
1164 SECITEM_FreeItem(&cert_der, PR_FALSE); in SelectClientCert()
1290 module = SECMOD_LoadUserModule(config_string, NULL, PR_FALSE); in nss_load_module()
1869 if(SSL_OptionSet(model, SSL_HANDSHAKE_AS_SERVER, PR_FALSE) != SECSuccess) in nss_setup_connect()
1876 && SSL_CONN_CONFIG(verifypeer)) ? PR_FALSE : PR_TRUE; in nss_setup_connect()
2045 ? PR_TRUE : PR_FALSE) != SECSuccess) in nss_setup_connect()
2051 ? PR_TRUE : PR_FALSE) != SECSuccess) in nss_setup_connect()
2092 if(SSL_ResetHandshake(BACKEND->handle, /* asServer */ PR_FALSE) in nss_setup_connect()