Lines Matching refs:PR_TRUE
241 cipher_state[i] = PR_TRUE;
242 found = PR_TRUE;
262 if(SSL_CipherPrefSet(model, cipherlist[i].num, PR_TRUE) != SECSuccess) {
406 SECITEM_FreeItem(crl_der, PR_TRUE);
454 SECITEM_FreeItem(crl_der, PR_TRUE);
463 SECITEM_FreeItem(crl_der, PR_TRUE);
539 SECITEM_FreeItem(crl_der, PR_TRUE);
568 status = PK11_Authenticate(slot, PR_TRUE,
779 *canFalseStart = PR_TRUE;
973 SECITEM_FreeItem(cert_der, PR_TRUE);
1406 CURLcode result = nss_load_cert(&conn->ssl[sockindex], cafile, PR_TRUE);
1429 if(CURLE_OK != nss_load_cert(&conn->ssl[sockindex], fullpath, PR_TRUE))
1535 sock_opt.value.non_blocking = PR_TRUE;
1604 if(SSL_OptionSet(model, SSL_SECURITY, PR_TRUE) != SECSuccess)
1608 if(SSL_OptionSet(model, SSL_HANDSHAKE_AS_CLIENT, PR_TRUE) != SECSuccess)
1613 PR_FALSE : PR_TRUE;
1741 if(SSL_OptionSet(connssl->handle, SSL_ENABLE_OCSP_STAPLING, PR_TRUE)
1749 ? PR_TRUE : PR_FALSE) != SECSuccess)
1755 ? PR_TRUE : PR_FALSE) != SECSuccess)
1761 if(SSL_OptionSet(connssl->handle, SSL_ENABLE_FALSE_START, PR_TRUE)
2041 PK11_DestroyContext(MD5pw, PR_TRUE);