Home
last modified time | relevance | path

Searched refs:sni (Results 1 - 25 of 53) sorted by relevance

123

/third_party/node/test/parallel/
H A Dtest-tls-sni-option.js81 { sni: 'a.example.com', authorized: false },
94 { sni: 'a.example.com', authorized: true },
107 { sni: 'b.example.com', authorized: false },
120 { sni: 'c.wrong.com', authorized: false },
142 { sni: c.servername, authorized: c.authorized }
H A Dtest-https-agent-sni.js24 res.setHeader('x-sni', servername);
34 assert.strictEqual(res.headers['x-sni'],
35 id === false ? undefined : `sni.${id}`);
49 servername: `sni.${j}`,
/third_party/curl/lib/vquic/
H A Dvquic-tls.c230 if(peer->sni) { in curl_ossl_init_ssl()
231 if(!SSL_set_tlsext_host_name(ctx->ssl, peer->sni)) { in curl_ossl_init_ssl()
480 if(peer->sni) { in curl_wssl_init_ssl()
482 peer->sni, (unsigned short)strlen(peer->sni)); in curl_wssl_init_ssl()
596 if(!peer->sni || in Curl_vquic_tls_verify_peer()
597 wolfSSL_check_domain_name(ctx->ssl, peer->sni) == SSL_FAILURE) in Curl_vquic_tls_verify_peer()
/third_party/libcoap/src/
H A Dcoap_openssl.c136 char *sni; member
145 char *sni; member
2127 const char *sni = SSL_get_servername(ssl, TLSEXT_NAMETYPE_host_name); in tls_server_name_call_back() local
2130 if (!sni || !sni[0]) { in tls_server_name_call_back()
2131 sni = ""; in tls_server_name_call_back()
2134 if (!strcasecmp(sni, context->sni_entry_list[i].sni)) { in tls_server_name_call_back()
2141 coap_dtls_key_t *new_entry = setup_data->validate_sni_call_back(sni, in tls_server_name_call_back()
2180 context->sni_entry_list[context->sni_count].sni in tls_server_name_call_back()
2223 const char *sni = SSL_get_servername(ssl, TLSEXT_NAMETYPE_host_name); psk_tls_server_name_call_back() local
2428 const char *sni = ""; tls_client_hello_call_back() local
2547 const char *sni = ""; psk_tls_client_hello_call_back() local
[all...]
H A Dcoap_gnutls.c113 char *sni; member
119 char *sni; member
524 gnutls_free(g_context->pki_sni_entry_list[i].sni); in coap_dtls_free_context()
532 gnutls_free(g_context->psk_sni_entry_list[i].sni); in coap_dtls_free_context()
1506 if (strcasecmp(name, g_context->psk_sni_entry_list[i].sni) == 0) { in post_client_hello_gnutls_psk()
1529 g_context->psk_sni_entry_list[i].sni = gnutls_strdup(name); in post_client_hello_gnutls_psk()
1620 if (strcasecmp(name, g_context->pki_sni_entry_list[i].sni) == 0) { in post_client_hello_gnutls_pki()
1642 g_context->pki_sni_entry_list[i].sni = gnutls_strdup(name); in post_client_hello_gnutls_pki()
H A Dcoap_mbedtls.c139 char *sni; member
147 char *sni; member
816 if (strcasecmp(name, m_context->pki_sni_entry_list[i].sni) == 0) { in pki_sni_callback()
845 m_context->pki_sni_entry_list[i].sni = name; in pki_sni_callback()
859 /* name has been absorbed into pki_sni_entry_list[].sni entry */ in pki_sni_callback()
894 if (strcasecmp(name, m_context->psk_sni_entry_list[i].sni) == 0) { in psk_sni_callback()
922 m_context->psk_sni_entry_list[i].sni = name; in psk_sni_callback()
924 /* name has been absorbed into psk_sni_entry_list[].sni entry */ in psk_sni_callback()
1795 mbedtls_free(m_context->pki_sni_entry_list[i].sni);
1807 mbedtls_free(m_context->psk_sni_entry_list[i].sni);
[all...]
/third_party/curl/lib/vtls/
H A Dwolfssl.c375 bool sni = FALSE; in wolfssl_connect_step1() local
376 #define use_sni(x) sni = (x) in wolfssl_connect_step1()
625 if(sni && connssl->peer.sni) { in wolfssl_connect_step1()
626 size_t sni_len = strlen(connssl->peer.sni); in wolfssl_connect_step1()
629 connssl->peer.sni, in wolfssl_connect_step1()
768 char *snihost = connssl->peer.sni? in wolfssl_connect_step2()
769 connssl->peer.sni : connssl->peer.hostname; in wolfssl_connect_step2()
H A Dgtls.c411 bool sni = TRUE; /* default is SNI enabled */ in gtls_client_init() local
427 sni = FALSE; /* SSLv3 has no SNI */ in gtls_client_init()
552 if(sni && peer->sni) { in gtls_client_init()
554 peer->sni, strlen(peer->sni)) < 0) { in gtls_client_init()
H A Dvtls.c1512 free(peer->sni); in Curl_ssl_peer_cleanup()
1514 peer->hostname = peer->sni = peer->dispname = NULL; in Curl_ssl_peer_cleanup()
1587 peer->sni = NULL; in Curl_ssl_peer_init()
1596 peer->sni = calloc(1, len + 1); in Curl_ssl_peer_init()
1597 if(!peer->sni) { in Curl_ssl_peer_init()
1601 Curl_strntolower(peer->sni, peer->hostname, len); in Curl_ssl_peer_init()
1602 peer->sni[len] = 0; in Curl_ssl_peer_init()
H A Drustls.c456 char *server = connssl->peer.sni? in cr_init_backend()
457 connssl->peer.sni : connssl->peer.hostname; in cr_init_backend()
H A Dmbedtls.c657 if(mbedtls_ssl_set_hostname(&backend->ssl, connssl->peer.sni? in mbed_connect_step1()
658 connssl->peer.sni : connssl->peer.hostname)) { in mbed_connect_step1()
/third_party/libcoap/include/coap3/
H A Dcoap_dtls.h269 * @param sni The requested SNI
275 typedef coap_dtls_key_t *(*coap_dtls_pki_sni_callback_t)(const char *sni,
328 void *sni_call_back_arg; /**< Passed in to the sni callback function */
448 * @param sni The client provided SNI
456 const char *sni,
/third_party/rust/crates/rust-openssl/openssl/src/ssl/
H A Dconnector.rs99 sni: true, in configure()
142 sni: bool,
157 self.sni = use_sni; in set_use_server_name_indication()
183 if self.sni && domain.parse::<IpAddr>().is_err() { in into_ssl()
/third_party/openssl/test/
H A Dservername_test.c41 static int get_sni_from_client_hello(BIO *bio, char **sni) in get_sni_from_client_hello() argument
87 || !TEST_true(PACKET_strndup(&pkt5, sni))) in get_sni_from_client_hello()
/third_party/nghttp2/src/
H A Dshrpx_mruby_module_env.cc138 auto sni = handler->get_tls_sni(); in env_get_tls_sni() local
140 return mrb_str_new(mrb, sni.c_str(), sni.size()); in env_get_tls_sni()
H A Dshrpx_client_handler.h187 // Stores |sni| which is TLS SNI extension value client sent in this
189 void set_tls_sni(const StringRef &sni);
H A Dshrpx_live_check.cc301 addr_->sni.empty() ? StringRef{addr_->host} : StringRef{addr_->sni}; in initiate_connection()
H A Dshrpx_worker.h97 // sni field to send remote server if TLS is enabled.
98 StringRef sni; member
H A Dshrpx_log.h269 StringRef sni; member
H A Dshrpx_worker.cc112 std::get<1>(*p) = a.sni; in create_downstream_key()
316 dst_addr.sni = make_string_ref(shared_addr->balloc, src_addr.sni); in replace_downstream_config()
/third_party/libcoap/examples/
H A Dcoap-server.c135 static coap_dtls_pki_t *setup_pki(coap_context_t *ctx, coap_dtls_role_t role, char *sni);
1905 verify_pki_sni_callback(const char *sni, in verify_pki_sni_callback() argument
1911 if (sni[0]) { in verify_pki_sni_callback()
1913 coap_log_info("SNI '%s' requested\n", sni); in verify_pki_sni_callback()
1916 if (strcasecmp(sni, valid_pki_snis.pki_sni_list[i].sni_match) == 0) { in verify_pki_sni_callback()
1933 verify_psk_sni_callback(const char *sni, in verify_psk_sni_callback() argument
1944 if (sni) { in verify_psk_sni_callback()
1946 coap_log_info("SNI '%s' requested\n", sni); in verify_psk_sni_callback()
1949 if (strcasecmp(sni, in verify_psk_sni_callback()
/third_party/skia/third_party/externals/microhttpd/
H A Dconfig.guess1171 echo mips-sni-sysv4
1174 echo mips-sni-sysv4
1179 echo ${UNAME_MACHINE}-sni-sysv4
1181 echo ns32k-sni-sysv
/third_party/node/deps/openssl/openssl/ssl/statem/
H A Dextensions_srvr.c98 PACKET sni, hostname; in tls_parse_ctos_server_name() local
100 if (!PACKET_as_length_prefixed_2(pkt, &sni) in tls_parse_ctos_server_name()
102 || PACKET_remaining(&sni) == 0) { in tls_parse_ctos_server_name()
118 if (!PACKET_get_1(&sni, &servname_type) in tls_parse_ctos_server_name()
120 || !PACKET_as_length_prefixed_2(&sni, &hostname)) { in tls_parse_ctos_server_name()
/third_party/openssl/ssl/statem/
H A Dextensions_srvr.c98 PACKET sni, hostname; in tls_parse_ctos_server_name() local
100 if (!PACKET_as_length_prefixed_2(pkt, &sni) in tls_parse_ctos_server_name()
102 || PACKET_remaining(&sni) == 0) { in tls_parse_ctos_server_name()
118 if (!PACKET_get_1(&sni, &servname_type) in tls_parse_ctos_server_name()
120 || !PACKET_as_length_prefixed_2(&sni, &hostname)) { in tls_parse_ctos_server_name()
/third_party/mbedtls/programs/ssl/
H A Dssl_server2.c217 " async_private_delay2=%%d Asynchronous delay for key_file2 and sni\n" \
338 " sni=%%s name1,cert1,key1,ca1"SNI_CRL ",auth1[,...]\n" \
670 char *sni; /* string describing sni information */ member
1748 opt.sni = DFL_SNI; in main()
2253 } else if (strcmp(p, "sni") == 0) { in main()
2254 opt.sni = q; in main()
2768 if (opt.sni != NULL) { in main()
2772 if ((sni_info = sni_parse(opt.sni)) == NULL) { in main()
3140 if (opt.sni ! in main()
[all...]

Completed in 42 milliseconds

123