/freebsd-12-stable/contrib/libevent/sample/ |
H A D | openssl_hostname_validation.h | 56 HostnameValidationResult validate_hostname(const char *hostname, const X509 *server_cert);
|
H A D | openssl_hostname_validation.c | 63 static HostnameValidationResult matches_common_name(const char *hostname, const X509 *server_cert) { argument 70 common_name_loc = X509_NAME_get_index_by_NID(X509_get_subject_name((X509 *) server_cert), NID_commonName, -1); 76 common_name_entry = X509_NAME_get_entry(X509_get_subject_name((X509 *) server_cert), common_name_loc); 111 static HostnameValidationResult matches_subject_alternative_name(const char *hostname, const X509 *server_cert) { argument 118 san_names = X509_get_ext_d2i((X509 *) server_cert, NID_subject_alt_name, NULL, NULL); 163 HostnameValidationResult validate_hostname(const char *hostname, const X509 *server_cert) { argument 166 if((hostname == NULL) || (server_cert == NULL)) 170 result = matches_subject_alternative_name(hostname, server_cert); 173 result = matches_common_name(hostname, server_cert);
|
H A D | https-client.c | 136 X509 *server_cert = NULL; local 144 server_cert = X509_STORE_CTX_get_current_cert(x509_ctx); 147 res = validate_hostname(host, server_cert); 171 X509_NAME_oneline(X509_get_subject_name (server_cert),
|
/freebsd-12-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_client_i.h | 75 struct x509_certificate *server_cert; member in struct:tlsv1_client
|
H A D | tlsv1_client_read.c | 618 x509_certificate_chain_free(conn->server_cert); 619 conn->server_cert = chain; 957 for (cert = conn->server_cert, depth = 0; cert; 974 for (cert = conn->server_cert, depth = 0; cert; 994 if (conn->server_cert) 996 conn, 0, conn->server_cert,
|
H A D | tlsv1_client_ocsp.c | 782 cert = conn->server_cert; 795 if (cert == conn->server_cert)
|
H A D | tlsv1_client.c | 497 x509_certificate_chain_free(conn->server_cert);
|
/freebsd-12-stable/contrib/unbound/dnstap/ |
H A D | unbound-dnstap-socket.c | 237 char* server_cert, char* verifypem) 253 s->sslctx = listen_sslctx_create(server_key, server_cert, verifypem); 1149 char* server_cert, char* verifypem) 1155 maindata, server_key, server_cert, verifypem); 1183 char* server_cert, char* verifypem) 1208 setup_tls_list(maindata, tls_list, server_key, server_cert, 1236 char* server_key = NULL, *server_cert = NULL, *verifypem = NULL; local 1296 server_cert = optarg; 1340 server_cert, verifypem); 235 tap_socket_new_tlsaccept(char* ip, void (*ev_cb)(int, short, void*), void* data, char* server_key, char* server_cert, char* verifypem) argument 1147 setup_tls_list(struct main_tap_data* maindata, struct config_strlist_head* tls_list, char* server_key, char* server_cert, char* verifypem) argument 1180 setup_and_run(struct config_strlist_head* local_list, struct config_strlist_head* tcp_list, struct config_strlist_head* tls_list, char* server_key, char* server_cert, char* verifypem) argument
|
/freebsd-12-stable/contrib/wpa/src/ap/ |
H A D | authsrv.c | 200 (hapd->conf->ca_cert || hapd->conf->server_cert || 230 params.client_cert = hapd->conf->server_cert;
|
H A D | ap_config.h | 406 char *server_cert; member in struct:hostapd_bss_config
|
H A D | ap_config.c | 702 os_free(conf->server_cert);
|
/freebsd-12-stable/contrib/serf/buckets/ |
H A D | ssl_buckets.c | 562 static apr_status_t validate_cert_hostname(X509 *server_cert, apr_pool_t *pool) argument 568 ret = get_subject_alt_names(NULL, server_cert, ErrorOnNul, NULL); 573 X509_NAME *subject = X509_get_subject_name(server_cert); 591 X509 *server_cert; local 600 server_cert = X509_STORE_CTX_get_current_cert(store_ctx); 636 status = validate_cert_hostname(server_cert, ctx->pool); 641 if (X509_cmp_current_time(X509_get_notBefore(server_cert)) >= 0) { 644 else if (X509_cmp_current_time(X509_get_notAfter(server_cert)) <= 0) { 656 cert->ssl_cert = server_cert; 692 cert->ssl_cert = server_cert; [all...] |
/freebsd-12-stable/contrib/wpa/hostapd/ |
H A D | config_file.c | 2512 } else if (os_strcmp(buf, "server_cert") == 0) { 2513 os_free(bss->server_cert); 2514 bss->server_cert = os_strdup(pos);
|