/freebsd/crypto/openssl/crypto/x509/ |
H A D | x509_vpm.c | 104 OPENSSL_free(param->peername); in X509_VERIFY_PARAM_free() 411 return param->peername; in X509_VERIFY_PARAM_get0_peername() 422 char *peername = (from != NULL) ? from->peername : NULL; in X509_VERIFY_PARAM_move_peername() local 424 if (to->peername != peername) { in X509_VERIFY_PARAM_move_peername() 425 OPENSSL_free(to->peername); in X509_VERIFY_PARAM_move_peername() 426 to->peername = peername; in X509_VERIFY_PARAM_move_peername() 429 from->peername = NULL; in X509_VERIFY_PARAM_move_peername()
|
H A D | v3_utl.c | 834 char **peername) in do_check_string() argument 847 if (rv > 0 && peername != NULL) { in do_check_string() 848 *peername = OPENSSL_strndup((char *)a->data, a->length); in do_check_string() 849 if (*peername == NULL) in do_check_string() 864 if (rv > 0 && peername != NULL) { in do_check_string() 865 *peername = OPENSSL_strndup((char *)astr, astrlen); in do_check_string() 866 if (*peername == NULL) { in do_check_string() 877 unsigned int flags, int check_type, char **peername) in do_x509_check() argument 979 chk, chklen, peername)) != 0) in do_x509_check() 1001 chk, chklen, peername)) != 0) in do_x509_check() [all …]
|
H A D | x509_local.h | 34 char *peername; /* Matching hostname in peer certificate */ member
|
H A D | x509_vfy.c | 776 if (vpm->peername != NULL) { in check_hosts() 777 OPENSSL_free(vpm->peername); in check_hosts() 778 vpm->peername = NULL; in check_hosts() 782 if (X509_check_host(x, name, 0, vpm->hostflags, &vpm->peername) > 0) in check_hosts()
|
/freebsd/libexec/tftpd/ |
H A D | tftpd.c | 99 static char peername[NI_MAXHOST]; variable 228 peername, sizeof(peername), NULL, 0, NI_NUMERICHOST); in main() 231 n, peername); in main() 271 request_init(&req, RQ_CLIENT_ADDR, peername, 0); in main() 292 "Unauthorized access from %s", peername); in main() 406 "%s read access denied", peername); in main() 414 "%s write access denied", peername); in main() 528 tftp_log(LOG_INFO, "%s: write request for %s: %s", peername, in tftp_wrq() 592 tftp_log(LOG_INFO, "%s: read request for %s: %s", peername, in tftp_rrq()
|
/freebsd/crypto/heimdal/lib/roken/ |
H A D | socket_wrapper.c | 229 struct sockaddr *peername; member 1058 dest_addr = (const struct sockaddr_in *)si->peername; in swrap_dump_packet() 1070 src_addr = (const struct sockaddr_in *)si->peername; in swrap_dump_packet() 1073 swrap_dump_packet(si, si->peername, in swrap_dump_packet() 1087 src_addr = (const struct sockaddr_in *)si->peername; in swrap_dump_packet() 1101 src_addr = (const struct sockaddr_in *)si->peername; in swrap_dump_packet() 1113 src_addr = (const struct sockaddr_in *)si->peername; in swrap_dump_packet() 1153 dest_addr = (const struct sockaddr_in *)si->peername; in swrap_dump_packet() 1167 src_addr = (const struct sockaddr_in *)si->peername; in swrap_dump_packet() 1181 dest_addr = (const struct sockaddr_in *)si->peername; in swrap_dump_packet() [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_set1_host.pod | 69 SSL_get0_peername() returns NULL if peername verification is not 70 applicable (as with RFC7671 DANE-EE(3)), or no trusted peername was 71 matched. Otherwise, it returns the matched peername. To determine 93 const char *peername = SSL_get0_peername(ssl); 95 if (peername != NULL) 96 /* Name checks were in scope and matched the peername */
|
H A D | X509_check_host.pod | 12 unsigned int flags, char **peername); 44 When the certificate is matched, and B<peername> is not NULL, a 46 is stored at the address passed in B<peername>. The application 47 is responsible for freeing the peername via OPENSSL_free() when it
|
H A D | SSL_CTX_dane_enable.pod | 303 const char *peername = SSL_get0_peername(ssl); 314 if (peername != NULL) { 315 /* Name checks were in scope and matched the peername */ 316 printf("Verified peername: %s\n", peername);
|
/freebsd/include/rpcsvc/ |
H A D | yp.x | 79 typedef string peername<YPMAXPEER>; 88 peername peer; 129 peername peer;
|
/freebsd/crypto/openssl/apps/lib/ |
H A D | s_cb.c | 1193 const char *peername = SSL_get0_peername(s); in print_verify_detail() local 1196 if (peername != NULL) in print_verify_detail() 1197 BIO_printf(bio, "Verified peername: %s\n", peername); in print_verify_detail()
|
/freebsd/usr.sbin/ypldap/ |
H A D | yp.c | 589 res.peer = (peername)master; in ypproc_master_2_svc()
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | x509v3.h.in | 771 unsigned int flags, char **peername);
|
H A D | x509v3.h | 1035 unsigned int flags, char **peername);
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-s_client.pod.in | 388 Verified peername: smtp.example.com
|