/curl/lib/vquic/ |
H A D | vquic-tls.c | 200 struct ssl_peer *peer, in wssl_init_ssl() argument 218 if(peer->sni) { in wssl_init_ssl() 220 peer->sni, (unsigned short)strlen(peer->sni)); in wssl_init_ssl() 224 (void)wssl_setup_session(cf, data, &ctx->wssl, peer); in wssl_init_ssl() 234 struct ssl_peer *peer, in Curl_vquic_tls_init() argument 243 return Curl_ossl_ctx_init(&ctx->ossl, cf, data, peer, TRNSPRT_QUIC, in Curl_vquic_tls_init() 248 return Curl_gtls_ctx_init(&ctx->gtls, cf, data, peer, in Curl_vquic_tls_init() 315 struct ssl_peer *peer) in Curl_vquic_tls_verify_peer() argument 326 result = Curl_oss_check_peer_cert(cf, data, &ctx->ossl, peer); in Curl_vquic_tls_verify_peer() 338 if(peer->sni) { in Curl_vquic_tls_verify_peer() [all …]
|
H A D | vquic-tls.h | 74 struct ssl_peer *peer, 96 struct ssl_peer *peer);
|
/curl/lib/vtls/ |
H A D | openssl.h | 65 struct ssl_peer *peer, 97 const struct ssl_peer *peer, 108 struct ssl_peer *peer);
|
H A D | gtls.h | 80 struct ssl_peer *peer, 95 struct ssl_peer *peer, 102 struct ssl_peer *peer,
|
H A D | wolfssl.h | 57 struct ssl_peer *peer); 61 struct ssl_peer *peer,
|
H A D | vtls.c | 603 cf->conn->handler->scheme, peer->hostname, peer->port); in Curl_ssl_getsessionid() 1568 if(peer->dispname != peer->hostname) in Curl_ssl_peer_cleanup() 1570 free(peer->sni); in Curl_ssl_peer_cleanup() 1571 free(peer->hostname); in Curl_ssl_peer_cleanup() 1572 peer->hostname = peer->sni = peer->dispname = NULL; in Curl_ssl_peer_cleanup() 1613 DEBUGASSERT(peer); in Curl_ssl_peer_init() 1644 if(!peer->hostname) in Curl_ssl_peer_init() 1647 peer->dispname = peer->hostname; in Curl_ssl_peer_init() 1653 peer->type = get_peer_type(peer->hostname); in Curl_ssl_peer_init() 1662 if(!peer->sni) in Curl_ssl_peer_init() [all …]
|
H A D | vtls_int.h | 106 struct ssl_peer peer; member 231 const struct ssl_peer *peer, 247 const struct ssl_peer *peer,
|
H A D | gtls.c | 373 struct ssl_peer *peer, in gnutls_set_ssl_version_min_max() argument 387 if(peer->transport == TRNSPRT_QUIC) { in gnutls_set_ssl_version_min_max() 883 if(sni && peer->sni) { in gtls_client_init() 885 peer->sni, strlen(peer->sni)) < 0) { in gtls_client_init() 917 result = gnutls_set_ssl_version_min_max(data, peer, in gtls_client_init() 1052 struct ssl_peer *peer, in Curl_gtls_ctx_init() argument 1067 result = gtls_client_init(cf, data, peer, gctx); in Curl_gtls_ctx_init() 1092 if(!Curl_ssl_getsessionid(cf, data, peer, in Curl_gtls_ctx_init() 1284 struct ssl_peer *peer, in Curl_gtls_verifyserver() argument 1549 peer->sni ? peer->sni : in Curl_gtls_verifyserver() [all …]
|
H A D | wolfssl.c | 411 struct ssl_peer *peer, in wssl_cache_session() argument 441 result = Curl_ssl_set_sessionid(cf, data, peer, NULL, in wssl_cache_session() 477 struct ssl_peer *peer) in wssl_setup_session() argument 1102 if(connssl->peer.sni) { in wolfssl_connect_step1() 1103 size_t sni_len = strlen(connssl->peer.sni); in wolfssl_connect_step1() 1106 connssl->peer.sni, in wolfssl_connect_step1() 1195 (void)wssl_setup_session(cf, data, backend, &connssl->peer); in wolfssl_connect_step1() 1233 dns = Curl_fetch_addr(data, connssl->peer.hostname, connssl->peer.port); in wolfssl_connect_step1() 1342 char *snihost = connssl->peer.sni ? in wolfssl_connect_step2() 1343 connssl->peer.sni : connssl->peer.hostname; in wolfssl_connect_step2() [all …]
|
H A D | vtls.h | 115 CURLcode Curl_ssl_peer_init(struct ssl_peer *peer, 120 void Curl_ssl_peer_cleanup(struct ssl_peer *peer);
|
H A D | openssl.c | 2121 hostlen = strlen(peer->hostname); in ossl_verifyhost() 2122 switch(peer->type) { in ossl_verifyhost() 2196 peer->dispname)) { in ossl_verifyhost() 2208 peer->dispname); in ossl_verifyhost() 2229 "target %s '%s'", tname, peer->dispname); in ossl_verifyhost() 3478 struct ssl_peer *peer, in Curl_ossl_ctx_init() argument 3836 if(peer->sni) { in Curl_ossl_ctx_init() 3904 if(peer->hostname) in Curl_ossl_ctx_init() 3905 dns = Curl_fetch_addr(data, peer->hostname, peer->port); in Curl_ossl_ctx_init() 3954 peer->hostname ? peer->hostname : "NULL", outername); in Curl_ossl_ctx_init() [all …]
|
/curl/tests/server/ |
H A D | tftpd.c | 196 static curl_socket_t peer = CURL_SOCKET_BAD; variable 793 if(CURL_SOCKET_BAD == peer) { in main() 808 if(CURL_SOCKET_BAD == peer) { in main() 831 sclose(peer); in main() 832 peer = CURL_SOCKET_BAD; in main() 851 if((peer != sock) && (peer != CURL_SOCKET_BAD)) in main() 852 sclose(peer); in main() 987 getsockopt(peer, SOL_SOCKET, SO_RCVTIMEO, in do_tftp() 1232 (void) synchnet(peer); in sendtftp() 1280 n = sread(peer, rdp, PKTSIZE); in recvtftp() [all …]
|
/curl/docs/cmdline-opts/ |
H A D | cacert.md | 6 Help: CA certificate to verify peer against 21 Use the specified certificate file to verify the peer. The file may contain 40 in the system and user Keychain to verify the peer, which is the preferred 41 method of verifying the peer's certificate chain.
|
H A D | pinnedpubkey.md | 6 Help: Public key to verify peer against 20 Use the specified public key file (or hashes) to verify the peer. This can be 31 together then the peer is still verified by public key.
|
H A D | capath.md | 6 Help: CA directory to verify peer against 21 Use the specified certificate directory to verify the peer. Multiple paths can
|
H A D | crlfile.md | 21 specify peer certificates that are to be considered revoked.
|
H A D | proxy-crlfile.md | 20 that specifies peer certificates that are considered revoked when
|
/curl/docs/libcurl/opts/ |
H A D | CURLOPT_DEBUGFUNCTION.md | 70 The data is header (or header-like) data received from the peer. 74 The data is header (or header-like) data sent to the peer. 78 The data is the unprocessed protocol data received from the peer. Even if the 85 The data is protocol data sent to the peer. 89 The data is SSL/TLS (binary) data sent to the peer. 93 The data is SSL/TLS (binary) data received from the peer.
|
H A D | CURLOPT_ISSUERCERT.md | 35 the peer certificate is performed to verify the issuer is indeed the one 37 is useful in multi-level PKI where one needs to enforce that the peer 46 mismatch with the issuer of peer certificate (CURLOPT_SSL_VERIFYPEER(3)
|
H A D | CURLOPT_PROXY_ISSUERCERT.md | 37 the peer certificate is performed to verify the issuer of the HTTPS proxy is 40 the peer certificate is from a specific branch of the tree. 48 mismatch with the issuer of peer certificate (CURLOPT_PROXY_SSL_VERIFYPEER(3)
|
H A D | CURLOPT_ISSUERCERT_BLOB.md | 36 format. If the option is set, an additional check against the peer certificate 39 multi-level PKI where one needs to enforce that the peer certificate is from a 48 mismatch with the issuer of peer certificate (CURLOPT_SSL_VERIFYPEER(3)
|
H A D | CURLOPT_PROXY_ISSUERCERT_BLOB.md | 37 format. If the option is set, an additional check against the peer certificate 40 is useful in multi-level PKI where one needs to enforce that the peer 49 mismatch with the issuer of peer certificate
|
H A D | CURLOPT_SSL_VERIFYPEER.md | 23 CURLOPT_SSL_VERIFYPEER - verify the peer's SSL certificate 37 This option determines whether curl verifies the authenticity of the peer's 53 and the peer certificate verification is simply skipped.
|
H A D | CURLOPT_CAINFO.md | 36 more certificates to verify the peer with. 47 Keychain to verify the peer.
|
/curl/tests/data/ |
H A D | test1297 | 33 CONNECT to peer that returns nothing
|