Home
last modified time | relevance | path

Searched refs:SSL_CONN_CONFIG (Results 1 – 11 of 11) sorted by relevance

/external/curl/lib/vtls/
Dcyassl.c152 switch(SSL_CONN_CONFIG(version)) { in cyassl_connect_step1()
211 switch(SSL_CONN_CONFIG(version)) { in cyassl_connect_step1()
234 if(SSL_CONN_CONFIG(CAfile)) { in cyassl_connect_step1()
236 SSL_CONN_CONFIG(CAfile), in cyassl_connect_step1()
237 SSL_CONN_CONFIG(CApath))) { in cyassl_connect_step1()
238 if(SSL_CONN_CONFIG(verifypeer)) { in cyassl_connect_step1()
242 SSL_CONN_CONFIG(CAfile)? in cyassl_connect_step1()
243 SSL_CONN_CONFIG(CAfile): "none", in cyassl_connect_step1()
244 SSL_CONN_CONFIG(CApath)? in cyassl_connect_step1()
245 SSL_CONN_CONFIG(CApath) : "none"); in cyassl_connect_step1()
[all …]
Dgtls.c429 if(SSL_CONN_CONFIG(version) == CURL_SSLVERSION_SSLv2) { in gtls_connect_step1()
433 else if(SSL_CONN_CONFIG(version) == CURL_SSLVERSION_SSLv3) in gtls_connect_step1()
467 if(SSL_CONN_CONFIG(CAfile)) { in gtls_connect_step1()
473 SSL_CONN_CONFIG(CAfile), in gtls_connect_step1()
477 SSL_CONN_CONFIG(CAfile), gnutls_strerror(rc)); in gtls_connect_step1()
478 if(SSL_CONN_CONFIG(verifypeer)) in gtls_connect_step1()
483 SSL_CONN_CONFIG(CAfile)); in gtls_connect_step1()
487 if(SSL_CONN_CONFIG(CApath)) { in gtls_connect_step1()
490 SSL_CONN_CONFIG(CApath), in gtls_connect_step1()
494 SSL_CONN_CONFIG(CApath), gnutls_strerror(rc)); in gtls_connect_step1()
[all …]
Daxtls.c161 switch(SSL_CONN_CONFIG(version)) { in connect_prep()
186 if(SSL_CONN_CONFIG(CAfile)) { in connect_prep()
188 SSL_CONN_CONFIG(CAfile), NULL) != SSL_OK) { in connect_prep()
190 SSL_CONN_CONFIG(CAfile)); in connect_prep()
191 if(SSL_CONN_CONFIG(verifypeer)) { in connect_prep()
196 infof(data, "found certificates in %s\n", SSL_CONN_CONFIG(CAfile)); in connect_prep()
305 if(SSL_CONN_CONFIG(verifypeer)) { in connect_finish()
345 if(SSL_CONN_CONFIG(verifyhost)) { in connect_finish()
359 if(SSL_CONN_CONFIG(verifyhost)) { in connect_finish()
369 if(SSL_CONN_CONFIG(verifyhost)) { in connect_finish()
Dpolarssl.c150 const char *capath = SSL_CONN_CONFIG(CApath); in polarssl_connect_step1()
159 if(SSL_CONN_CONFIG(version) == CURL_SSLVERSION_SSLv2) { in polarssl_connect_step1()
187 if(SSL_CONN_CONFIG(CAfile)) { in polarssl_connect_step1()
189 SSL_CONN_CONFIG(CAfile)); in polarssl_connect_step1()
194 SSL_CONN_CONFIG(CAfile), -ret, errorbuf); in polarssl_connect_step1()
196 if(SSL_CONN_CONFIG(verifypeer)) in polarssl_connect_step1()
209 if(SSL_CONN_CONFIG(verifypeer)) in polarssl_connect_step1()
276 switch(SSL_CONN_CONFIG(version)) { in polarssl_connect_step1()
433 if(ret && SSL_CONN_CONFIG(verifypeer)) { in polarssl_connect_step2()
Dmbedtls.c166 const char * const ssl_cafile = SSL_CONN_CONFIG(CAfile); in mbed_connect_step1()
167 const bool verifypeer = SSL_CONN_CONFIG(verifypeer); in mbed_connect_step1()
168 const char * const ssl_capath = SSL_CONN_CONFIG(CApath); in mbed_connect_step1()
180 if(SSL_CONN_CONFIG(version) == CURL_SSLVERSION_SSLv2) { in mbed_connect_step1()
322 switch(SSL_CONN_CONFIG(version)) { in mbed_connect_step1()
492 if(ret && SSL_CONN_CONFIG(verifypeer)) { in mbed_connect_step2()
Dnss.c684 if(SSL_CONN_CONFIG(verifystatus)) { in nss_auth_cert_hook()
710 if(!SSL_CONN_CONFIG(verifypeer)) { in nss_auth_cert_hook()
940 if(err == SSL_ERROR_BAD_CERT_DOMAIN && !SSL_CONN_CONFIG(verifyhost)) in BadCertHandler()
1466 const char *cafile = SSL_CONN_CONFIG(CAfile); in nss_load_ca_certificates()
1467 const char *capath = SSL_CONN_CONFIG(CApath); in nss_load_ca_certificates()
1518 switch (SSL_CONN_CONFIG(version)) { in nss_init_sslver()
1699 && SSL_CONN_CONFIG(verifypeer)) ? PR_FALSE : PR_TRUE; in nss_setup_connect()
1721 if(SSL_CONN_CONFIG(cipher_list)) { in nss_setup_connect()
1722 if(set_ciphers(data, model, SSL_CONN_CONFIG(cipher_list)) != SECSuccess) { in nss_setup_connect()
1728 if(!SSL_CONN_CONFIG(verifypeer) && SSL_CONN_CONFIG(verifyhost)) in nss_setup_connect()
[all …]
Dopenssl.c1716 const long int ssl_version = SSL_CONN_CONFIG(version); in ossl_connect_step1()
1722 const char * const ssl_cafile = SSL_CONN_CONFIG(CAfile); in ossl_connect_step1()
1723 const char * const ssl_capath = SSL_CONN_CONFIG(CApath); in ossl_connect_step1()
1724 const bool verifypeer = SSL_CONN_CONFIG(verifypeer); in ossl_connect_step1()
2013 ciphers = SSL_CONN_CONFIG(cipher_list); in ossl_connect_step1()
2036 if(!SSL_CONN_CONFIG(cipher_list)) { in ossl_connect_step1()
2145 if(SSL_CONN_CONFIG(verifystatus)) in ossl_connect_step1()
2796 if(SSL_CONN_CONFIG(verifyhost)) { in servercert()
2861 if(SSL_CONN_CONFIG(verifypeer)) { in servercert()
2880 if(SSL_CONN_CONFIG(verifystatus)) { in servercert()
[all …]
Dvtls.h61 #define SSL_CONN_CONFIG(var) (SSL_IS_PROXY() ? \ macro
Dgskit.c300 const char *cipherlist = SSL_CONN_CONFIG(cipher_list); in set_ciphers()
759 const char * const keyringfile = SSL_CONN_CONFIG(CAfile); in gskit_connect_step1()
762 const long int ssl_version = SSL_CONN_CONFIG(version); in gskit_connect_step1()
763 const bool verifypeer = SSL_CONN_CONFIG(verifypeer); in gskit_connect_step1()
Ddarwinssl.c1043 const char * const ssl_cafile = SSL_CONN_CONFIG(CAfile);
1044 const bool verifypeer = SSL_CONN_CONFIG(verifypeer);
1567 verifypeer, SSL_CONN_CONFIG(verifyhost), hostname, port);
1924 if(SSL_CONN_CONFIG(CAfile)) {
1925 int res = verify_cert(SSL_CONN_CONFIG(CAfile), data,
/external/curl/lib/
Dx509asn1.c1095 if(!SSL_CONN_CONFIG(verifyhost)) in Curl_verifyhost()