• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/

Lines Matching refs:sspi_status

117   SECURITY_STATUS sspi_status = SEC_E_OK;
204 sspi_status = s_pSecFn->AcquireCredentialsHandle(NULL, (TCHAR *)UNISP_NAME,
208 if(sspi_status != SEC_E_OK) {
209 if(sspi_status == SEC_E_WRONG_PRINCIPAL)
211 Curl_sspi_strerror(conn, sspi_status));
214 Curl_sspi_strerror(conn, sspi_status));
252 sspi_status = s_pSecFn->InitializeSecurityContext(
259 if(sspi_status != SEC_I_CONTINUE_NEEDED) {
260 if(sspi_status == SEC_E_WRONG_PRINCIPAL)
262 Curl_sspi_strerror(conn, sspi_status));
265 Curl_sspi_strerror(conn, sspi_status));
303 SECURITY_STATUS sspi_status = SEC_E_OK;
391 sspi_status = s_pSecFn->InitializeSecurityContext(
402 if(sspi_status == SEC_E_INCOMPLETE_MESSAGE) {
409 if(sspi_status == SEC_I_CONTINUE_NEEDED || sspi_status == SEC_E_OK) {
434 if(sspi_status == SEC_E_WRONG_PRINCIPAL)
436 Curl_sspi_strerror(conn, sspi_status));
439 Curl_sspi_strerror(conn, sspi_status));
451 2) (sspi_status == SEC_I_CONTINUE_NEEDED) We are negotiating a
463 if(sspi_status == SEC_I_CONTINUE_NEEDED) {
476 if(sspi_status == SEC_I_CONTINUE_NEEDED) {
482 if(sspi_status == SEC_E_OK) {
681 SECURITY_STATUS sspi_status = SEC_E_OK;
686 sspi_status = s_pSecFn->QueryContextAttributes(
690 if(sspi_status != SEC_E_OK) {
726 sspi_status = s_pSecFn->EncryptMessage(&connssl->ctxt->ctxt_handle, 0,
730 if(sspi_status == SEC_E_OK) {
801 else if(sspi_status == SEC_E_INSUFFICIENT_MEMORY) {
830 SECURITY_STATUS sspi_status = SEC_E_OK;
886 while(connssl->encdata_offset > 0 && sspi_status == SEC_E_OK &&
900 sspi_status = s_pSecFn->DecryptMessage(&connssl->ctxt->ctxt_handle,
904 if(sspi_status == SEC_E_INCOMPLETE_MESSAGE) {
912 if(sspi_status == SEC_E_OK || sspi_status == SEC_I_RENEGOTIATE ||
913 sspi_status == SEC_I_CONTEXT_EXPIRED) {
976 if(sspi_status == SEC_I_RENEGOTIATE) {
1015 sspi_status == SEC_I_CONTEXT_EXPIRED || (sspi_status == SEC_E_OK &&
1023 if(ret < 0 && sspi_status != SEC_E_OK) {
1025 Curl_sspi_strerror(conn, sspi_status));
1087 SECURITY_STATUS sspi_status;
1097 sspi_status = s_pSecFn->ApplyControlToken(&connssl->ctxt->ctxt_handle,
1100 if(sspi_status != SEC_E_OK)
1102 Curl_sspi_strerror(conn, sspi_status));
1112 sspi_status = s_pSecFn->InitializeSecurityContext(
1128 if((sspi_status == SEC_E_OK) || (sspi_status == SEC_I_CONTEXT_EXPIRED)) {