HomeSort by: relevance | last modified time | path
    Searched defs:sni (Results 1 - 13 of 13) sorted by relevancy

  /src/external/ibm-public/postfix/dist/src/tls/
tls_client.c 540 const char *sni = 0; local
542 if (props->sni && *props->sni) {
552 if (strcmp(props->sni, "hostname") == 0)
553 sni = props->host;
554 else if (strcmp(props->sni, "nexthop") == 0)
555 sni = props->nexthop;
557 sni = props->sni;
564 if (!allascii(sni) && (aname = midna_domain_to_ascii(sni)) != 0)
    [all...]
tls_proxy_client_scan.c 327 myfree((void *) props->sni);
531 VSTRING *sni = vstring_alloc(25); local
564 RECV_ATTR_STR(TLS_ATTR_SNI, sni),
585 props->sni = vstring_export(sni);
tls.h 235 char *peer_sni; /* SNI sent to or by the peer */
500 const char *sni; /* optional SNI name when not DANE */ member in struct:__anon23192
tls_misc.c 854 /* server_sni_callback - process client's SNI extension */
860 const char *sni = SSL_get_servername(ssl, TLSEXT_NAMETYPE_host_name); local
861 const char *cp = sni;
864 /* SNI is silently ignored when we don't care or is NULL or empty */
865 if (!sni_ctx || !tls_server_sni_maps || !sni || !*sni)
868 if (!valid_hostname(sni, DONT_GRIPE)) {
869 msg_warn("TLS SNI from %s is invalid: %s",
870 TLScontext->namaddr, sni);
878 * the server. This results in the SNI callback running twice for th
1244 const char *sni = (role == TLS_ROLE_CLIENT) ? 0 : ctx->peer_sni; local
    [all...]
  /src/crypto/external/bsd/openssl/dist/ssl/statem/
extensions_srvr.c 98 PACKET sni, hostname; local
100 if (!PACKET_as_length_prefixed_2(pkt, &sni)
102 || PACKET_remaining(&sni) == 0) {
113 * SNI types can exist, to simplify parsing.
115 * Also note that the RFC permits only one SNI value per type,
118 if (!PACKET_get_1(&sni, &servname_type)
120 || !PACKET_as_length_prefixed_2(&sni, &hostname)) {
126 * In TLSv1.2 and below the SNI is associated with the session. In TLSv1.3
127 * we always use the SNI value from the handshake.
141 * Store the requested SNI in the SSL as temporary storage
    [all...]
statem_srvr.c 1313 * SNI,
1350 PACKET sni, tmppkt; local
1357 || !PACKET_get_length_prefixed_2(&tmppkt, &sni)) {
2267 * Call alpn_select callback if needed. Has to be done after SNI and
  /src/crypto/external/bsd/openssl.old/dist/ssl/statem/
extensions_srvr.c 101 PACKET sni, hostname; local
103 if (!PACKET_as_length_prefixed_2(pkt, &sni)
105 || PACKET_remaining(&sni) == 0) {
117 * SNI types can exist, to simplify parsing.
119 * Also note that the RFC permits only one SNI value per type,
122 if (!PACKET_get_1(&sni, &servname_type)
124 || !PACKET_as_length_prefixed_2(&sni, &hostname)) {
131 * In TLSv1.2 and below the SNI is associated with the session. In TLSv1.3
132 * we always use the SNI value from the handshake.
150 * Store the requested SNI in the SSL as temporary storage
    [all...]
statem_srvr.c 1324 * SNI,
1361 PACKET sni, tmppkt; local
1368 || !PACKET_get_length_prefixed_2(&tmppkt, &sni)) {
2331 * Call alpn_select callback if needed. Has to be done after SNI and
  /src/external/bsd/openldap/dist/libraries/libldap/
tls2.c 358 const char *sni = host; local
394 /* pass hostname for SNI, but only if it's an actual name
400 for ( c = (unsigned char *)sni; *c; c++ ) {
411 sni = NULL;
413 err = tls_imp->ti_session_connect( ld, ssl, sni );
  /src/crypto/external/apache2/openssl/dist/ssl/statem/
extensions_srvr.c 109 PACKET sni, hostname; local
111 if (!PACKET_as_length_prefixed_2(pkt, &sni)
113 || PACKET_remaining(&sni) == 0) {
124 * SNI types can exist, to simplify parsing.
126 * Also note that the RFC permits only one SNI value per type,
129 if (!PACKET_get_1(&sni, &servname_type)
131 || !PACKET_as_length_prefixed_2(&sni, &hostname)) {
137 * In TLSv1.2 and below the SNI is associated with the session. In TLSv1.3
138 * we always use the SNI value from the handshake.
152 * Store the requested SNI in the SSL as temporary storage
    [all...]
statem_srvr.c 1422 * SNI,
1476 PACKET sni, tmppkt; local
1483 || !PACKET_get_length_prefixed_2(&tmppkt, &sni)) {
2395 * Call alpn_select callback if needed. Has to be done after SNI and
  /src/external/ibm-public/postfix/dist/src/posttls-finger/
posttls-finger.c 245 /* The server name to send with the TLS Server Name Indication (SNI)
247 /* is ignored and the TLSA base domain is used instead. Otherwise, SNI is
502 char *sni; /* Server SNI name */ member in struct:STATE
831 sni = state->sni,
937 sni = state->sni,
1831 myfree(state->sni);
1947 state->sni = mystrdup("")
    [all...]
  /src/external/ibm-public/postfix/dist/src/smtp/
smtp.h 110 char *sni; /* Optional SNI name when not DANE */ member in struct:SMTP_TLS_POLICY
166 _tls_policy_init_tmp->sni = 0; \

Completed in 38 milliseconds