Lines Matching defs:check
78 /* convenience macro to check if this handle is using a shared SSL session */
433 /* check for CURLOPT_SSLVERSION invalid parameter value */
543 struct Curl_ssl_session *check;
566 check = &data->state.session[i];
567 if(!check->sessionid)
570 if(strcasecompare(connssl->peer.hostname, check->name) &&
571 ((!cf->conn->bits.conn_to_host && !check->conn_to_host) ||
572 (cf->conn->bits.conn_to_host && check->conn_to_host &&
573 strcasecompare(cf->conn->conn_to_host.name, check->conn_to_host))) &&
574 ((!cf->conn->bits.conn_to_port && check->conn_to_port == -1) ||
575 (cf->conn->bits.conn_to_port && check->conn_to_port != -1 &&
576 cf->conn->conn_to_port == check->conn_to_port)) &&
577 (connssl->port == check->remote_port) &&
578 strcasecompare(cf->conn->handler->scheme, check->scheme) &&
579 match_ssl_primary_config(data, conn_config, &check->ssl_config)) {
582 check->age = *general_age; /* set this as used in this age */
583 *ssl_sessionid = check->sessionid;
585 *idsize = check->idsize;
605 /* defensive check */
628 struct Curl_ssl_session *check = &data->state.session[i];
630 if(check->sessionid == ssl_sessionid) {
631 Curl_ssl_kill_session(check);
975 * Generic pinned public key check.