Home
last modified time | relevance | path

Searched refs:peer (Results 1 – 12 of 12) sorted by relevance

/PHP-5.6/ext/sockets/tests/
H A Dsocket_getpeername.phpt30 Warning: socket_getpeername(): unable to retrieve peer name [%i]: %a in %s on line %i
H A Dsocket_getpeername_ipv4loop.phpt55 die('Unable to retrieve peer name');
H A Dsocket_getpeername_ipv6loop.phpt56 die('Unable to retrieve peer name');
H A Dsocket_strerror.phpt129 string(24) "Connection reset by peer"
/PHP-5.6/ext/openssl/tests/
H A Dbug68920.phpt51 Warning: stream_socket_client(): Expected peer fingerprint must be a string or an array in %s on li…
58 Warning: stream_socket_client(): Expected peer fingerprint must be a string or an array in %s on li…
H A Dsan_peer_matching.phpt45 Warning: stream_socket_client(): Unable to locate peer certificate CN in %s on line %d
H A Dpeer_verification.phpt40 // Should succeed with peer verification disabled in context
H A Dopenssl_peer_fingerprint_basic.phpt2 Testing peer fingerprint on connection
/PHP-5.6/ext/openssl/
H A Dxp_ssl.c285 static zend_bool php_x509_fingerprint_match(X509 *peer, zval *val TSRMLS_DC) in php_x509_fingerprint_match() argument
300 return method && php_x509_fingerprint_cmp(peer, method, Z_STRVAL_P(val) TSRMLS_CC) == 0; in php_x509_fingerprint_match()
324 if (php_x509_fingerprint_cmp(peer, key, Z_STRVAL_PP(current) TSRMLS_CC) != 0) { in php_x509_fingerprint_match()
373 static zend_bool matches_san_list(X509 *peer, const char *subject_name) /* {{{ */ in matches_san_list() argument
379 GENERAL_NAMES *alt_names = X509_get_ext_d2i(peer, NID_subject_alt_name, 0, 0); in matches_san_list()
427 static zend_bool matches_common_name(X509 *peer, const char *subject_name TSRMLS_DC) /* {{{ */ in matches_common_name() argument
434 cert_name = X509_get_subject_name(peer); in matches_common_name()
474 if ((must_verify_peer || must_verify_peer_name || must_verify_fingerprint) && peer == NULL) { in apply_peer_verification_policy()
505 if (!php_x509_fingerprint_match(peer, *val TSRMLS_CC)) { in apply_peer_verification_policy()
535 if (matches_san_list(peer, peer_name)) { in apply_peer_verification_policy()
[all …]
H A Dopenssl.c1796 int php_openssl_x509_fingerprint(X509 *peer, const char *method, zend_bool raw, char **out, int *ou… in php_openssl_x509_fingerprint() argument
1805 } else if (!X509_digest(peer, mdtype, md, &n)) { in php_openssl_x509_fingerprint()
/PHP-5.6/
H A DUPGRADING48 streams now verify peer certificates by default. Previous versions
49 required users to manually enable peer verification. As a result of this
52 connect successfully without manually disabling peer verification via the
57 security enhancement. (https://wiki.php.net/rfc/tls-peer-verification)
108 - Stream wrappers verify peer certificates and host names by default in
146 - Added "peer_name" SSL context option to better reflect peer certificate
151 - Independent peer cert and peer name validation is now available via a new
H A DNEWS978 . Fixed bug #68344 (MySQLi does not provide way to disable peer certificate
2284 (RFC: https://wiki.php.net/rfc/tls-peer-verification). (Daniel Lowrey)
2294 . Fallback to Windows CA cert store for peer verification if no openssl.cafile
2311 . New openssl_get_cert_locations() function to aid CA file and peer
2348 peer verification fails. (Daniel Lowrey)

Completed in 55 milliseconds