Lines Matching refs:err
536 OSStatus err = noErr; in CopyIdentityWithLabel() local
540 err = SecIdentityCopyCertificate(identity, &cert); in CopyIdentityWithLabel()
541 if(err == noErr) { in CopyIdentityWithLabel()
727 OSStatus err; in sectransp_set_ssl_version_min_max() local
772 err = SSLSetProtocolVersionMin(backend->ssl_ctx, ver_min); in sectransp_set_ssl_version_min_max()
773 if(err != noErr) { in sectransp_set_ssl_version_min_max()
777 err = SSLSetProtocolVersionMax(backend->ssl_ctx, ver_max); in sectransp_set_ssl_version_min_max()
778 if(err != noErr) { in sectransp_set_ssl_version_min_max()
864 OSStatus err = noErr; in sectransp_get_supported_ciphers() local
867 err = SSLGetNumberSupportedCiphers(ssl_ctx, len); in sectransp_get_supported_ciphers()
868 if(err != noErr) in sectransp_get_supported_ciphers()
875 err = SSLGetSupportedCiphers(ssl_ctx, ciphers, len); in sectransp_get_supported_ciphers()
876 if(err != noErr) in sectransp_get_supported_ciphers()
911 OSStatus err; in sectransp_set_default_ciphers() local
937 err = SSLSetEnabledCiphers(ssl_ctx, ciphers, count); in sectransp_set_default_ciphers()
938 if(err != noErr) { in sectransp_set_default_ciphers()
939 failf(data, "SSL: SSLSetEnabledCiphers() failed: OSStatus %d", err); in sectransp_set_default_ciphers()
956 OSStatus err; in sectransp_set_selected_ciphers() local
1005 err = SSLSetEnabledCiphers(ssl_ctx, selected, count); in sectransp_set_selected_ciphers()
1006 if(err != noErr) { in sectransp_set_selected_ciphers()
1007 failf(data, "SSL: SSLSetEnabledCiphers() failed: OSStatus %d", err); in sectransp_set_selected_ciphers()
1046 OSStatus err = noErr; local
1072 err = SSLNewContext(FALSE, &(backend->ssl_ctx));
1073 if(err != noErr) {
1074 failf(data, "SSL: could not create a context: OSStatus %d", err);
1082 err = SSLNewContext(FALSE, &(backend->ssl_ctx));
1083 if(err != noErr) {
1084 failf(data, "SSL: could not create a context: OSStatus %d", err);
1111 err = SSLSetALPNProtocols(backend->ssl_ctx, alpnArr);
1112 if(err != noErr)
1114 err);
1137 err = CopyIdentityWithLabel(ssl_cert, &cert_and_key);
1139 err = !noErr;
1140 if((err != noErr) && (is_cert_file || is_cert_data)) {
1150 err = CopyIdentityFromPKCS12File(ssl_cert, ssl_cert_blob,
1155 if(err == noErr && cert_and_key) {
1161 err = SecIdentityCopyCertificate(cert_and_key, &cert);
1162 if(err == noErr) {
1179 err = SSLSetCertificate(backend->ssl_ctx, certs);
1182 if(err != noErr) {
1183 failf(data, "SSL: SSLSetCertificate() failed: OSStatus %d", err);
1192 switch(err) {
1212 "key: OSStatus %d", cert_showfilename_error, err);
1245 err = SSLSetSessionOption(backend->ssl_ctx,
1248 if(err != noErr) {
1249 failf(data, "SSL: SSLSetSessionOption() failed: OSStatus %d", err);
1255 err = SSLSetEnableCertVerify(backend->ssl_ctx,
1257 if(err != noErr) {
1258 failf(data, "SSL: SSLSetEnableCertVerify() failed: OSStatus %d", err);
1264 err = SSLSetEnableCertVerify(backend->ssl_ctx,
1266 if(err != noErr) {
1267 failf(data, "SSL: SSLSetEnableCertVerify() failed: OSStatus %d", err);
1289 err = SSLSetPeerDomainName(backend->ssl_ctx, server, strlen(server));
1291 if(err != noErr) {
1293 err);
1340 err = SSLSetPeerID(backend->ssl_ctx, ssl_sessionid, ssl_sessionid_len);
1342 if(err != noErr) {
1343 failf(data, "SSL: SSLSetPeerID() failed: OSStatus %d", err);
1359 err = SSLSetPeerID(backend->ssl_ctx, ssl_sessionid, ssl_sessionid_len);
1360 if(err != noErr) {
1362 failf(data, "SSL: SSLSetPeerID() failed: OSStatus %d", err);
1375 err = SSLSetIOFuncs(backend->ssl_ctx,
1378 if(err != noErr) {
1379 failf(data, "SSL: SSLSetIOFuncs() failed: OSStatus %d", err);
1383 err = SSLSetConnection(backend->ssl_ctx, cf);
1384 if(err != noErr) {
1385 failf(data, "SSL: SSLSetConnection() failed: %d", err);
1396 size_t i, j, err; local
1432 err = Curl_base64_decode((const char *)b64, out, outlen);
1434 if(err) {
1804 OSStatus err; local
1815 err = SSLHandshake(backend->ssl_ctx);
1817 if(err != noErr) {
1818 switch(err) {
2030 connssl->peer.hostname, err);
2092 err = SSLCopyALPNProtocols(backend->ssl_ctx, &alpnArr);
2094 if(err == noErr && alpnArr && CFArrayGetCount(alpnArr) >= 1)
2182 OSStatus err; local
2197 err = SSLCopyPeerTrust(backend->ssl_ctx, &trust);
2200 if(err == noErr && trust) {
2219 err = SSLCopyPeerTrust(backend->ssl_ctx, &trust);
2222 if(err == noErr && trust) {
2235 err = SSLCopyPeerCertificates(backend->ssl_ctx, &server_certs);
2237 if(err == noErr && server_certs) {
2253 err = SSLCopyPeerCertificates(backend->ssl_ctx, &server_certs);
2254 if(err == noErr) {
2441 OSStatus err; local
2444 err = SSLClose(backend->ssl_ctx);
2445 switch(err) {
2454 CURL_TRC_CF(data, cf, "shutdown, error: %d", (int)err);
2536 OSStatus err; local
2544 err = SSLGetBufferedReadSize(backend->ssl_ctx, &buffer);
2545 if(err == noErr)
2603 OSStatus err; local
2624 err = SSLWrite(backend->ssl_ctx, NULL, 0UL, &processed);
2625 switch(err) {
2636 failf(data, "SSLWrite() returned error %d", err);
2643 err = SSLWrite(backend->ssl_ctx, mem, len, &processed);
2644 if(err != noErr) {
2645 switch(err) {
2653 failf(data, "SSLWrite() returned error %d", err);
2673 OSStatus err; local
2679 err = SSLRead(backend->ssl_ctx, buf, buffersize, &processed);
2681 if(err != noErr) {
2682 switch(err) {
2714 failf(data, "SSLRead() return error %d", err);