Searched refs:peer (Results 1 – 12 of 12) sorted by relevance
/PHP-5.6/ext/sockets/tests/ |
H A D | socket_getpeername.phpt | 30 Warning: socket_getpeername(): unable to retrieve peer name [%i]: %a in %s on line %i
|
H A D | socket_getpeername_ipv4loop.phpt | 55 die('Unable to retrieve peer name');
|
H A D | socket_getpeername_ipv6loop.phpt | 56 die('Unable to retrieve peer name');
|
H A D | socket_strerror.phpt | 129 string(24) "Connection reset by peer"
|
/PHP-5.6/ext/openssl/tests/ |
H A D | bug68920.phpt | 51 Warning: stream_socket_client(): Expected peer fingerprint must be a string or an array in %s on li… 58 Warning: stream_socket_client(): Expected peer fingerprint must be a string or an array in %s on li…
|
H A D | san_peer_matching.phpt | 45 Warning: stream_socket_client(): Unable to locate peer certificate CN in %s on line %d
|
H A D | peer_verification.phpt | 40 // Should succeed with peer verification disabled in context
|
H A D | openssl_peer_fingerprint_basic.phpt | 2 Testing peer fingerprint on connection
|
/PHP-5.6/ext/openssl/ |
H A D | xp_ssl.c | 285 static zend_bool php_x509_fingerprint_match(X509 *peer, zval *val TSRMLS_DC) in php_x509_fingerprint_match() argument 300 return method && php_x509_fingerprint_cmp(peer, method, Z_STRVAL_P(val) TSRMLS_CC) == 0; in php_x509_fingerprint_match() 324 if (php_x509_fingerprint_cmp(peer, key, Z_STRVAL_PP(current) TSRMLS_CC) != 0) { in php_x509_fingerprint_match() 373 static zend_bool matches_san_list(X509 *peer, const char *subject_name) /* {{{ */ in matches_san_list() argument 379 GENERAL_NAMES *alt_names = X509_get_ext_d2i(peer, NID_subject_alt_name, 0, 0); in matches_san_list() 427 static zend_bool matches_common_name(X509 *peer, const char *subject_name TSRMLS_DC) /* {{{ */ in matches_common_name() argument 434 cert_name = X509_get_subject_name(peer); in matches_common_name() 474 if ((must_verify_peer || must_verify_peer_name || must_verify_fingerprint) && peer == NULL) { in apply_peer_verification_policy() 505 if (!php_x509_fingerprint_match(peer, *val TSRMLS_CC)) { in apply_peer_verification_policy() 535 if (matches_san_list(peer, peer_name)) { in apply_peer_verification_policy() [all …]
|
H A D | openssl.c | 1796 int php_openssl_x509_fingerprint(X509 *peer, const char *method, zend_bool raw, char **out, int *ou… in php_openssl_x509_fingerprint() argument 1805 } else if (!X509_digest(peer, mdtype, md, &n)) { in php_openssl_x509_fingerprint()
|
/PHP-5.6/ |
H A D | UPGRADING | 48 streams now verify peer certificates by default. Previous versions 49 required users to manually enable peer verification. As a result of this 52 connect successfully without manually disabling peer verification via the 57 security enhancement. (https://wiki.php.net/rfc/tls-peer-verification) 108 - Stream wrappers verify peer certificates and host names by default in 146 - Added "peer_name" SSL context option to better reflect peer certificate 151 - Independent peer cert and peer name validation is now available via a new
|
H A D | NEWS | 978 . Fixed bug #68344 (MySQLi does not provide way to disable peer certificate 2284 (RFC: https://wiki.php.net/rfc/tls-peer-verification). (Daniel Lowrey) 2294 . Fallback to Windows CA cert store for peer verification if no openssl.cafile 2311 . New openssl_get_cert_locations() function to aid CA file and peer 2348 peer verification fails. (Daniel Lowrey)
|
Completed in 55 milliseconds