/third_party/node/test/parallel/ |
H A D | test-tls-sni-option.js | 81 { sni: 'a.example.com', authorized: false }, 94 { sni: 'a.example.com', authorized: true }, 107 { sni: 'b.example.com', authorized: false }, 120 { sni: 'c.wrong.com', authorized: false }, 142 { sni: c.servername, authorized: c.authorized }
|
H A D | test-https-agent-sni.js | 24 res.setHeader('x-sni', servername); 34 assert.strictEqual(res.headers['x-sni'], 35 id === false ? undefined : `sni.${id}`); 49 servername: `sni.${j}`,
|
/third_party/curl/lib/vquic/ |
H A D | vquic-tls.c | 230 if(peer->sni) { in curl_ossl_init_ssl() 231 if(!SSL_set_tlsext_host_name(ctx->ssl, peer->sni)) { in curl_ossl_init_ssl() 480 if(peer->sni) { in curl_wssl_init_ssl() 482 peer->sni, (unsigned short)strlen(peer->sni)); in curl_wssl_init_ssl() 596 if(!peer->sni || in Curl_vquic_tls_verify_peer() 597 wolfSSL_check_domain_name(ctx->ssl, peer->sni) == SSL_FAILURE) in Curl_vquic_tls_verify_peer()
|
/third_party/libcoap/src/ |
H A D | coap_openssl.c | 136 char *sni; member 145 char *sni; member 2127 const char *sni = SSL_get_servername(ssl, TLSEXT_NAMETYPE_host_name); in tls_server_name_call_back() local 2130 if (!sni || !sni[0]) { in tls_server_name_call_back() 2131 sni = ""; in tls_server_name_call_back() 2134 if (!strcasecmp(sni, context->sni_entry_list[i].sni)) { in tls_server_name_call_back() 2141 coap_dtls_key_t *new_entry = setup_data->validate_sni_call_back(sni, in tls_server_name_call_back() 2180 context->sni_entry_list[context->sni_count].sni in tls_server_name_call_back() 2223 const char *sni = SSL_get_servername(ssl, TLSEXT_NAMETYPE_host_name); psk_tls_server_name_call_back() local 2428 const char *sni = ""; tls_client_hello_call_back() local 2547 const char *sni = ""; psk_tls_client_hello_call_back() local [all...] |
H A D | coap_gnutls.c | 113 char *sni; member 119 char *sni; member 524 gnutls_free(g_context->pki_sni_entry_list[i].sni); in coap_dtls_free_context() 532 gnutls_free(g_context->psk_sni_entry_list[i].sni); in coap_dtls_free_context() 1506 if (strcasecmp(name, g_context->psk_sni_entry_list[i].sni) == 0) { in post_client_hello_gnutls_psk() 1529 g_context->psk_sni_entry_list[i].sni = gnutls_strdup(name); in post_client_hello_gnutls_psk() 1620 if (strcasecmp(name, g_context->pki_sni_entry_list[i].sni) == 0) { in post_client_hello_gnutls_pki() 1642 g_context->pki_sni_entry_list[i].sni = gnutls_strdup(name); in post_client_hello_gnutls_pki()
|
H A D | coap_mbedtls.c | 139 char *sni; member 147 char *sni; member 816 if (strcasecmp(name, m_context->pki_sni_entry_list[i].sni) == 0) { in pki_sni_callback() 845 m_context->pki_sni_entry_list[i].sni = name; in pki_sni_callback() 859 /* name has been absorbed into pki_sni_entry_list[].sni entry */ in pki_sni_callback() 894 if (strcasecmp(name, m_context->psk_sni_entry_list[i].sni) == 0) { in psk_sni_callback() 922 m_context->psk_sni_entry_list[i].sni = name; in psk_sni_callback() 924 /* name has been absorbed into psk_sni_entry_list[].sni entry */ in psk_sni_callback() 1795 mbedtls_free(m_context->pki_sni_entry_list[i].sni); 1807 mbedtls_free(m_context->psk_sni_entry_list[i].sni); [all...] |
/third_party/curl/lib/vtls/ |
H A D | wolfssl.c | 375 bool sni = FALSE; in wolfssl_connect_step1() local 376 #define use_sni(x) sni = (x) in wolfssl_connect_step1() 625 if(sni && connssl->peer.sni) { in wolfssl_connect_step1() 626 size_t sni_len = strlen(connssl->peer.sni); in wolfssl_connect_step1() 629 connssl->peer.sni, in wolfssl_connect_step1() 768 char *snihost = connssl->peer.sni? in wolfssl_connect_step2() 769 connssl->peer.sni : connssl->peer.hostname; in wolfssl_connect_step2()
|
H A D | gtls.c | 411 bool sni = TRUE; /* default is SNI enabled */ in gtls_client_init() local 427 sni = FALSE; /* SSLv3 has no SNI */ in gtls_client_init() 552 if(sni && peer->sni) { in gtls_client_init() 554 peer->sni, strlen(peer->sni)) < 0) { in gtls_client_init()
|
H A D | vtls.c | 1512 free(peer->sni); in Curl_ssl_peer_cleanup() 1514 peer->hostname = peer->sni = peer->dispname = NULL; in Curl_ssl_peer_cleanup() 1587 peer->sni = NULL; in Curl_ssl_peer_init() 1596 peer->sni = calloc(1, len + 1); in Curl_ssl_peer_init() 1597 if(!peer->sni) { in Curl_ssl_peer_init() 1601 Curl_strntolower(peer->sni, peer->hostname, len); in Curl_ssl_peer_init() 1602 peer->sni[len] = 0; in Curl_ssl_peer_init()
|
H A D | rustls.c | 456 char *server = connssl->peer.sni? in cr_init_backend() 457 connssl->peer.sni : connssl->peer.hostname; in cr_init_backend()
|
H A D | mbedtls.c | 657 if(mbedtls_ssl_set_hostname(&backend->ssl, connssl->peer.sni? in mbed_connect_step1() 658 connssl->peer.sni : connssl->peer.hostname)) { in mbed_connect_step1()
|
/third_party/libcoap/include/coap3/ |
H A D | coap_dtls.h | 269 * @param sni The requested SNI 275 typedef coap_dtls_key_t *(*coap_dtls_pki_sni_callback_t)(const char *sni, 328 void *sni_call_back_arg; /**< Passed in to the sni callback function */ 448 * @param sni The client provided SNI 456 const char *sni,
|
/third_party/rust/crates/rust-openssl/openssl/src/ssl/ |
H A D | connector.rs | 99 sni: true, in configure() 142 sni: bool, 157 self.sni = use_sni; in set_use_server_name_indication() 183 if self.sni && domain.parse::<IpAddr>().is_err() { in into_ssl()
|
/third_party/openssl/test/ |
H A D | servername_test.c | 41 static int get_sni_from_client_hello(BIO *bio, char **sni) in get_sni_from_client_hello() argument 87 || !TEST_true(PACKET_strndup(&pkt5, sni))) in get_sni_from_client_hello()
|
/third_party/nghttp2/src/ |
H A D | shrpx_mruby_module_env.cc | 138 auto sni = handler->get_tls_sni(); in env_get_tls_sni() local 140 return mrb_str_new(mrb, sni.c_str(), sni.size()); in env_get_tls_sni()
|
H A D | shrpx_client_handler.h | 187 // Stores |sni| which is TLS SNI extension value client sent in this 189 void set_tls_sni(const StringRef &sni);
|
H A D | shrpx_live_check.cc | 301 addr_->sni.empty() ? StringRef{addr_->host} : StringRef{addr_->sni}; in initiate_connection()
|
H A D | shrpx_worker.h | 97 // sni field to send remote server if TLS is enabled. 98 StringRef sni; member
|
H A D | shrpx_log.h | 269 StringRef sni; member
|
H A D | shrpx_worker.cc | 112 std::get<1>(*p) = a.sni; in create_downstream_key() 316 dst_addr.sni = make_string_ref(shared_addr->balloc, src_addr.sni); in replace_downstream_config()
|
/third_party/libcoap/examples/ |
H A D | coap-server.c | 135 static coap_dtls_pki_t *setup_pki(coap_context_t *ctx, coap_dtls_role_t role, char *sni); 1905 verify_pki_sni_callback(const char *sni, in verify_pki_sni_callback() argument 1911 if (sni[0]) { in verify_pki_sni_callback() 1913 coap_log_info("SNI '%s' requested\n", sni); in verify_pki_sni_callback() 1916 if (strcasecmp(sni, valid_pki_snis.pki_sni_list[i].sni_match) == 0) { in verify_pki_sni_callback() 1933 verify_psk_sni_callback(const char *sni, in verify_psk_sni_callback() argument 1944 if (sni) { in verify_psk_sni_callback() 1946 coap_log_info("SNI '%s' requested\n", sni); in verify_psk_sni_callback() 1949 if (strcasecmp(sni, in verify_psk_sni_callback()
|
/third_party/skia/third_party/externals/microhttpd/ |
H A D | config.guess | 1171 echo mips-sni-sysv4 1174 echo mips-sni-sysv4 1179 echo ${UNAME_MACHINE}-sni-sysv4 1181 echo ns32k-sni-sysv
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | extensions_srvr.c | 98 PACKET sni, hostname; in tls_parse_ctos_server_name() local 100 if (!PACKET_as_length_prefixed_2(pkt, &sni) in tls_parse_ctos_server_name() 102 || PACKET_remaining(&sni) == 0) { in tls_parse_ctos_server_name() 118 if (!PACKET_get_1(&sni, &servname_type) in tls_parse_ctos_server_name() 120 || !PACKET_as_length_prefixed_2(&sni, &hostname)) { in tls_parse_ctos_server_name()
|
/third_party/openssl/ssl/statem/ |
H A D | extensions_srvr.c | 98 PACKET sni, hostname; in tls_parse_ctos_server_name() local 100 if (!PACKET_as_length_prefixed_2(pkt, &sni) in tls_parse_ctos_server_name() 102 || PACKET_remaining(&sni) == 0) { in tls_parse_ctos_server_name() 118 if (!PACKET_get_1(&sni, &servname_type) in tls_parse_ctos_server_name() 120 || !PACKET_as_length_prefixed_2(&sni, &hostname)) { in tls_parse_ctos_server_name()
|
/third_party/mbedtls/programs/ssl/ |
H A D | ssl_server2.c | 217 " async_private_delay2=%%d Asynchronous delay for key_file2 and sni\n" \ 338 " sni=%%s name1,cert1,key1,ca1"SNI_CRL ",auth1[,...]\n" \ 670 char *sni; /* string describing sni information */ member 1748 opt.sni = DFL_SNI; in main() 2253 } else if (strcmp(p, "sni") == 0) { in main() 2254 opt.sni = q; in main() 2768 if (opt.sni != NULL) { in main() 2772 if ((sni_info = sni_parse(opt.sni)) == NULL) { in main() 3140 if (opt.sni ! in main() [all...] |