Lines Matching defs:model
202 static SECStatus set_ciphers(struct SessionHandle *data, PRFileDesc * model,
215 SSL_CipherPrefSet(model, SSL_ImplementedCiphers[i], PR_FALSE);
258 if(SSL_CipherPrefSet(model, cipherlist[i].num, PR_TRUE) != SECSuccess) {
1460 PRFileDesc *model = NULL;
1528 model = PR_NewTCPSocket();
1529 if(!model)
1531 model = SSL_ImportFD(NULL, model);
1533 if(SSL_OptionSet(model, SSL_SECURITY, PR_TRUE) != SECSuccess)
1535 if(SSL_OptionSet(model, SSL_HANDSHAKE_AS_SERVER, PR_FALSE) != SECSuccess)
1537 if(SSL_OptionSet(model, SSL_HANDSHAKE_AS_CLIENT, PR_TRUE) != SECSuccess)
1543 if(SSL_OptionSet(model, SSL_NO_CACHE, ssl_no_cache) != SECSuccess)
1549 if(SSL_VersionRangeSet(model, &sslver) != SECSuccess)
1556 if(SSL_OptionSet(model, SSL_CBC_RANDOM_IV, ssl_cbc_random_iv) != SECSuccess)
1568 if(set_ciphers(data, model, data->set.ssl.cipher_list) != SECSuccess) {
1579 if(SSL_AuthCertificateHook(model, nss_auth_cert_hook, conn) != SECSuccess)
1583 if(SSL_BadCertHook(model, BadCertHandler, conn) != SECSuccess)
1586 if(SSL_HandshakeCallback(model, HandshakeCallback, conn) != SECSuccess)
1628 if(SSL_GetClientAuthDataHook(model, SelectClientCert,
1656 /* import our model socket onto the current I/O stack */
1657 connssl->handle = SSL_ImportFD(model, nspr_io);
1663 PR_Close(model); /* We don't need this any more */
1664 model = NULL;
1719 if(model)
1720 PR_Close(model);