Lines Matching refs:set
547 if(data->set.ssl.primary.clientcert || data->set.ssl.primary.cert_blob) {
557 bool blob = data->set.ssl.primary.cert_blob != NULL;
560 certdata = data->set.ssl.primary.cert_blob->data;
561 certsize = data->set.ssl.primary.cert_blob->len;
565 data->set.ssl.primary.clientcert);
572 if(result && (data->set.ssl.primary.clientcert[0]!='\0'))
573 fInCert = fopen(data->set.ssl.primary.clientcert, "rb");
578 data->set.ssl.primary.clientcert);
584 if((fInCert || blob) && (data->set.ssl.cert_type) &&
585 (!strcasecompare(data->set.ssl.cert_type, "P12"))) {
588 blob ? "(memory blob)" : data->set.ssl.primary.clientcert);
603 "(memory blob)" : data->set.ssl.primary.clientcert;
624 data->set.ssl.primary.clientcert);
634 if(data->set.ssl.key_passwd)
635 pwd_len = strlen(data->set.ssl.key_passwd);
641 data->set.ssl.key_passwd,
736 if(data->set.ssl.primary.clientcert || data->set.ssl.primary.cert_blob) {
767 long as the user did not set a legacy algorithm list
978 /* Pre-Windows 10 1809 or the user set a legacy algorithm list. Although MS
992 "user set an algorithm cipher list.");
1573 data->set.str[STRING_SSL_PINNEDPUBLICKEY_PROXY]:
1574 data->set.str[STRING_SSL_PINNEDPUBLICKEY];
1783 if(data->set.ssl.certinfo) {
2110 * Don't return or set backend->recv_unrecoverable_err unless in the cleanup.
2111 * The pattern for return error is set *err, optional infof, goto cleanup.
2753 const struct ssl_general_config *cfg = &data->set.general_ssl;