occurlfunctions.c#171        struct OCSSLssl = &state->ssl;
#172        CHECK(stateCURLOPT_SSL_VERIFYPEER, (OPTARG)(ssl->verifypeer?1L:0L));
#173        CHECK(stateCURLOPT_SSL_VERIFYHOST, (OPTARG)(ssl->verifyhost?1L:0L));
#174        if(ssl->certificate)
#175            CHECK(stateCURLOPT_SSLCERTssl->certificate);
#176        if(ssl->key)
#177            CHECK(stateCURLOPT_SSLKEYssl->key);
#178        if(ssl->keypasswd)
#180            CHECK(stateCURLOPT_KEYPASSWDssl->keypasswd);
#181        if(ssl->cainfo)
#182            CHECK(stateCURLOPT_CAINFOssl->cainfo);
#183        if(ssl->capath)
#184            CHECK(stateCURLOPT_CAPATHssl->capath);
#410 if(state->ssl.certificate != NULL) free(state->ssl.certificate);
#411 state->ssl.certificate = strdup((char*)value);
#414 if(state->ssl.key != NULL) free(state->ssl.key);
#415 state->ssl.key = strdup((char*)value);
#418 if(state->ssl.keypasswd!= NULL) free(state->ssl.keypasswd);
#419 state->ssl.keypasswd = strdup((char*)value);
#422      state->ssl.verifypeer = (long)value;
#425      state->ssl.verifyhost = (long)value;
#428      if(state->ssl.cainfo != NULL) free(state->ssl.cainfo);
#429      state->ssl.cainfo = strdup((char*)value);
#432 if(state->ssl.capath != NULL) free(state->ssl.capath);
#433 state->ssl.capath = strdup((char*)value);
ocinternal.c#446    ocfree(state->ssl.certificate);
#447    ocfree(state->ssl.key);
#448    ocfree(state->ssl.keypasswd);
#449    ocfree(state->ssl.cainfo);
#450    ocfree(state->ssl.capath);
ocinternal.h#214    } ssl;
ocrc.c#478     state->ssl.verifypeer = 1;
#479     state->ssl.verifyhost = 1;
#486        state->ssl.certificate = strdup(value);
#487        if(state->ssl.certificate == NULL) {stat = OC_ENOMEM; goto done;}
#489            oclog(OCLOGNOTE,"HTTP.SSL.CERTIFICATE: %s", state->ssl.certificate);
#493        state->ssl.key = strdup(value);
#494        if(state->ssl.key == NULL) {stat = OC_ENOMEM; goto done;}
#496            oclog(OCLOGNOTE,"HTTP.SSL.KEY: %s", state->ssl.key);
#500        state->ssl.keypasswd = strdup(value);
#501        if(state->ssl.keypasswd == NULL) {stat = OC_ENOMEM; goto done;}
#503            oclog(OCLOGNOTE,"HTTP.SSL.KEYPASSWORD: %s", state->ssl.keypasswd);
#507        state->ssl.cainfo = strdup(value);
#508        if(state->ssl.cainfo == NULL) {stat = OC_ENOMEM; goto done;}
#510            oclog(OCLOGNOTE,"HTTP.SSL.CAINFO: %s", state->ssl.cainfo);
#514        state->ssl.capath = strdup(value);
#515        if(state->ssl.capath == NULL) {stat = OC_ENOMEM; goto done;}
#517            oclog(OCLOGNOTE,"HTTP.SSL.CAPATH: %s", state->ssl.capath);
#529        state->ssl.verifypeer = tf;
#531            oclog(OCLOGNOTE,"HTTP.SSL.VERIFYPEER: %d", state->ssl.verifypeer);


HyperKWIC - Version 7.20DA executed at 11:37 on 27 Oct 2017 | Polyhedron Solutions - INTERNAL USE | COMMERCIAL (Any O/S) SN 4AKIed