Searched refs:peername (Results 1 – 10 of 10) sorted by relevance
/openssl-master/crypto/x509/ |
A D | x509_vpm.c | 104 OPENSSL_free(param->peername); in X509_VERIFY_PARAM_free() 410 return param->peername; in X509_VERIFY_PARAM_get0_peername() 421 char *peername = (from != NULL) ? from->peername : NULL; in X509_VERIFY_PARAM_move_peername() local 423 if (to->peername != peername) { in X509_VERIFY_PARAM_move_peername() 424 OPENSSL_free(to->peername); in X509_VERIFY_PARAM_move_peername() 425 to->peername = peername; in X509_VERIFY_PARAM_move_peername() 428 from->peername = NULL; in X509_VERIFY_PARAM_move_peername()
|
A D | v3_utl.c | 823 char **peername) in do_check_string() argument 836 if (rv > 0 && peername) in do_check_string() 837 *peername = OPENSSL_strndup((char *)a->data, a->length); in do_check_string() 850 if (rv > 0 && peername) in do_check_string() 851 *peername = OPENSSL_strndup((char *)astr, astrlen); in do_check_string() 858 unsigned int flags, int check_type, char **peername) in do_x509_check() argument 914 chk, chklen, peername)) != 0) in do_x509_check() 932 chk, chklen, peername)) != 0) in do_x509_check() 954 chk, chklen, peername)) != 0) in do_x509_check() 961 unsigned int flags, char **peername) in X509_check_host() argument [all …]
|
A D | x509_local.h | 34 char *peername; /* Matching hostname in peer certificate */ member
|
A D | x509_vfy.c | 778 if (vpm->peername != NULL) { in check_hosts() 779 OPENSSL_free(vpm->peername); in check_hosts() 780 vpm->peername = NULL; in check_hosts() 784 if (X509_check_host(x, name, 0, vpm->hostflags, &vpm->peername) > 0) in check_hosts()
|
/openssl-master/doc/man3/ |
A D | SSL_set1_host.pod | 69 SSL_get0_peername() returns NULL if peername verification is not 70 applicable (as with RFC7671 DANE-EE(3)), or no trusted peername was 71 matched. Otherwise, it returns the matched peername. To determine 93 const char *peername = SSL_get0_peername(ssl); 95 if (peername != NULL) 96 /* Name checks were in scope and matched the peername */
|
A D | X509_check_host.pod | 12 unsigned int flags, char **peername); 44 When the certificate is matched, and B<peername> is not NULL, a 46 is stored at the address passed in B<peername>. The application 47 is responsible for freeing the peername via OPENSSL_free() when it
|
A D | SSL_CTX_dane_enable.pod | 303 const char *peername = SSL_get0_peername(ssl); 314 if (peername != NULL) { 315 /* Name checks were in scope and matched the peername */ 316 printf("Verified peername: %s\n", peername);
|
/openssl-master/apps/lib/ |
A D | s_cb.c | 1161 const char *peername = SSL_get0_peername(s); in print_verify_detail() local 1164 if (peername != NULL) in print_verify_detail() 1165 BIO_printf(bio, "Verified peername: %s\n", peername); in print_verify_detail()
|
/openssl-master/include/openssl/ |
A D | x509v3.h.in | 771 unsigned int flags, char **peername);
|
/openssl-master/doc/man1/ |
A D | openssl-s_client.pod.in | 377 Verified peername: smtp.example.com
|
Completed in 31 milliseconds