/curl/lib/vquic/ |
H A D | vquic-tls.c | 199 struct ssl_peer *peer, in curl_wssl_init_ssl() argument 216 if(peer->sni) { in curl_wssl_init_ssl() 218 peer->sni, (unsigned short)strlen(peer->sni)); in curl_wssl_init_ssl() 228 struct ssl_peer *peer, in Curl_vquic_tls_init() argument 237 return Curl_ossl_ctx_init(&ctx->ossl, cf, data, peer, TRNSPRT_QUIC, in Curl_vquic_tls_init() 242 return Curl_gtls_ctx_init(&ctx->gtls, cf, data, peer, in Curl_vquic_tls_init() 304 struct ssl_peer *peer) in Curl_vquic_tls_verify_peer() argument 315 result = Curl_oss_check_peer_cert(cf, data, &ctx->ossl, peer); in Curl_vquic_tls_verify_peer() 319 conn_config, &data->set.ssl, peer, in Curl_vquic_tls_verify_peer() 327 if(peer->sni) { in Curl_vquic_tls_verify_peer() [all …]
|
H A D | vquic-tls.h | 73 struct ssl_peer *peer, 95 struct ssl_peer *peer);
|
/curl/lib/vtls/ |
H A D | openssl.h | 65 struct ssl_peer *peer, 78 struct ssl_peer *peer, X509 *server_cert); 108 const struct ssl_peer *peer, 119 struct ssl_peer *peer);
|
H A D | vtls.c | 595 cf->conn->handler->scheme, peer->hostname, peer->port)); in Curl_ssl_getsessionid() 1516 if(peer->dispname != peer->hostname) in Curl_ssl_peer_cleanup() 1518 free(peer->sni); in Curl_ssl_peer_cleanup() 1519 free(peer->hostname); in Curl_ssl_peer_cleanup() 1520 peer->hostname = peer->sni = peer->dispname = NULL; in Curl_ssl_peer_cleanup() 1590 peer->dispname = peer->hostname; in Curl_ssl_peer_init() 1599 peer->type = get_peer_type(peer->hostname); in Curl_ssl_peer_init() 1600 if(peer->type == CURL_SSL_PEER_DNS && peer->hostname[0]) { in Curl_ssl_peer_init() 1608 if(!peer->sni) { in Curl_ssl_peer_init() 1612 Curl_strntolower(peer->sni, peer->hostname, len); in Curl_ssl_peer_init() [all …]
|
H A D | gtls.h | 65 struct ssl_peer *peer, 79 struct ssl_peer *peer,
|
H A D | vtls_int.h | 71 struct ssl_peer peer; member 179 const struct ssl_peer *peer, 191 const struct ssl_peer *peer,
|
H A D | gtls.c | 371 struct ssl_peer *peer, in set_ssl_version_min_max() argument 385 if(peer->transport == TRNSPRT_QUIC) { in set_ssl_version_min_max() 620 struct ssl_peer *peer, in gtls_client_init() argument 692 if(sni && peer->sni) { in gtls_client_init() 694 peer->sni, strlen(peer->sni)) < 0) { in gtls_client_init() 726 result = set_ssl_version_min_max(data, peer, in gtls_client_init() 849 struct ssl_peer *peer, in Curl_gtls_ctx_init() argument 860 result = gtls_client_init(cf, data, peer, gctx); in Curl_gtls_ctx_init() 1033 struct ssl_peer *peer, in Curl_gtls_verifyserver() argument 1304 if(Curl_inet_pton(AF_INET, peer->hostname, addrbuf) > 0) in Curl_gtls_verifyserver() [all …]
|
H A D | wolfssl.c | 635 if(sni && connssl->peer.sni) { in wolfssl_connect_step1() 636 size_t sni_len = strlen(connssl->peer.sni); in wolfssl_connect_step1() 639 connssl->peer.sni, in wolfssl_connect_step1() 723 if(!Curl_ssl_getsessionid(cf, data, &connssl->peer, in wolfssl_connect_step1() 768 dns = Curl_fetch_addr(data, connssl->peer.hostname, connssl->peer.port); in wolfssl_connect_step1() 859 char *snihost = connssl->peer.sni? in wolfssl_connect_step2() 860 connssl->peer.sni : connssl->peer.hostname; in wolfssl_connect_step2() 909 connssl->peer.dispname); in wolfssl_connect_step2() 1088 incache = !(Curl_ssl_getsessionid(cf, data, &connssl->peer, in wolfssl_connect_step3() 1095 result = Curl_ssl_addsessionid(cf, data, &connssl->peer, in wolfssl_connect_step3()
|
H A D | vtls.h | 110 CURLcode Curl_ssl_peer_init(struct ssl_peer *peer, 115 void Curl_ssl_peer_cleanup(struct ssl_peer *peer);
|
H A D | openssl.c | 2163 hostlen = strlen(peer->hostname); in Curl_ossl_verifyhost() 2164 switch(peer->type) { in Curl_ossl_verifyhost() 2238 peer->dispname)) { in Curl_ossl_verifyhost() 2250 peer->dispname); in Curl_ossl_verifyhost() 2271 "target %s '%s'", tname, peer->dispname); in Curl_ossl_verifyhost() 3519 struct ssl_peer *peer, in Curl_ossl_ctx_init() argument 3736 if(!ciphers && (peer->transport != TRNSPRT_QUIC)) in Curl_ossl_ctx_init() 3873 if(peer->sni) { in Curl_ossl_ctx_init() 3941 dns = Curl_fetch_addr(data, connssl->peer.hostname, connssl->peer.port); in Curl_ossl_ctx_init() 3990 connssl->peer.hostname, outername); in Curl_ossl_ctx_init() [all …]
|
/curl/tests/server/ |
H A D | tftpd.c | 199 static curl_socket_t peer = CURL_SOCKET_BAD; variable 796 if(CURL_SOCKET_BAD == peer) { in main() 811 if(CURL_SOCKET_BAD == peer) { in main() 834 sclose(peer); in main() 835 peer = CURL_SOCKET_BAD; in main() 854 if((peer != sock) && (peer != CURL_SOCKET_BAD)) in main() 855 sclose(peer); in main() 990 getsockopt(peer, SOL_SOCKET, SO_RCVTIMEO, in do_tftp() 1235 (void) synchnet(peer); in sendtftp() 1283 n = sread(peer, rdp, PKTSIZE); in recvtftp() [all …]
|
/curl/docs/cmdline-opts/ |
H A D | cacert.md | 6 Help: CA certificate to verify peer against 20 Use the specified certificate file to verify the peer. The file may contain 36 in the system and user Keychain to verify the peer, which is the preferred 37 method of verifying the peer's certificate chain.
|
H A D | pinnedpubkey.md | 6 Help: FILE/HASHES Public key to verify peer against 20 Use the specified public key file (or hashes) to verify the peer. This can be 31 together then the peer is still verified by public key.
|
H A D | capath.md | 6 Help: CA directory to verify peer against 20 Use the specified certificate directory to verify the peer. Multiple paths can
|
H A D | crlfile.md | 21 specify peer certificates that are to be considered revoked.
|
/curl/docs/libcurl/opts/ |
H A D | CURLOPT_DEBUGFUNCTION.md | 69 The data is header (or header-like) data received from the peer. 73 The data is header (or header-like) data sent to the peer. 77 The data is the unprocessed protocol data received from the peer. Even if the 84 The data is protocol data sent to the peer. 88 The data is SSL/TLS (binary) data sent to the peer. 92 The data is SSL/TLS (binary) data received from the peer.
|
H A D | CURLOPT_ISSUERCERT.md | 34 the peer certificate is performed to verify the issuer is indeed the one 36 is useful in multi-level PKI where one needs to enforce that the peer 45 mismatch with the issuer of peer certificate (CURLOPT_SSL_VERIFYPEER(3)
|
H A D | CURLOPT_PROXY_ISSUERCERT.md | 36 the peer certificate is performed to verify the issuer of the HTTPS proxy is 39 the peer certificate is from a specific branch of the tree. 47 mismatch with the issuer of peer certificate
|
H A D | CURLOPT_ISSUERCERT_BLOB.md | 35 format. If the option is set, an additional check against the peer certificate 38 multi-level PKI where one needs to enforce that the peer certificate is from a 47 mismatch with the issuer of peer certificate (CURLOPT_SSL_VERIFYPEER(3)
|
H A D | CURLOPT_PROXY_ISSUERCERT_BLOB.md | 36 format. If the option is set, an additional check against the peer certificate 39 is useful in multi-level PKI where one needs to enforce that the peer 48 mismatch with the issuer of peer certificate
|
H A D | CURLOPT_SSL_VERIFYPEER.md | 22 CURLOPT_SSL_VERIFYPEER - verify the peer's SSL certificate 36 This option determines whether curl verifies the authenticity of the peer's 52 and the peer certificate verification is simply skipped.
|
H A D | CURLOPT_CAINFO.md | 35 more certificates to verify the peer with. 46 Keychain to verify the peer.
|
H A D | CURLOPT_PROXY_CAINFO.md | 52 in the system and user Keychain to verify the peer, which is the preferred 53 method of verifying the peer's certificate chain.
|
/curl/docs/libcurl/ |
H A D | curl_easy_perform.md | 52 A network transfer moves data to a peer or from a peer. An application tells
|
/curl/tests/data/ |
H A D | test1297 | 33 CONNECT to peer that returns nothing
|