Searched refs:SSL_CONN_CONFIG (Results 1 – 11 of 11) sorted by relevance
/external/curl/lib/vtls/ |
D | cyassl.c | 152 switch(SSL_CONN_CONFIG(version)) { in cyassl_connect_step1() 211 switch(SSL_CONN_CONFIG(version)) { in cyassl_connect_step1() 234 if(SSL_CONN_CONFIG(CAfile)) { in cyassl_connect_step1() 236 SSL_CONN_CONFIG(CAfile), in cyassl_connect_step1() 237 SSL_CONN_CONFIG(CApath))) { in cyassl_connect_step1() 238 if(SSL_CONN_CONFIG(verifypeer)) { in cyassl_connect_step1() 242 SSL_CONN_CONFIG(CAfile)? in cyassl_connect_step1() 243 SSL_CONN_CONFIG(CAfile): "none", in cyassl_connect_step1() 244 SSL_CONN_CONFIG(CApath)? in cyassl_connect_step1() 245 SSL_CONN_CONFIG(CApath) : "none"); in cyassl_connect_step1() [all …]
|
D | gtls.c | 429 if(SSL_CONN_CONFIG(version) == CURL_SSLVERSION_SSLv2) { in gtls_connect_step1() 433 else if(SSL_CONN_CONFIG(version) == CURL_SSLVERSION_SSLv3) in gtls_connect_step1() 467 if(SSL_CONN_CONFIG(CAfile)) { in gtls_connect_step1() 473 SSL_CONN_CONFIG(CAfile), in gtls_connect_step1() 477 SSL_CONN_CONFIG(CAfile), gnutls_strerror(rc)); in gtls_connect_step1() 478 if(SSL_CONN_CONFIG(verifypeer)) in gtls_connect_step1() 483 SSL_CONN_CONFIG(CAfile)); in gtls_connect_step1() 487 if(SSL_CONN_CONFIG(CApath)) { in gtls_connect_step1() 490 SSL_CONN_CONFIG(CApath), in gtls_connect_step1() 494 SSL_CONN_CONFIG(CApath), gnutls_strerror(rc)); in gtls_connect_step1() [all …]
|
D | axtls.c | 161 switch(SSL_CONN_CONFIG(version)) { in connect_prep() 186 if(SSL_CONN_CONFIG(CAfile)) { in connect_prep() 188 SSL_CONN_CONFIG(CAfile), NULL) != SSL_OK) { in connect_prep() 190 SSL_CONN_CONFIG(CAfile)); in connect_prep() 191 if(SSL_CONN_CONFIG(verifypeer)) { in connect_prep() 196 infof(data, "found certificates in %s\n", SSL_CONN_CONFIG(CAfile)); in connect_prep() 305 if(SSL_CONN_CONFIG(verifypeer)) { in connect_finish() 345 if(SSL_CONN_CONFIG(verifyhost)) { in connect_finish() 359 if(SSL_CONN_CONFIG(verifyhost)) { in connect_finish() 369 if(SSL_CONN_CONFIG(verifyhost)) { in connect_finish()
|
D | polarssl.c | 150 const char *capath = SSL_CONN_CONFIG(CApath); in polarssl_connect_step1() 159 if(SSL_CONN_CONFIG(version) == CURL_SSLVERSION_SSLv2) { in polarssl_connect_step1() 187 if(SSL_CONN_CONFIG(CAfile)) { in polarssl_connect_step1() 189 SSL_CONN_CONFIG(CAfile)); in polarssl_connect_step1() 194 SSL_CONN_CONFIG(CAfile), -ret, errorbuf); in polarssl_connect_step1() 196 if(SSL_CONN_CONFIG(verifypeer)) in polarssl_connect_step1() 209 if(SSL_CONN_CONFIG(verifypeer)) in polarssl_connect_step1() 276 switch(SSL_CONN_CONFIG(version)) { in polarssl_connect_step1() 433 if(ret && SSL_CONN_CONFIG(verifypeer)) { in polarssl_connect_step2()
|
D | mbedtls.c | 166 const char * const ssl_cafile = SSL_CONN_CONFIG(CAfile); in mbed_connect_step1() 167 const bool verifypeer = SSL_CONN_CONFIG(verifypeer); in mbed_connect_step1() 168 const char * const ssl_capath = SSL_CONN_CONFIG(CApath); in mbed_connect_step1() 180 if(SSL_CONN_CONFIG(version) == CURL_SSLVERSION_SSLv2) { in mbed_connect_step1() 322 switch(SSL_CONN_CONFIG(version)) { in mbed_connect_step1() 492 if(ret && SSL_CONN_CONFIG(verifypeer)) { in mbed_connect_step2()
|
D | nss.c | 684 if(SSL_CONN_CONFIG(verifystatus)) { in nss_auth_cert_hook() 710 if(!SSL_CONN_CONFIG(verifypeer)) { in nss_auth_cert_hook() 940 if(err == SSL_ERROR_BAD_CERT_DOMAIN && !SSL_CONN_CONFIG(verifyhost)) in BadCertHandler() 1466 const char *cafile = SSL_CONN_CONFIG(CAfile); in nss_load_ca_certificates() 1467 const char *capath = SSL_CONN_CONFIG(CApath); in nss_load_ca_certificates() 1518 switch (SSL_CONN_CONFIG(version)) { in nss_init_sslver() 1699 && SSL_CONN_CONFIG(verifypeer)) ? PR_FALSE : PR_TRUE; in nss_setup_connect() 1721 if(SSL_CONN_CONFIG(cipher_list)) { in nss_setup_connect() 1722 if(set_ciphers(data, model, SSL_CONN_CONFIG(cipher_list)) != SECSuccess) { in nss_setup_connect() 1728 if(!SSL_CONN_CONFIG(verifypeer) && SSL_CONN_CONFIG(verifyhost)) in nss_setup_connect() [all …]
|
D | openssl.c | 1716 const long int ssl_version = SSL_CONN_CONFIG(version); in ossl_connect_step1() 1722 const char * const ssl_cafile = SSL_CONN_CONFIG(CAfile); in ossl_connect_step1() 1723 const char * const ssl_capath = SSL_CONN_CONFIG(CApath); in ossl_connect_step1() 1724 const bool verifypeer = SSL_CONN_CONFIG(verifypeer); in ossl_connect_step1() 2013 ciphers = SSL_CONN_CONFIG(cipher_list); in ossl_connect_step1() 2036 if(!SSL_CONN_CONFIG(cipher_list)) { in ossl_connect_step1() 2145 if(SSL_CONN_CONFIG(verifystatus)) in ossl_connect_step1() 2796 if(SSL_CONN_CONFIG(verifyhost)) { in servercert() 2861 if(SSL_CONN_CONFIG(verifypeer)) { in servercert() 2880 if(SSL_CONN_CONFIG(verifystatus)) { in servercert() [all …]
|
D | vtls.h | 61 #define SSL_CONN_CONFIG(var) (SSL_IS_PROXY() ? \ macro
|
D | gskit.c | 300 const char *cipherlist = SSL_CONN_CONFIG(cipher_list); in set_ciphers() 759 const char * const keyringfile = SSL_CONN_CONFIG(CAfile); in gskit_connect_step1() 762 const long int ssl_version = SSL_CONN_CONFIG(version); in gskit_connect_step1() 763 const bool verifypeer = SSL_CONN_CONFIG(verifypeer); in gskit_connect_step1()
|
D | darwinssl.c | 1043 const char * const ssl_cafile = SSL_CONN_CONFIG(CAfile); 1044 const bool verifypeer = SSL_CONN_CONFIG(verifypeer); 1567 verifypeer, SSL_CONN_CONFIG(verifyhost), hostname, port); 1924 if(SSL_CONN_CONFIG(CAfile)) { 1925 int res = verify_cert(SSL_CONN_CONFIG(CAfile), data,
|
/external/curl/lib/ |
D | x509asn1.c | 1095 if(!SSL_CONN_CONFIG(verifyhost)) in Curl_verifyhost()
|