• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/lib/

Lines Matching defs:ssl

37 #include "url.h" /* for the ssl config check function */
52 #include <ssl.h>
312 static CURLcode nss_create_object(struct ssl_connect_data *ssl,
351 if(!Curl_llist_insert_next(ssl->obj_list, ssl->obj_list->tail, obj)) {
358 ssl->obj_clicert = obj;
374 static CURLcode nss_load_cert(struct ssl_connect_data *ssl,
385 err = nss_create_object(ssl, CKO_CERTIFICATE, filename, cacert);
505 struct ssl_connect_data *ssl = conn->ssl;
507 CURLcode rv = nss_create_object(ssl, CKO_PRIVATE_KEY, key_file, FALSE);
561 rv = nss_load_cert(&conn->ssl[sockindex], cert_file, PR_FALSE);
602 if(!conn->data->set.ssl.verifypeer) {
618 conn->data->set.ssl.certverifyresult=err;
634 if(conn->data->set.ssl.verifyhost) {
1025 PR_Recv(conn->ssl[FIRSTSOCKET].handle, (void *)&buf, 1, PR_MSG_PEEK,
1041 struct ssl_connect_data *connssl = &conn->ssl[sockindex];
1105 const char *cafile = data->set.ssl.CAfile;
1106 const char *capath = data->set.ssl.CApath;
1109 CURLcode rv = nss_load_cert(&conn->ssl[sockindex], cafile, PR_TRUE);
1132 if(CURLE_OK != nss_load_cert(&conn->ssl[sockindex], fullpath, PR_TRUE))
1163 struct ssl_connect_data *connssl = &conn->ssl[sockindex];
1235 ssl_no_cache = (data->set.ssl.verifypeer) ? PR_FALSE : PR_TRUE;
1239 switch (data->set.ssl.version) {
1282 if(data->set.ssl.cipher_list) {
1283 if(set_ciphers(data, model, data->set.ssl.cipher_list) != SECSuccess) {
1289 if(!data->set.ssl.verifypeer && data->set.ssl.verifyhost)
1290 infof(data, "warning: ignoring value of ssl.verifyhost\n");
1291 else if(data->set.ssl.verifyhost == 1)
1292 infof(data, "warning: ignoring unsupported value (1) of ssl.verifyhost\n");
1299 data->set.ssl.certverifyresult=0; /* not checked yet */
1308 if(data->set.ssl.verifypeer) {
1316 if(data->set.ssl.CRLfile) {
1317 if(SECSuccess != nss_load_crl(data->set.ssl.CRLfile)) {
1323 data->set.ssl.CRLfile ? data->set.ssl.CRLfile : "none");
1385 if(conn->data->set.ssl.certverifyresult == SSL_ERROR_BAD_CERT_DOMAIN)
1387 else if(conn->data->set.ssl.certverifyresult!=0)
1456 rc = PR_Send(conn->ssl[sockindex].handle, mem, (int)len, 0, -1);
1481 nread = PR_Recv(conn->ssl[num].handle, buf, (int)buffersize, 0, -1);