Lines Matching +defs:name +defs:pos
5 /* peer name and peer certificate verification
35 /* and peer-name verification problems at the application level.
288 /* tls_text_name - extract certificate property value by name */
290 static char *tls_text_name(X509_NAME *name, int nid, const char *label,
294 int pos;
303 if (name == 0 || (pos = X509_NAME_get_index_by_NID(name, nid, -1)) < 0) {
317 if (X509_NAME_get_index_by_NID(name, nid, pos) >= 0) {
324 if ((entry = X509_NAME_get_entry(name, pos)) == 0) {
413 /* tls_dns_name - Extract valid DNS name from subjectAltName value */
441 * Safe to treat as an ASCII string possibly holding a DNS name
462 * the name is safe to handle, if it is not a valid hostname, it will not
476 /* tls_peer_CN - extract peer common name from certificate */
487 /* tls_issuer_CN - extract issuer common name from certificate */
491 X509_NAME *name;
494 name = X509_get_issuer_name(peer);
500 if ((cn = tls_text_name(name, NID_commonName,
502 cn = tls_text_name(name, NID_organizationName,