curl_easy_setopt(handle,CURLOPT_FAILONERROR,1);
// This may (but probably won't) help with < 7.20 bug in DNS caching.
curl_easy_setopt(handle,CURLOPT_DNS_CACHE_TIMEOUT,120);
curl_easy_setopt(handle,CURLOPT_FAILONERROR,1);
// This may (but probably won't) help with < 7.20 bug in DNS caching.
curl_easy_setopt(handle,CURLOPT_DNS_CACHE_TIMEOUT,120);
// Verification of the peer is via TrustEngine only.
curl_easy_setopt(handle,CURLOPT_SSL_VERIFYPEER,0);
curl_easy_setopt(handle,CURLOPT_CAINFO,nullptr);
// Verification of the peer is via TrustEngine only.
curl_easy_setopt(handle,CURLOPT_SSL_VERIFYPEER,0);
curl_easy_setopt(handle,CURLOPT_CAINFO,nullptr);
- Category& log=Category::getInstance(XMLTOOLING_LOGCAT".SOAPTransport.CURL");
- Category& log_curl=Category::getInstance(XMLTOOLING_LOGCAT".libcurl");
+ Category& log=Category::getInstance(XMLTOOLING_LOGCAT ".SOAPTransport.CURL");
+ Category& log_curl=Category::getInstance(XMLTOOLING_LOGCAT ".libcurl");
// For this implementation, it's sufficient to check for https as a sign of transport security.
if (m_mandatory && !isConfidential())
// For this implementation, it's sufficient to check for https as a sign of transport security.
if (m_mandatory && !isConfidential())
#ifndef XMLTOOLING_NO_XMLSEC
int xmltooling::verify_callback(X509_STORE_CTX* x509_ctx, void* arg)
{
#ifndef XMLTOOLING_NO_XMLSEC
int xmltooling::verify_callback(X509_STORE_CTX* x509_ctx, void* arg)
{
log.debug("invoking custom X.509 verify callback");
#if (OPENSSL_VERSION_NUMBER >= 0x00907000L)
CURLSOAPTransport* ctx = reinterpret_cast<CURLSOAPTransport*>(arg);
log.debug("invoking custom X.509 verify callback");
#if (OPENSSL_VERSION_NUMBER >= 0x00907000L)
CURLSOAPTransport* ctx = reinterpret_cast<CURLSOAPTransport*>(arg);