Lines Matching refs:PR_TRUE
324 cipher_state[i] = PR_TRUE; in set_ciphers()
325 found = PR_TRUE; in set_ciphers()
345 if(SSL_CipherPrefSet(model, cipherlist[i].num, PR_TRUE) != SECSuccess) { in set_ciphers()
527 SECITEM_FreeItem(crl_der, PR_TRUE); in nss_destroy_crl_item()
576 SECITEM_FreeItem(crl_der, PR_TRUE); in nss_cache_crl()
585 SECITEM_FreeItem(crl_der, PR_TRUE); in nss_cache_crl()
593 SECITEM_FreeItem(crl_der, PR_TRUE); in nss_cache_crl()
663 SECITEM_FreeItem(crl_der, PR_TRUE); in nss_load_crl()
698 status = PK11_Authenticate(slot, PR_TRUE, SSL_SET_OPTION(key_passwd)); in nss_load_key()
915 *canFalseStart = PR_TRUE; in CanFalseStartCallback()
1103 SECITEM_FreeItem(cert_der, PR_TRUE); in cmp_peer_pubkey()
1654 result = nss_load_cert(&conn->ssl[sockindex], cafile, PR_TRUE); in nss_load_ca_certificates()
1678 if(CURLE_OK != nss_load_cert(&conn->ssl[sockindex], fullpath, PR_TRUE)) in nss_load_ca_certificates()
1879 if(SSL_OptionSet(model, SSL_SECURITY, PR_TRUE) != SECSuccess) in nss_setup_connect()
1883 if(SSL_OptionSet(model, SSL_HANDSHAKE_AS_CLIENT, PR_TRUE) != SECSuccess) in nss_setup_connect()
1888 && SSL_CONN_CONFIG(verifypeer)) ? PR_FALSE : PR_TRUE; in nss_setup_connect()
2049 if(SSL_OptionSet(backend->handle, SSL_ENABLE_OCSP_STAPLING, PR_TRUE) in nss_setup_connect()
2057 ? PR_TRUE : PR_FALSE) != SECSuccess) in nss_setup_connect()
2063 ? PR_TRUE : PR_FALSE) != SECSuccess) in nss_setup_connect()
2069 if(SSL_OptionSet(backend->handle, SSL_ENABLE_FALSE_START, PR_TRUE) in nss_setup_connect()
2381 PK11_DestroyContext(MD5pw, PR_TRUE); in Curl_nss_md5sum()
2399 PK11_DestroyContext(SHA256pw, PR_TRUE); in Curl_nss_sha256sum()