Home
last modified time | relevance | path

Searched refs:peer (Results 1 – 25 of 51) sorted by relevance

123

/curl/lib/vquic/
H A Dvquic-tls.c200 struct ssl_peer *peer, in wssl_init_ssl() argument
218 if(peer->sni) { in wssl_init_ssl()
220 peer->sni, (unsigned short)strlen(peer->sni)); in wssl_init_ssl()
224 (void)wssl_setup_session(cf, data, &ctx->wssl, peer); in wssl_init_ssl()
234 struct ssl_peer *peer, in Curl_vquic_tls_init() argument
243 return Curl_ossl_ctx_init(&ctx->ossl, cf, data, peer, TRNSPRT_QUIC, in Curl_vquic_tls_init()
248 return Curl_gtls_ctx_init(&ctx->gtls, cf, data, peer, in Curl_vquic_tls_init()
315 struct ssl_peer *peer) in Curl_vquic_tls_verify_peer() argument
326 result = Curl_oss_check_peer_cert(cf, data, &ctx->ossl, peer); in Curl_vquic_tls_verify_peer()
338 if(peer->sni) { in Curl_vquic_tls_verify_peer()
[all …]
H A Dvquic-tls.h74 struct ssl_peer *peer,
96 struct ssl_peer *peer);
/curl/lib/vtls/
H A Dopenssl.h65 struct ssl_peer *peer,
97 const struct ssl_peer *peer,
108 struct ssl_peer *peer);
H A Dgtls.h80 struct ssl_peer *peer,
95 struct ssl_peer *peer,
102 struct ssl_peer *peer,
H A Dwolfssl.h57 struct ssl_peer *peer);
61 struct ssl_peer *peer,
H A Dvtls.c603 cf->conn->handler->scheme, peer->hostname, peer->port); in Curl_ssl_getsessionid()
1568 if(peer->dispname != peer->hostname) in Curl_ssl_peer_cleanup()
1570 free(peer->sni); in Curl_ssl_peer_cleanup()
1571 free(peer->hostname); in Curl_ssl_peer_cleanup()
1572 peer->hostname = peer->sni = peer->dispname = NULL; in Curl_ssl_peer_cleanup()
1613 DEBUGASSERT(peer); in Curl_ssl_peer_init()
1644 if(!peer->hostname) in Curl_ssl_peer_init()
1647 peer->dispname = peer->hostname; in Curl_ssl_peer_init()
1653 peer->type = get_peer_type(peer->hostname); in Curl_ssl_peer_init()
1662 if(!peer->sni) in Curl_ssl_peer_init()
[all …]
H A Dvtls_int.h106 struct ssl_peer peer; member
231 const struct ssl_peer *peer,
247 const struct ssl_peer *peer,
H A Dgtls.c373 struct ssl_peer *peer, in gnutls_set_ssl_version_min_max() argument
387 if(peer->transport == TRNSPRT_QUIC) { in gnutls_set_ssl_version_min_max()
883 if(sni && peer->sni) { in gtls_client_init()
885 peer->sni, strlen(peer->sni)) < 0) { in gtls_client_init()
917 result = gnutls_set_ssl_version_min_max(data, peer, in gtls_client_init()
1052 struct ssl_peer *peer, in Curl_gtls_ctx_init() argument
1067 result = gtls_client_init(cf, data, peer, gctx); in Curl_gtls_ctx_init()
1092 if(!Curl_ssl_getsessionid(cf, data, peer, in Curl_gtls_ctx_init()
1284 struct ssl_peer *peer, in Curl_gtls_verifyserver() argument
1549 peer->sni ? peer->sni : in Curl_gtls_verifyserver()
[all …]
H A Dwolfssl.c411 struct ssl_peer *peer, in wssl_cache_session() argument
441 result = Curl_ssl_set_sessionid(cf, data, peer, NULL, in wssl_cache_session()
477 struct ssl_peer *peer) in wssl_setup_session() argument
1102 if(connssl->peer.sni) { in wolfssl_connect_step1()
1103 size_t sni_len = strlen(connssl->peer.sni); in wolfssl_connect_step1()
1106 connssl->peer.sni, in wolfssl_connect_step1()
1195 (void)wssl_setup_session(cf, data, backend, &connssl->peer); in wolfssl_connect_step1()
1233 dns = Curl_fetch_addr(data, connssl->peer.hostname, connssl->peer.port); in wolfssl_connect_step1()
1342 char *snihost = connssl->peer.sni ? in wolfssl_connect_step2()
1343 connssl->peer.sni : connssl->peer.hostname; in wolfssl_connect_step2()
[all …]
H A Dvtls.h115 CURLcode Curl_ssl_peer_init(struct ssl_peer *peer,
120 void Curl_ssl_peer_cleanup(struct ssl_peer *peer);
H A Dopenssl.c2121 hostlen = strlen(peer->hostname); in ossl_verifyhost()
2122 switch(peer->type) { in ossl_verifyhost()
2196 peer->dispname)) { in ossl_verifyhost()
2208 peer->dispname); in ossl_verifyhost()
2229 "target %s '%s'", tname, peer->dispname); in ossl_verifyhost()
3478 struct ssl_peer *peer, in Curl_ossl_ctx_init() argument
3836 if(peer->sni) { in Curl_ossl_ctx_init()
3904 if(peer->hostname) in Curl_ossl_ctx_init()
3905 dns = Curl_fetch_addr(data, peer->hostname, peer->port); in Curl_ossl_ctx_init()
3954 peer->hostname ? peer->hostname : "NULL", outername); in Curl_ossl_ctx_init()
[all …]
/curl/tests/server/
H A Dtftpd.c196 static curl_socket_t peer = CURL_SOCKET_BAD; variable
793 if(CURL_SOCKET_BAD == peer) { in main()
808 if(CURL_SOCKET_BAD == peer) { in main()
831 sclose(peer); in main()
832 peer = CURL_SOCKET_BAD; in main()
851 if((peer != sock) && (peer != CURL_SOCKET_BAD)) in main()
852 sclose(peer); in main()
987 getsockopt(peer, SOL_SOCKET, SO_RCVTIMEO, in do_tftp()
1232 (void) synchnet(peer); in sendtftp()
1280 n = sread(peer, rdp, PKTSIZE); in recvtftp()
[all …]
/curl/docs/cmdline-opts/
H A Dcacert.md6 Help: CA certificate to verify peer against
21 Use the specified certificate file to verify the peer. The file may contain
40 in the system and user Keychain to verify the peer, which is the preferred
41 method of verifying the peer's certificate chain.
H A Dpinnedpubkey.md6 Help: Public key to verify peer against
20 Use the specified public key file (or hashes) to verify the peer. This can be
31 together then the peer is still verified by public key.
H A Dcapath.md6 Help: CA directory to verify peer against
21 Use the specified certificate directory to verify the peer. Multiple paths can
H A Dcrlfile.md21 specify peer certificates that are to be considered revoked.
H A Dproxy-crlfile.md20 that specifies peer certificates that are considered revoked when
/curl/docs/libcurl/opts/
H A DCURLOPT_DEBUGFUNCTION.md70 The data is header (or header-like) data received from the peer.
74 The data is header (or header-like) data sent to the peer.
78 The data is the unprocessed protocol data received from the peer. Even if the
85 The data is protocol data sent to the peer.
89 The data is SSL/TLS (binary) data sent to the peer.
93 The data is SSL/TLS (binary) data received from the peer.
H A DCURLOPT_ISSUERCERT.md35 the peer certificate is performed to verify the issuer is indeed the one
37 is useful in multi-level PKI where one needs to enforce that the peer
46 mismatch with the issuer of peer certificate (CURLOPT_SSL_VERIFYPEER(3)
H A DCURLOPT_PROXY_ISSUERCERT.md37 the peer certificate is performed to verify the issuer of the HTTPS proxy is
40 the peer certificate is from a specific branch of the tree.
48 mismatch with the issuer of peer certificate (CURLOPT_PROXY_SSL_VERIFYPEER(3)
H A DCURLOPT_ISSUERCERT_BLOB.md36 format. If the option is set, an additional check against the peer certificate
39 multi-level PKI where one needs to enforce that the peer certificate is from a
48 mismatch with the issuer of peer certificate (CURLOPT_SSL_VERIFYPEER(3)
H A DCURLOPT_PROXY_ISSUERCERT_BLOB.md37 format. If the option is set, an additional check against the peer certificate
40 is useful in multi-level PKI where one needs to enforce that the peer
49 mismatch with the issuer of peer certificate
H A DCURLOPT_SSL_VERIFYPEER.md23 CURLOPT_SSL_VERIFYPEER - verify the peer's SSL certificate
37 This option determines whether curl verifies the authenticity of the peer's
53 and the peer certificate verification is simply skipped.
H A DCURLOPT_CAINFO.md36 more certificates to verify the peer with.
47 Keychain to verify the peer.
/curl/tests/data/
H A Dtest129733 CONNECT to peer that returns nothing

Completed in 63 milliseconds

123