Lines Matching refs:set

312   bool x509_store_setup;            /* x509 store has been set up */
1290 /* set the password in the callback userdata */
1382 failf(data, "unable to set client certificate [%s]",
1390 failf(data, "crypto engine not set, can't load certificate");
1534 failf(data, "unable to set private key file: '%s' type %s",
1575 failf(data, "unable to set private key");
1582 failf(data, "crypto engine not set, can't load private key");
1645 /* Now we know that a key and cert have been set against
1843 infof(data, "set default crypto engine '%s'",
1847 failf(data, "set default crypto engine '%s' failed",
1975 if(data->set.ftp_ccc == CURLFTPSSL_CCC_ACTIVE)
2033 if(data->set.verbose) {
2122 of the set is considered acceptable.) Names may contain the wildcard
2622 if(!data || !data->set.fdebug || (direction && direction != 1))
2993 /* set count to 0 to return an error */
3003 /* set count to 0 to return an error */
3328 const struct ssl_general_config *cfg = &data->set.general_ssl;
3423 cache_criteria_met = (data->set.general_ssl.ca_cache_timeout != 0) &&
3533 if(data->set.fdebug && data->set.verbose) {
3573 must not be set.
3706 failf(data, "Unable to set SRP user name");
3747 /* give application a chance to interfere with SSL set up. */
3748 if(data->set.ssl.fsslctx) {
3759 result = (*data->set.ssl.fsslctx)(data, backend->ctx,
3760 data->set.ssl.fsslctxp);
3796 failf(data, "Failed set SNI");
3965 /* detail is already set to the SSL error above */
4196 if(data->set.ssl.certinfo)
4331 and we return earlier if verifypeer is set? */
4380 data->set.str[STRING_SSL_PINNEDPUBLICKEY_PROXY]:
4381 data->set.str[STRING_SSL_PINNEDPUBLICKEY];