| /src/external/ibm-public/postfix/dist/src/tls/ |
| tls_client.c | 540 const char *sni = 0; local 542 if (props->sni && *props->sni) { 552 if (strcmp(props->sni, "hostname") == 0) 553 sni = props->host; 554 else if (strcmp(props->sni, "nexthop") == 0) 555 sni = props->nexthop; 557 sni = props->sni; 564 if (!allascii(sni) && (aname = midna_domain_to_ascii(sni)) != 0) [all...] |
| tls_proxy_client_scan.c | 327 myfree((void *) props->sni); 531 VSTRING *sni = vstring_alloc(25); local 564 RECV_ATTR_STR(TLS_ATTR_SNI, sni), 585 props->sni = vstring_export(sni);
|
| tls.h | 235 char *peer_sni; /* SNI sent to or by the peer */ 500 const char *sni; /* optional SNI name when not DANE */ member in struct:__anon23192
|
| tls_misc.c | 854 /* server_sni_callback - process client's SNI extension */ 860 const char *sni = SSL_get_servername(ssl, TLSEXT_NAMETYPE_host_name); local 861 const char *cp = sni; 864 /* SNI is silently ignored when we don't care or is NULL or empty */ 865 if (!sni_ctx || !tls_server_sni_maps || !sni || !*sni) 868 if (!valid_hostname(sni, DONT_GRIPE)) { 869 msg_warn("TLS SNI from %s is invalid: %s", 870 TLScontext->namaddr, sni); 878 * the server. This results in the SNI callback running twice for th 1244 const char *sni = (role == TLS_ROLE_CLIENT) ? 0 : ctx->peer_sni; local [all...] |
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| extensions_srvr.c | 98 PACKET sni, hostname; local 100 if (!PACKET_as_length_prefixed_2(pkt, &sni) 102 || PACKET_remaining(&sni) == 0) { 113 * SNI types can exist, to simplify parsing. 115 * Also note that the RFC permits only one SNI value per type, 118 if (!PACKET_get_1(&sni, &servname_type) 120 || !PACKET_as_length_prefixed_2(&sni, &hostname)) { 126 * In TLSv1.2 and below the SNI is associated with the session. In TLSv1.3 127 * we always use the SNI value from the handshake. 141 * Store the requested SNI in the SSL as temporary storage [all...] |
| statem_srvr.c | 1313 * SNI, 1350 PACKET sni, tmppkt; local 1357 || !PACKET_get_length_prefixed_2(&tmppkt, &sni)) { 2267 * Call alpn_select callback if needed. Has to be done after SNI and
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| extensions_srvr.c | 101 PACKET sni, hostname; local 103 if (!PACKET_as_length_prefixed_2(pkt, &sni) 105 || PACKET_remaining(&sni) == 0) { 117 * SNI types can exist, to simplify parsing. 119 * Also note that the RFC permits only one SNI value per type, 122 if (!PACKET_get_1(&sni, &servname_type) 124 || !PACKET_as_length_prefixed_2(&sni, &hostname)) { 131 * In TLSv1.2 and below the SNI is associated with the session. In TLSv1.3 132 * we always use the SNI value from the handshake. 150 * Store the requested SNI in the SSL as temporary storage [all...] |
| statem_srvr.c | 1324 * SNI, 1361 PACKET sni, tmppkt; local 1368 || !PACKET_get_length_prefixed_2(&tmppkt, &sni)) { 2331 * Call alpn_select callback if needed. Has to be done after SNI and
|
| /src/external/bsd/openldap/dist/libraries/libldap/ |
| tls2.c | 358 const char *sni = host; local 394 /* pass hostname for SNI, but only if it's an actual name 400 for ( c = (unsigned char *)sni; *c; c++ ) { 411 sni = NULL; 413 err = tls_imp->ti_session_connect( ld, ssl, sni );
|
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| extensions_srvr.c | 109 PACKET sni, hostname; local 111 if (!PACKET_as_length_prefixed_2(pkt, &sni) 113 || PACKET_remaining(&sni) == 0) { 124 * SNI types can exist, to simplify parsing. 126 * Also note that the RFC permits only one SNI value per type, 129 if (!PACKET_get_1(&sni, &servname_type) 131 || !PACKET_as_length_prefixed_2(&sni, &hostname)) { 137 * In TLSv1.2 and below the SNI is associated with the session. In TLSv1.3 138 * we always use the SNI value from the handshake. 152 * Store the requested SNI in the SSL as temporary storage [all...] |
| statem_srvr.c | 1422 * SNI, 1476 PACKET sni, tmppkt; local 1483 || !PACKET_get_length_prefixed_2(&tmppkt, &sni)) { 2395 * Call alpn_select callback if needed. Has to be done after SNI and
|
| /src/external/ibm-public/postfix/dist/src/posttls-finger/ |
| posttls-finger.c | 245 /* The server name to send with the TLS Server Name Indication (SNI) 247 /* is ignored and the TLSA base domain is used instead. Otherwise, SNI is 502 char *sni; /* Server SNI name */ member in struct:STATE 831 sni = state->sni, 937 sni = state->sni, 1831 myfree(state->sni); 1947 state->sni = mystrdup("") [all...] |
| /src/external/ibm-public/postfix/dist/src/smtp/ |
| smtp.h | 110 char *sni; /* Optional SNI name when not DANE */ member in struct:SMTP_TLS_POLICY 166 _tls_policy_init_tmp->sni = 0; \
|