Searched refs:peername (Results 1 – 10 of 10) sorted by relevance
/openssl/crypto/x509/ |
H A D | x509_vpm.c | 102 OPENSSL_free(param->peername); in X509_VERIFY_PARAM_free() 409 return param->peername; in X509_VERIFY_PARAM_get0_peername() 420 char *peername = (from != NULL) ? from->peername : NULL; in X509_VERIFY_PARAM_move_peername() local 422 if (to->peername != peername) { in X509_VERIFY_PARAM_move_peername() 423 OPENSSL_free(to->peername); in X509_VERIFY_PARAM_move_peername() 424 to->peername = peername; in X509_VERIFY_PARAM_move_peername() 427 from->peername = NULL; in X509_VERIFY_PARAM_move_peername()
|
H A D | v3_utl.c | 834 char **peername) in do_check_string() argument 847 if (rv > 0 && peername != NULL) { in do_check_string() 848 *peername = OPENSSL_strndup((char *)a->data, a->length); in do_check_string() 849 if (*peername == NULL) in do_check_string() 864 if (rv > 0 && peername != NULL) { in do_check_string() 865 *peername = OPENSSL_strndup((char *)astr, astrlen); in do_check_string() 866 if (*peername == NULL) { in do_check_string() 979 chk, chklen, peername)) != 0) in do_x509_check() 1001 chk, chklen, peername)) != 0) in do_x509_check() 1008 unsigned int flags, char **peername) in X509_check_host() argument [all …]
|
H A D | x509_local.h | 34 char *peername; /* Matching hostname in peer certificate */ member
|
H A D | x509_vfy.c | 874 if (vpm->peername != NULL) { in check_hosts() 875 OPENSSL_free(vpm->peername); in check_hosts() 876 vpm->peername = NULL; in check_hosts() 880 if (X509_check_host(x, name, 0, vpm->hostflags, &vpm->peername) > 0) in check_hosts()
|
/openssl/doc/man3/ |
H A D | SSL_set1_host.pod | 69 SSL_get0_peername() returns NULL if peername verification is not 70 applicable (as with RFC7671 DANE-EE(3)), or no trusted peername was 71 matched. Otherwise, it returns the matched peername. To determine 93 const char *peername = SSL_get0_peername(ssl); 95 if (peername != NULL) 96 /* Name checks were in scope and matched the peername */
|
H A D | X509_check_host.pod | 12 unsigned int flags, char **peername); 44 When the certificate is matched, and B<peername> is not NULL, a 46 is stored at the address passed in B<peername>. The application 47 is responsible for freeing the peername via OPENSSL_free() when it
|
H A D | SSL_CTX_dane_enable.pod | 303 const char *peername = SSL_get0_peername(ssl); 317 if (peername != NULL) { 318 /* Name checks were in scope and matched the peername */ 319 printf("Verified peername: %s\n", peername);
|
/openssl/apps/lib/ |
H A D | s_cb.c | 1256 const char *peername = SSL_get0_peername(s); in print_verify_detail() local 1259 if (peername != NULL) in print_verify_detail() 1260 BIO_printf(bio, "Verified peername: %s\n", peername); in print_verify_detail()
|
/openssl/include/openssl/ |
H A D | x509v3.h.in | 785 unsigned int flags, char **peername);
|
/openssl/doc/man1/ |
H A D | openssl-s_client.pod.in | 398 Verified peername: smtp.example.com
|
Completed in 33 milliseconds