Home
last modified time | relevance | path

Searched refs:peername (Results 1 – 10 of 10) sorted by relevance

/openssl/crypto/x509/
H A Dx509_vpm.c102 OPENSSL_free(param->peername); in X509_VERIFY_PARAM_free()
409 return param->peername; in X509_VERIFY_PARAM_get0_peername()
420 char *peername = (from != NULL) ? from->peername : NULL; in X509_VERIFY_PARAM_move_peername() local
422 if (to->peername != peername) { in X509_VERIFY_PARAM_move_peername()
423 OPENSSL_free(to->peername); in X509_VERIFY_PARAM_move_peername()
424 to->peername = peername; in X509_VERIFY_PARAM_move_peername()
427 from->peername = NULL; in X509_VERIFY_PARAM_move_peername()
H A Dv3_utl.c834 char **peername) in do_check_string() argument
847 if (rv > 0 && peername != NULL) { in do_check_string()
848 *peername = OPENSSL_strndup((char *)a->data, a->length); in do_check_string()
849 if (*peername == NULL) in do_check_string()
864 if (rv > 0 && peername != NULL) { in do_check_string()
865 *peername = OPENSSL_strndup((char *)astr, astrlen); in do_check_string()
866 if (*peername == NULL) { in do_check_string()
979 chk, chklen, peername)) != 0) in do_x509_check()
1001 chk, chklen, peername)) != 0) in do_x509_check()
1008 unsigned int flags, char **peername) in X509_check_host() argument
[all …]
H A Dx509_local.h34 char *peername; /* Matching hostname in peer certificate */ member
H A Dx509_vfy.c874 if (vpm->peername != NULL) { in check_hosts()
875 OPENSSL_free(vpm->peername); in check_hosts()
876 vpm->peername = NULL; in check_hosts()
880 if (X509_check_host(x, name, 0, vpm->hostflags, &vpm->peername) > 0) in check_hosts()
/openssl/doc/man3/
H A DSSL_set1_host.pod69 SSL_get0_peername() returns NULL if peername verification is not
70 applicable (as with RFC7671 DANE-EE(3)), or no trusted peername was
71 matched. Otherwise, it returns the matched peername. To determine
93 const char *peername = SSL_get0_peername(ssl);
95 if (peername != NULL)
96 /* Name checks were in scope and matched the peername */
H A DX509_check_host.pod12 unsigned int flags, char **peername);
44 When the certificate is matched, and B<peername> is not NULL, a
46 is stored at the address passed in B<peername>. The application
47 is responsible for freeing the peername via OPENSSL_free() when it
H A DSSL_CTX_dane_enable.pod303 const char *peername = SSL_get0_peername(ssl);
317 if (peername != NULL) {
318 /* Name checks were in scope and matched the peername */
319 printf("Verified peername: %s\n", peername);
/openssl/apps/lib/
H A Ds_cb.c1256 const char *peername = SSL_get0_peername(s); in print_verify_detail() local
1259 if (peername != NULL) in print_verify_detail()
1260 BIO_printf(bio, "Verified peername: %s\n", peername); in print_verify_detail()
/openssl/include/openssl/
H A Dx509v3.h.in785 unsigned int flags, char **peername);
/openssl/doc/man1/
H A Dopenssl-s_client.pod.in398 Verified peername: smtp.example.com

Completed in 32 milliseconds