Searched refs:peer_name (Results 1 – 22 of 22) sorted by relevance
/PHP-5.6/ext/openssl/tests/ |
H A D | sni_server.phpt | 36 $ctxArr['peer_name'] = 'domain1.com'; 42 $ctxArr['peer_name'] = 'domain2.com'; 48 $ctxArr['peer_name'] = 'domain3.com';
|
H A D | bug69215.phpt | 18 'peer_name' => 'bug69215-client', 36 'peer_name' => 'bug69215-server',
|
H A D | san_peer_matching.phpt | 33 stream_context_set_option($clientCtx, 'ssl', 'peer_name', 'example.org'); 36 stream_context_set_option($clientCtx, 'ssl', 'peer_name', 'moar.example.org');
|
H A D | stream_verify_peer_name_001.phpt | 27 'peer_name' => 'bug54992.local'
|
H A D | bug68879.phpt | 29 'peer_name' => '10.2.0.1',
|
H A D | bug68265.phpt | 29 'peer_name' => 'debs.ak-online.net',
|
H A D | bug73072.phpt | 36 $ctxArr['peer_name'] = 'domain1.com';
|
H A D | stream_crypto_flags_001.phpt | 30 'peer_name' => 'bug54992.local',
|
H A D | bug65538_001.phpt | 40 'peer_name' => 'bug54992.local',
|
H A D | bug65538_003.phpt | 41 'peer_name' => 'bug54992.local',
|
H A D | stream_crypto_flags_003.phpt | 35 'peer_name' => 'bug54992.local',
|
H A D | session_meta_capture.phpt | 32 'peer_name' => 'bug54992.local',
|
H A D | stream_crypto_flags_002.phpt | 32 'peer_name' => 'bug54992.local',
|
H A D | bug48182.phpt | 31 'peer_name' => 'bug54992.local'
|
H A D | peer_verification.phpt | 50 'peer_name' => 'bug54992.local',
|
H A D | stream_crypto_flags_004.phpt | 32 'peer_name' => 'bug54992.local',
|
H A D | bug65729.phpt | 36 'peer_name' => $expected_name,
|
H A D | openssl_peer_fingerprint_basic.phpt | 30 'peer_name' => 'bug54992.local',
|
H A D | bug54992.phpt | 70 'peer_name' => 'buga_buga',
|
/PHP-5.6/ext/openssl/ |
H A D | xp_ssl.c | 454 char *peer_name = NULL; in apply_peer_verification_policy() local 521 GET_VER_OPT_STRING("peer_name", peer_name); in apply_peer_verification_policy() 524 GET_VER_OPT_STRING("CN_match", peer_name); in apply_peer_verification_policy() 530 if (peer_name == NULL && sslsock->is_client) { in apply_peer_verification_policy() 531 peer_name = sslsock->url_name; in apply_peer_verification_policy() 534 if (peer_name) { in apply_peer_verification_policy() 535 if (matches_san_list(peer, peer_name)) { in apply_peer_verification_policy() 537 } else if (matches_common_name(peer, peer_name TSRMLS_CC)) { in apply_peer_verification_policy()
|
/PHP-5.6/ |
H A D | UPGRADING | 146 - Added "peer_name" SSL context option to better reflect peer certificate 191 favor of the new "peer_name" option. Name verification now checks certificate 195 "peer_name" value.
|
H A D | NEWS | 2299 . New "peer_name" SSL context option replaces "CN_match" (which still works
|
Completed in 90 milliseconds