Home
last modified time | relevance | path

Searched refs:peer (Results 1 – 25 of 49) sorted by relevance

12

/curl/lib/vquic/
H A Dvquic-tls.c199 struct ssl_peer *peer, in curl_wssl_init_ssl() argument
216 if(peer->sni) { in curl_wssl_init_ssl()
218 peer->sni, (unsigned short)strlen(peer->sni)); in curl_wssl_init_ssl()
228 struct ssl_peer *peer, in Curl_vquic_tls_init() argument
237 return Curl_ossl_ctx_init(&ctx->ossl, cf, data, peer, TRNSPRT_QUIC, in Curl_vquic_tls_init()
242 return Curl_gtls_ctx_init(&ctx->gtls, cf, data, peer, in Curl_vquic_tls_init()
304 struct ssl_peer *peer) in Curl_vquic_tls_verify_peer() argument
315 result = Curl_oss_check_peer_cert(cf, data, &ctx->ossl, peer); in Curl_vquic_tls_verify_peer()
319 conn_config, &data->set.ssl, peer, in Curl_vquic_tls_verify_peer()
327 if(peer->sni) { in Curl_vquic_tls_verify_peer()
[all …]
H A Dvquic-tls.h73 struct ssl_peer *peer,
95 struct ssl_peer *peer);
/curl/lib/vtls/
H A Dopenssl.h65 struct ssl_peer *peer,
78 struct ssl_peer *peer, X509 *server_cert);
108 const struct ssl_peer *peer,
119 struct ssl_peer *peer);
H A Dvtls.c595 cf->conn->handler->scheme, peer->hostname, peer->port)); in Curl_ssl_getsessionid()
1516 if(peer->dispname != peer->hostname) in Curl_ssl_peer_cleanup()
1518 free(peer->sni); in Curl_ssl_peer_cleanup()
1519 free(peer->hostname); in Curl_ssl_peer_cleanup()
1520 peer->hostname = peer->sni = peer->dispname = NULL; in Curl_ssl_peer_cleanup()
1590 peer->dispname = peer->hostname; in Curl_ssl_peer_init()
1599 peer->type = get_peer_type(peer->hostname); in Curl_ssl_peer_init()
1600 if(peer->type == CURL_SSL_PEER_DNS && peer->hostname[0]) { in Curl_ssl_peer_init()
1608 if(!peer->sni) { in Curl_ssl_peer_init()
1612 Curl_strntolower(peer->sni, peer->hostname, len); in Curl_ssl_peer_init()
[all …]
H A Dgtls.h65 struct ssl_peer *peer,
79 struct ssl_peer *peer,
H A Dvtls_int.h71 struct ssl_peer peer; member
179 const struct ssl_peer *peer,
191 const struct ssl_peer *peer,
H A Dgtls.c371 struct ssl_peer *peer, in set_ssl_version_min_max() argument
385 if(peer->transport == TRNSPRT_QUIC) { in set_ssl_version_min_max()
620 struct ssl_peer *peer, in gtls_client_init() argument
692 if(sni && peer->sni) { in gtls_client_init()
694 peer->sni, strlen(peer->sni)) < 0) { in gtls_client_init()
726 result = set_ssl_version_min_max(data, peer, in gtls_client_init()
849 struct ssl_peer *peer, in Curl_gtls_ctx_init() argument
860 result = gtls_client_init(cf, data, peer, gctx); in Curl_gtls_ctx_init()
1033 struct ssl_peer *peer, in Curl_gtls_verifyserver() argument
1304 if(Curl_inet_pton(AF_INET, peer->hostname, addrbuf) > 0) in Curl_gtls_verifyserver()
[all …]
H A Dwolfssl.c635 if(sni && connssl->peer.sni) { in wolfssl_connect_step1()
636 size_t sni_len = strlen(connssl->peer.sni); in wolfssl_connect_step1()
639 connssl->peer.sni, in wolfssl_connect_step1()
723 if(!Curl_ssl_getsessionid(cf, data, &connssl->peer, in wolfssl_connect_step1()
768 dns = Curl_fetch_addr(data, connssl->peer.hostname, connssl->peer.port); in wolfssl_connect_step1()
859 char *snihost = connssl->peer.sni? in wolfssl_connect_step2()
860 connssl->peer.sni : connssl->peer.hostname; in wolfssl_connect_step2()
909 connssl->peer.dispname); in wolfssl_connect_step2()
1088 incache = !(Curl_ssl_getsessionid(cf, data, &connssl->peer, in wolfssl_connect_step3()
1095 result = Curl_ssl_addsessionid(cf, data, &connssl->peer, in wolfssl_connect_step3()
H A Dvtls.h110 CURLcode Curl_ssl_peer_init(struct ssl_peer *peer,
115 void Curl_ssl_peer_cleanup(struct ssl_peer *peer);
H A Dopenssl.c2163 hostlen = strlen(peer->hostname); in Curl_ossl_verifyhost()
2164 switch(peer->type) { in Curl_ossl_verifyhost()
2238 peer->dispname)) { in Curl_ossl_verifyhost()
2250 peer->dispname); in Curl_ossl_verifyhost()
2271 "target %s '%s'", tname, peer->dispname); in Curl_ossl_verifyhost()
3519 struct ssl_peer *peer, in Curl_ossl_ctx_init() argument
3736 if(!ciphers && (peer->transport != TRNSPRT_QUIC)) in Curl_ossl_ctx_init()
3873 if(peer->sni) { in Curl_ossl_ctx_init()
3941 dns = Curl_fetch_addr(data, connssl->peer.hostname, connssl->peer.port); in Curl_ossl_ctx_init()
3990 connssl->peer.hostname, outername); in Curl_ossl_ctx_init()
[all …]
/curl/tests/server/
H A Dtftpd.c199 static curl_socket_t peer = CURL_SOCKET_BAD; variable
796 if(CURL_SOCKET_BAD == peer) { in main()
811 if(CURL_SOCKET_BAD == peer) { in main()
834 sclose(peer); in main()
835 peer = CURL_SOCKET_BAD; in main()
854 if((peer != sock) && (peer != CURL_SOCKET_BAD)) in main()
855 sclose(peer); in main()
990 getsockopt(peer, SOL_SOCKET, SO_RCVTIMEO, in do_tftp()
1235 (void) synchnet(peer); in sendtftp()
1283 n = sread(peer, rdp, PKTSIZE); in recvtftp()
[all …]
/curl/docs/cmdline-opts/
H A Dcacert.md6 Help: CA certificate to verify peer against
20 Use the specified certificate file to verify the peer. The file may contain
36 in the system and user Keychain to verify the peer, which is the preferred
37 method of verifying the peer's certificate chain.
H A Dpinnedpubkey.md6 Help: FILE/HASHES Public key to verify peer against
20 Use the specified public key file (or hashes) to verify the peer. This can be
31 together then the peer is still verified by public key.
H A Dcapath.md6 Help: CA directory to verify peer against
20 Use the specified certificate directory to verify the peer. Multiple paths can
H A Dcrlfile.md21 specify peer certificates that are to be considered revoked.
/curl/docs/libcurl/opts/
H A DCURLOPT_DEBUGFUNCTION.md69 The data is header (or header-like) data received from the peer.
73 The data is header (or header-like) data sent to the peer.
77 The data is the unprocessed protocol data received from the peer. Even if the
84 The data is protocol data sent to the peer.
88 The data is SSL/TLS (binary) data sent to the peer.
92 The data is SSL/TLS (binary) data received from the peer.
H A DCURLOPT_ISSUERCERT.md34 the peer certificate is performed to verify the issuer is indeed the one
36 is useful in multi-level PKI where one needs to enforce that the peer
45 mismatch with the issuer of peer certificate (CURLOPT_SSL_VERIFYPEER(3)
H A DCURLOPT_PROXY_ISSUERCERT.md36 the peer certificate is performed to verify the issuer of the HTTPS proxy is
39 the peer certificate is from a specific branch of the tree.
47 mismatch with the issuer of peer certificate
H A DCURLOPT_ISSUERCERT_BLOB.md35 format. If the option is set, an additional check against the peer certificate
38 multi-level PKI where one needs to enforce that the peer certificate is from a
47 mismatch with the issuer of peer certificate (CURLOPT_SSL_VERIFYPEER(3)
H A DCURLOPT_PROXY_ISSUERCERT_BLOB.md36 format. If the option is set, an additional check against the peer certificate
39 is useful in multi-level PKI where one needs to enforce that the peer
48 mismatch with the issuer of peer certificate
H A DCURLOPT_SSL_VERIFYPEER.md22 CURLOPT_SSL_VERIFYPEER - verify the peer's SSL certificate
36 This option determines whether curl verifies the authenticity of the peer's
52 and the peer certificate verification is simply skipped.
H A DCURLOPT_CAINFO.md35 more certificates to verify the peer with.
46 Keychain to verify the peer.
H A DCURLOPT_PROXY_CAINFO.md52 in the system and user Keychain to verify the peer, which is the preferred
53 method of verifying the peer's certificate chain.
/curl/docs/libcurl/
H A Dcurl_easy_perform.md52 A network transfer moves data to a peer or from a peer. An application tells
/curl/tests/data/
H A Dtest129733 CONNECT to peer that returns nothing

Completed in 61 milliseconds

12