Lines Matching refs:SECSuccess
268 if(SSL_CipherPrefSet(model, cipherlist[i].num, PR_TRUE) != SECSuccess) { in set_ciphers()
274 return SECSuccess; in set_ciphers()
474 if(SECSuccess != CERT_CacheCRL(db, crl_der)) { in nss_cache_crl()
578 return (SECSuccess == status) ? CURLE_OK : CURLE_SSL_CERTPROBLEM; in nss_load_key()
673 if(cacheResult != SECSuccess) { in nss_auth_cert_hook()
682 return SECSuccess; in nss_auth_cert_hook()
703 if(SSL_GetNextProto(sock, &state, buf, &buflen, buflenmax) == SECSuccess) { in HandshakeCallback()
749 if(SSL_GetChannelInfo(sock, &channelInfo, sizeof(channelInfo)) != SECSuccess) in CanFalseStartCallback()
753 sizeof(cipherInfo)) != SECSuccess) in CanFalseStartCallback()
777 if(rv != SECSuccess || !negotiatedExtension) { in CanFalseStartCallback()
782 if(rv != SECSuccess || !negotiatedExtension) in CanFalseStartCallback()
790 return SECSuccess; in CanFalseStartCallback()
834 SECSuccess && channel.length == sizeof channel && in display_conn_info()
837 &suite, sizeof suite) == SECSuccess) { in display_conn_info()
904 return SECSuccess; in BadCertHandler()
928 SECStatus res=SECSuccess; in check_issuer_cert()
1023 &cert_der) != SECSuccess) { in SelectClientCert()
1050 return SECSuccess; in SelectClientCert()
1054 if(SECSuccess != NSS_GetClientAuthData((void *)nickname, sock, caNames, in SelectClientCert()
1079 return SECSuccess; in SelectClientCert()
1284 if(mod && SECSuccess == SECMOD_UnloadUserModule(mod)) { in Curl_nss_cleanup()
1603 if(SSL_OptionSet(model, SSL_SECURITY, PR_TRUE) != SECSuccess) in nss_setup_connect()
1605 if(SSL_OptionSet(model, SSL_HANDSHAKE_AS_SERVER, PR_FALSE) != SECSuccess) in nss_setup_connect()
1607 if(SSL_OptionSet(model, SSL_HANDSHAKE_AS_CLIENT, PR_TRUE) != SECSuccess) in nss_setup_connect()
1613 if(SSL_OptionSet(model, SSL_NO_CACHE, ssl_no_cache) != SECSuccess) in nss_setup_connect()
1619 if(SSL_VersionRangeSet(model, &sslver) != SECSuccess) in nss_setup_connect()
1626 if(SSL_OptionSet(model, SSL_CBC_RANDOM_IV, ssl_cbc_random_iv) != SECSuccess) in nss_setup_connect()
1635 if(set_ciphers(data, model, data->set.ssl.cipher_list) != SECSuccess) { in nss_setup_connect()
1646 if(SSL_AuthCertificateHook(model, nss_auth_cert_hook, conn) != SECSuccess) in nss_setup_connect()
1650 if(SSL_BadCertHook(model, BadCertHandler, conn) != SECSuccess) in nss_setup_connect()
1653 if(SSL_HandshakeCallback(model, HandshakeCallback, conn) != SECSuccess) in nss_setup_connect()
1696 (void *)connssl) != SECSuccess) { in nss_setup_connect()
1741 != SECSuccess) in nss_setup_connect()
1748 ? PR_TRUE : PR_FALSE) != SECSuccess) in nss_setup_connect()
1754 ? PR_TRUE : PR_FALSE) != SECSuccess) in nss_setup_connect()
1761 != SECSuccess) in nss_setup_connect()
1765 conn) != SECSuccess) in nss_setup_connect()
1787 if(SSL_SetNextProtoNego(connssl->handle, protocols, cur) != SECSuccess) in nss_setup_connect()
1795 != SECSuccess) in nss_setup_connect()
1799 if(SSL_SetURL(connssl->handle, conn->host.name) != SECSuccess) in nss_setup_connect()
1803 if(SSL_SetSockPeerID(connssl->handle, conn->host.name) != SECSuccess) in nss_setup_connect()
1832 if(SSL_ForceHandshakeWithTimeout(connssl->handle, timeout) != SECSuccess) { in nss_do_connect()
2031 if(SECSuccess != PK11_GenerateRandom(entropy, curlx_uztosi(length))) in Curl_nss_random()