Home
last modified time | relevance | path

Searched refs:hostname (Results 1 – 8 of 8) sorted by relevance

/mbedtls-latest/library/
Dssl_client.c36 if (ssl->hostname == NULL) { in ssl_write_hostname_ext()
42 ssl->hostname)); in ssl_write_hostname_ext()
44 hostname_len = strlen(ssl->hostname); in ssl_write_hostname_ext()
88 memcpy(p, ssl->hostname, hostname_len); in ssl_write_hostname_ext()
886 int hostname_mismatch = ssl->hostname != NULL || in ssl_prepare_client_hello()
887 session_negotiate->hostname != NULL; in ssl_prepare_client_hello()
888 if (ssl->hostname != NULL && session_negotiate->hostname != NULL) { in ssl_prepare_client_hello()
890 ssl->hostname, session_negotiate->hostname) != 0; in ssl_prepare_client_hello()
901 ssl->hostname); in ssl_prepare_client_hello()
Dssl_tls.c237 dst->hostname = NULL; in mbedtls_ssl_session_copy()
307 ret = mbedtls_ssl_session_set_hostname(dst, src->hostname); in mbedtls_ssl_session_copy()
2760 int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname) in mbedtls_ssl_set_hostname() argument
2767 if (hostname != NULL) { in mbedtls_ssl_set_hostname()
2768 hostname_len = strlen(hostname); in mbedtls_ssl_set_hostname()
2778 if (ssl->hostname != NULL) { in mbedtls_ssl_set_hostname()
2779 mbedtls_zeroize_and_free(ssl->hostname, strlen(ssl->hostname)); in mbedtls_ssl_set_hostname()
2784 if (hostname == NULL) { in mbedtls_ssl_set_hostname()
2785 ssl->hostname = NULL; in mbedtls_ssl_set_hostname()
2787 ssl->hostname = mbedtls_calloc(1, hostname_len + 1); in mbedtls_ssl_set_hostname()
[all …]
Dssl_misc.h2907 const char *hostname);
/mbedtls-latest/programs/ssl/
Dssl_mail_client.c334 char hostname[32]; in main() local
623 gethostname(hostname, 32); in main()
624 len = sprintf((char *) buf, "EHLO %s\r\n", hostname); in main()
645 gethostname(hostname, 32); in main()
646 len = sprintf((char *) buf, "EHLO %s\r\n", hostname); in main()
658 gethostname(hostname, 32); in main()
/mbedtls-latest/tests/src/test_helpers/
Dssl_helpers.c1838 char hostname[] = "hostname example"; in mbedtls_test_ssl_tls13_populate_session() local
1839 session->hostname = mbedtls_calloc(1, sizeof(hostname)); in mbedtls_test_ssl_tls13_populate_session()
1840 if (session->hostname == NULL) { in mbedtls_test_ssl_tls13_populate_session()
1843 memcpy(session->hostname, hostname, sizeof(hostname)); in mbedtls_test_ssl_tls13_populate_session()
/mbedtls-latest/include/mbedtls/
Dssl.h1304 char *MBEDTLS_PRIVATE(hostname); /*!< host name binded with tickets */
1887 char *MBEDTLS_PRIVATE(hostname); /*!< expected peer CN for verification
3986 int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname);
4000 return ssl->MBEDTLS_PRIVATE(hostname); in mbedtls_ssl_get_hostname()
/mbedtls-latest/tests/suites/
Dtest_suite_ssl.function2138 TEST_ASSERT(original.hostname != NULL);
2139 TEST_ASSERT(restored.hostname != NULL);
2140 TEST_MEMORY_COMPARE(original.hostname, strlen(original.hostname),
2141 restored.hostname, strlen(restored.hostname));
/mbedtls-latest/
DChangeLog551 * X.509 hostname verification now supports IPAddress Subject Alternate Names.
567 * X.509 hostname verification now partially supports URI Subject Alternate
604 `mbedtls_ssl_context.hostname`.
4437 overflow of the hostname or session ticket. Found by Guido Vranken,
4472 * Added checking of hostname length in mbedtls_ssl_set_hostname() to ensure
5211 * Fixed X.509 hostname comparison (with non-regular characters)
5450 * Fixed X.509 hostname comparison (with non-regular characters)
5511 * Fixed potential heap buffer overflow on large hostname setting
5721 * Potential heap buffer overflow on large hostname setting
6173 * Added support on the client side for the TLS "hostname" extension