- if (conf->ssl_engine) {
-
- /* use crypto engine */
- if (curl_easy_setopt(curl, CURLOPT_SSLENGINE, conf->ssl_engine) != CURLE_OK){
- opkg_msg(ERROR, "Can't set crypto engine '%s'.\n",
- conf->ssl_engine);
-
- opkg_curl_cleanup();
- return NULL;
- }
- /* set the crypto engine as default */
- if (curl_easy_setopt(curl, CURLOPT_SSLENGINE_DEFAULT, 1L) != CURLE_OK){
- opkg_msg(ERROR, "Can't set crypto engine '%s' as default.\n",
- conf->ssl_engine);
-
- opkg_curl_cleanup();
- return NULL;
- }
- }
-
- /* cert & key can only be in PEM case in the same file */
- if(conf->ssl_key_passwd){
- if (curl_easy_setopt(curl, CURLOPT_SSLKEYPASSWD, conf->ssl_key_passwd) != CURLE_OK)
- {
- opkg_msg(DEBUG, "Failed to set key password.\n");
- }
- }
-
- /* sets the client certificate and its type */
- if(conf->ssl_cert_type){
- if (curl_easy_setopt(curl, CURLOPT_SSLCERTTYPE, conf->ssl_cert_type) != CURLE_OK)
- {
- opkg_msg(DEBUG, "Failed to set certificate format.\n");
- }
- }
- /* SSL cert name isn't mandatory */
- if(conf->ssl_cert){
- curl_easy_setopt(curl, CURLOPT_SSLCERT, conf->ssl_cert);
- }
-
- /* sets the client key and its type */
- if(conf->ssl_key_type){
- if (curl_easy_setopt(curl, CURLOPT_SSLKEYTYPE, conf->ssl_key_type) != CURLE_OK)
- {
- opkg_msg(DEBUG, "Failed to set key format.\n");
- }
- }
- if(conf->ssl_key){
- if (curl_easy_setopt(curl, CURLOPT_SSLKEY, conf->ssl_key) != CURLE_OK)
- {
- opkg_msg(DEBUG, "Failed to set key.\n");
- }
- }
-
- /* Should we verify the peer certificate ? */
- if(conf->ssl_dont_verify_peer){
- /*
- * CURLOPT_SSL_VERIFYPEER default is nonzero (curl => 7.10)
- */
- curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, 0);
- }else{
+ /* sets the client certificate and its type */
+ if (conf->ssl_cert_type) {
+ if (curl_easy_setopt
+ (curl, CURLOPT_SSLCERTTYPE,
+ conf->ssl_cert_type) != CURLE_OK) {
+ opkg_msg(DEBUG,
+ "Failed to set certificate format.\n");
+ }
+ }
+ /* SSL cert name isn't mandatory */
+ if (conf->ssl_cert) {
+ curl_easy_setopt(curl, CURLOPT_SSLCERT, conf->ssl_cert);
+ }
+
+ /* sets the client key and its type */
+ if (conf->ssl_key_type) {
+ if (curl_easy_setopt
+ (curl, CURLOPT_SSLKEYTYPE,
+ conf->ssl_key_type) != CURLE_OK) {
+ opkg_msg(DEBUG, "Failed to set key format.\n");
+ }
+ }
+ if (conf->ssl_key) {
+ if (curl_easy_setopt
+ (curl, CURLOPT_SSLKEY, conf->ssl_key) != CURLE_OK) {
+ opkg_msg(DEBUG, "Failed to set key.\n");
+ }
+ }
+
+ /* Should we verify the peer certificate ? */
+ if (conf->ssl_dont_verify_peer) {
+ /*
+ * CURLOPT_SSL_VERIFYPEER default is nonzero (curl => 7.10)
+ */
+ curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, 0);
+ } else {